Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

296 results about "Distributed hash table" patented technology

A distributed hash table (DHT) is a class of a decentralized distributed system that provides a lookup service similar to a hash table: (key, value) pairs are stored in a DHT, and any participating node can efficiently retrieve the value associated with a given key. Keys are unique identifiers which map to particular values, which in turn can be anything from addresses, to documents, to arbitrary data. Responsibility for maintaining the mapping from keys to values is distributed among the nodes, in such a way that a change in the set of participants causes a minimal amount of disruption. This allows a DHT to scale to extremely large numbers of nodes and to handle continual node arrivals, departures, and failures.

Content acquisition method, node and content network

The invention discloses a content acquisition method, a content acquisition node and a content network, which belong to the field of communication. The method comprises the following steps of: receiving a content request, wherein the content request at least comprises an identifier of requested contents; judging whether the contents corresponding to the identifier can be locally acquired or not, and if the contents corresponding to the identifier can be locally acquired, locally acquiring the contents corresponding to the identifier; otherwise, querying a name resolution system according to the identifier to obtain a target node corresponding to the identifier, and acquiring the contents corresponding to the identifier from the target node, wherein the name resolution system comprises a hierarchical distributed hash table and a global content resolution structure; and the global content resolution structure supports name aggregation and longest match searching. The node comprises a content agent module and a content acquisition module. The content network comprises the content acquisition node and a transmission network. In the content acquisition method, the content acquisition node and the content network, a content-oriented network architecture is constructed by adopting a distributed scheme, the content delivery efficiency and the safety of the network are improved by introducing an optimization strategy, network investment is reduced, and the network is more adaptive to the rapid increasing of the contents.
Owner:HUAWEI TECH CO LTD

Layered controllable alliance block chain system

The invention discloses a layered controllable alliance block chain system. The layered controllable alliance block chain system is characterized by comprising a core layer, a backbone layer and an application layer; through the adoption of a structured point-to-point transmission protocol, a node and a data object are mapped to a network by using a distributed hash table; the application layer reduces the selection determinacy by adopting the random routing and exchanges performance for routing security; the core layer and the backbone layer select an optimal or backup path to perform the security connection; the core layer nodes cooperate to generate a public digital credential; and each core layer node generates and maintains the private digital credential and an exchange relation between the private digital credential and the public digital credential; each node forms the workload certificate through one or more competitive computation in Hash, symmetric encryption, asymmetric encryption, random number and external dynamic exponential algorithm, and/or realizes consensus algorithm with the timestamp on the interest certificate of ownership through the node, and forms continuouspublic block chain and private block chain capable of being wedged in both way through the end-to-end connection of various blocks.
Owner:陈新

Cloud data safe deleting system and method without support of trusted third party

The invention discloses a cloud data safe deleting system and method without the support of a trusted third part. The system comprises a distributed hash table network, a user side and a cloud. The distributed hash table network is used for storing decryption key fragments. The user side is used for encrypting and decrypting files and deleting key information and comprises a file encryption module, a file decryption module, a key distribution and reorganization module, a local key information module and a file deletion module. The file encryption module and the file decryption module are used for encrypting and decrypting the files respectively; the key distribution and reorganization module is used for fragmenting and reorganizing keys; the local key information module is used for storing relevant key information; the file deletion module is used for deleting the key information. The cloud is provided with a data server and a key management server and used for storing data ciphertext information and key information and comprises the data server and the key management server, wherein the data server is used for storing file ciphertexts, and the key management server is used for managing key relevant information. The cloud data safe deleting system and method can be used for a cloud storage environment to protect data privacy of the user side.
Owner:HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products