Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

51 results about "HashClash" patented technology

HashClash was a distributed computing project to find collisions in the MD5 hash algorithm. It was based at Department of Mathematics and Computer Science at the Eindhoven University of Technology, and Marc Stevens initiated the project as part of his master's degree thesis.

Apparatus and method for solving hash collision and exchange equipment with the same

ActiveCN101232444AIncrease profitPrevent unknown unicast traffic from occupying effective network bandwidthData switching networksReal-time computingWire speed
The invention discloses a Hash collision solution method, which includes the following steps of detecting Hash collision of a MAC address during learning process of the MAC address; storing the collision MAC address in a collision MAC address table in a collision table module except for an address table module; and carrying out unicast wire-speed forwarding to a message with a target address as a collision MAC address according to the collision MAC address. A Hash collision solution device and an exchange device including the same are further provided. Owing to the Hash collision solution method of the invention, the message with the target address as the collision MAC address can be unicast wire-speed forwarded so as to improve utilization ratio of port band width.
Owner:NEW H3C TECH CO LTD

Field programmable gate array-based (FPGA-based) intrusion detection system and method

The invention relates to a field programmable gate array-based (FPGA-based) intrusion detection system and a FPGA-based intrusion detection method and belongs to the technical field of network security. The invention is characterized in that FPGA-based intrusion detection method is designed and realized; the processing performance is promoted by a realization mode of a hardware circuit; packet classification is realized by selecting a binary tree structure packet classification algorithm; character matching is realized by adopting an exclusive or (XOR) Hash algorithm which is suitable for FPGA processing; the rule updating is realized through performing addition or correction on the basis of the original intrusion rule realization logic; and Hash collision is eliminated through a method of performing independent matching on the Hash collision.
Owner:NORTHEASTERN UNIV

Data structure for hash operation and hash table storage and query method based on data structure

The invention belongs to the field of computer hash data structures, in particular to a data structure for hash operation and a hash table storage and query method based on the structure. In order toensure the query efficiency, a dual-port memory bank is adopted for hardware implementation, the content of two addresses of the memory bank can be read at the same time, key value comparison can be completed within the determined time, and the method is suitable for achieving efficient query in an assembly line mode. More candidate positions are provided through more hash operations, the probability of hash conflicts is reduced, the insertion, storage and updating efficiency of hash table entries is improved, dynamic change of hash table entry capacity is supported, space waste or performancereduction caused by table entry insertion operation is avoided, and the method is suitable for applications with unknown and constantly changing hash table entries. A CRC algorithm is adopted as a hash function, a hash calculation result has good uniqueness, the hash calculation result can be obtained on the basis of XOR exclusive-OR operation and a parallel pipeline implementation structure during specific implementation, and hardware design implementation is facilitated.
Owner:PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU

Interface method table generation method and device and function pointer query method and device

PendingCN111638925ASolve wasteSolve the problem of decreased query efficiencyExecution paradigmsHashClashTheoretical computer science
The embodiment of the invention discloses an interface method table generation method and device and a function pointer query method and device. The interface method table generation method comprisesthe following steps of based on the number of interface functions realized by a target Java class, generating a hash table of the target Java class, then, based on a hash algorithm of the target Javaclass and function signatures of all interface functions; determining a hash value of the interface function; determining an index of a function pointer of the first interface function in a hash table, storing a function pointer of the first interface function to a position indicated by the index, wherein the first interface function is an interface function having no hash conflict with other interface functions, storing a function signature and a function pointer of a second interface function in a conflict elimination table, and the second interface function is an interface function having hash conflict with other interface functions. According to the scheme, when the hash table is generated, the size of the hash table is determined according to the product of the number of the interfacefunctions which can be realized by the target Java class and the preset coefficient, so that the problem that the hash table is too large or too small is avoided.
Owner:HUAWEI TECH CO LTD

