Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

33 results about "Hash join" patented technology

The hash join is an example of a join algorithm and is used in the implementation of a relational database management system. Hash joins are typically more efficient than nested loops joins, except when the probe side of the join is very small. However, hash joins can only be used to compute equijoins.

APUF security authentication method based on polynomial reconstruction

ActiveCN107733655AMess up the relationshipResistance to Learning AttacksKey distribution for secure communicationUser identity/authority verificationHash joinRandomization
The invention discloses an APUF security authentication method based on polynomial reconstruction. The method comprises two stages of registration and authentication. At the registration stage, a server randomly generates a large number of incentives and a random number k, and an APUF generates corresponding response to serve as an abscissa. After CRC encoding, a corresponding real point is foundfrom a polynomial using the k as the coefficient, and a large number of hash points are added to form a point set V. The incentives, the point set V and a polynomial coefficient hash (k) subjected tothe hash are stored in the server. At the authentication stage, a PUF circuit on the hand of a user generates response, randomizes the response, and queries the corresponding real point in the point set V for constructing a polynomial so as to obtain a polynomial coefficient (the formula is described in the specification). Contrast authentication is performed on the (the formula is described in the specification) and the hash (k), and the authentication is successful if the two coefficients are the same. According to the APUF security authentication method disclosed by the invention, by meansof the response to the randomization processing by the APUF and the adding of the hash points, the machine learning attack can be resisted to ensure the security and the reliability of the data.
Owner:SOUTHEAST UNIV

Data association query method and system in RocksDB-based key-value storage mode

The invention discloses a data association query method and system in a RocksDB-based key-value storage mode and belongs to the technical field of operator optimization. The technical problem to be solved by the invention is how to improve the efficiency of traditional hash join calculation based on line-by-line reading and serial operation. The associated query efficiency is improved, the adoptedtechnical scheme is as follows: the method comprises the following steps: ; the method is applied to a key-value storage system. Each row of data is stored through a channel of go language, and thenthe data is read one by one to realize block reading, i.e., the data is processed by taking a block as a unit, and after the data block is received, the data is distributed to different Join Workers for parallel computing, so that the computing performance of a Hash Join operator is improved; the method specifically comprises the following steps: S1, reading data block by block; s2, all the modules are in cache communication through channels, all the modules are made to be executed asynchronously, and all the modules are made to end execution by sending end marks; and S3, calculating the mutual concurrent execution of the Join Workers.
Owner:SHANDONG LANGCHAO YUNTOU INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products