Scalable-ot-based privacy set intersection method and device

The invention discloses a scalable-ot-based privacy set intersection method and device, and the method comprises the steps that: a first data party calculates current first to-be-processed data through employing a first Hash algorithm, obtains a first calculation result, and judges whether the first calculation result has a Hash conflict with all currently generated first Hash tables or not; if the first calculation result has the Hash conflict with all currently generated first Hash tables, a new first hash table is generated to store the current first to-be-processed data; and the steps are repeated until all the first to-be-processed data are calculated, a second data party calculates second to-be-processed data through a second hash algorithm, a second hash table is generated according to an obtained second calculation result, intersection data of all the first to-be-processed data and the second to-be-processed data is calculated according to all the first hash tables and the second hash tables, and a privacy intersection is generated according to the intersection data. The situation that the intersection result is obtained by repeating the whole calculation process for many times can be avoided, the calculation amount of intersection is greatly reduced, the calculation efficiency is improved, and the whole calculation process is more concise.
Owner:百保上海科技有限公司

Point cloud dynamic hash division method and device

The invention discloses a point cloud dynamic Hash division method and equipment, and the method comprises the steps: determining the total number of division times according to the total number of occupied nodes of a current node layer of a tree structure and an average node number threshold value in a single Hash table after division; determining the number of hash tables corresponding to the current node layer; determining the division times of each coordinate component; and determining a hash table corresponding to the node according to the number of hash tables corresponding to the current node layer, the division times of the coordinate component and the occupied node position data of the current node layer, and adding the node into the hash table corresponding to the node. A plurality of hash tables is configured on each node layer, the serial numbers of the hash tables corresponding to the nodes are determined according to the position data of the occupied nodes of the current node layer, the nodes are added to the hash tables corresponding to the nodes, and the nodes in the different hash tables do not have hash conflicts, so that when that the performance is not lost, the access performance of the hash tables is optimized, and the insertion and query efficiency of the hash tables is improved.
Owner:PENG CHENG LAB

Hardware accelerated query method and system, electronic equipment and storage medium

The embodiment of the invention relates to the field of communication, and discloses a hardware accelerated query method and system, electronic equipment and a storage medium. In the embodiment of theinvention, the hardware accelerated query method comprises the following steps: acquiring p groups of characteristic values of a data stream; respectively carrying out hash operation on the p groupsof characteristic values to obtain p hash values respectively corresponding to the p groups of characteristic values; performing exclusive-OR operation on the p hash values, and taking an operation result as an index value corresponding to the data stream; and querying a preset array according to the index value, wherein the preset array comprises each data stream needing to be subjected to hardware acceleration and a preset index value of each data stream needing to be subjected to hardware acceleration. According to the method, the hash algorithm in the hardware accelerated query process ismodified by combining the actual use scene of the home gateway, so that the regularity of the internal characteristic value of the data stream is reduced compared with the operation adopting a singlecharacteristic value, and the hash conflict in the hash algorithm is reduced on the premise of ensuring the actual transmission time.
Owner:CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1

Massive Network Data Search Method Based on Data Flow Structure

The invention discloses a mass network data search method based on a data stream structure. The method comprises a real-time data storage method and a real-time query method. Data in a network arrives in a data stream form, so that it is needed to reduce the network data, capture a specific length of each piece of network message data and store valid information according to a specific data file size. According to the method, a Bloom Filter algorithm is used to establish an index file for a source IP and a host IP in each network message; and during real-time query, the index file is searched for first, a data storage file is searched for after matching succeeds, and detailed information is obtained. Through the method, mass network data can be quickly processed, a small storage space is occupied, and a large amount of network detailed information is saved; by use of the Bloom Filter Hash algorithm to establish indexes for the network message data, grading retrieval of file content is realized, the index structure is simple, and the occupied space is small; by use of three different Hash functions for calculation, the Hash conflict rate is low; and during retrieval, index matching search is quick and accurate, and high time and space efficiency is achieved.
Owner:SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products