Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

35results about How to "To achieve deduplication" patented technology

Cloud data duplication elimination and integrity auditing method based on convergence encryption

The invention discloses a cloud data duplication elimination and integrity auditing method based on convergence encryption. According to the method, through adoption of a convergence key encapsulation / de-encapsulation algorithm based on blind signatures, convergence keys can be securely stored and moreover convergence key duplication elimination can be realized; and through utilization of a BLS signature algorithm based on the convergence keys, auditing public keys are stored by a trusted third party TTP, the TTP carries out proxy auditing, and duplication elimination of auditing signatures and the auditing public keys is realized. The method comprises the specific steps of carrying out system initialization; carrying out key initialization; carrying out file initialization; carrying out authentication evidence initialization; carrying out key encapsulation; carrying out data storage; carrying out duplication challenge; carrying out duplication response; carrying out duplication authentication; carrying out request auditing; carrying out proxy auditing; carrying out auditing response; carrying out auditing authentication; and carrying out file downloading. According to the method,a utilization rate of a cloud storage space is improved, the duplication elimination of auditing signatures and the auditing public keys is realized, and the storage and computing cost of a client arereduced.
Owner:NANJING UNIV OF SCI & TECH

Outsourcing data deduplication cloud storage method supporting privacy and integrity protection

The invention discloses an outsourcing data deduplication cloud storage method supporting privacy and integrity protection. Firstly, client deduplication and security authentication label deduplication of a data file are realized, so that the communication overhead and the storage burden of a cloud server are greatly reduced; and secondly, by adopting the extractor technology, the ciphertext of the outsourcing storage data does not depend on an encipher and an encryption algorithm, but depends on the data, so that ciphertext data deduplication is realized, and the privacy of the data is ensured in the deduplication process and the integrity auditing process. And finally, the RS erasure code technology is adopted to improve the fault-tolerant capability of deduplication cloud storage; a cloud service provider is also supported to spontaneously and regularly delegate a third-party auditor to carry out batch public cloud auditing on the data stored in the cloud server so as to ensure theintegrity of the data; meanwhile, a data owner is also supported to initiate public cloud auditing on the integrity of the file anytime and anywhere, so that the privacy of the data can be always protected in auditing and deduplication processes. The method provided by the invention is effective in the aspect of deduplication and efficient in the aspect of integrity cloud auditing.
Owner:中科柏诚科技(北京)股份有限公司

Method and system for deduplicating files of cloud storage system

The invention discloses a method and a system for deduplicating files of a cloud storage system. The method comprises the following steps: reading a file to be uploaded, and calculating the information abstract value of the file; comparing the information abstract value of the file with the information abstract values of files which have existed in the cloud storage system, and if the file of which the information abstract value is the same as those of the files exists in the cloud storage system, stopping uploading the file. According to the method and the system for deduplicating the files of the cloud storage system disclosed by the invention, the information abstract value of the file is used, the information abstract value of the file is of uniqueness, and if the file of which the information abstract value is the same as those of the files exists in the cloud storage system to indicate that the data of the file has existed in the cloud storage system, the file is not uploaded any more, so that duplicate files are prevented from existing in the cloud storage system, and deduplication for the files of the cloud storage system is realized.
Owner:ZHENGZHOU YUNHAI INFORMATION TECH CO LTD

Road entity data deduplication method and device, computing equipment and medium

The embodiment of the invention discloses a road entity data deduplication method and device, computing equipment and a medium. The method comprises: acquiring road source data, classifying the road source data into at least one data subset according to road entity event types, one data subset corresponding to one road entity event type, and the road source data being used for describing the roadentity events; determining a road name and a geographic area name in the text content corresponding to each piece of road source data in each data subset; and according to the road name and the geographic area name in the text content corresponding to each piece of road source data, performing text matching in historical road source data belonging to the same road entity event type as the corresponding data subset, and determining a duplicate text in each data subset. According to the embodiment of the invention, the de-duplication effectiveness of the road entity data in the internet data canbe improved, so that the processing efficiency of mass road entity data is improved.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

SQL interactive data preprocessing method and device based on transaction time sequence directed graph

The invention discloses an SQL interaction data preprocessing method and device based on a transaction time sequence directed graph, and the method comprises the steps: carrying out normal form training according to original SQL interaction instruction data in a business system, obtaining a trained SQL execution instruction set SqlCmdSet, and constructing a trained business-oriented transaction time sequence directed graph; obtaining actual SQL interaction instruction data in a business system production environment, performing paradigm to obtain an actual SQL execution instruction set SqlCmdSet, and obtaining an actual transaction sequence set session Transaction Set; and matching the actual transaction sequence set session Transaction Set with a trained business-oriented transaction timesequence directed graph according to the actual transaction sequence set session Transaction Set, and outputting a graph path corresponding to the actual SQL interaction instruction data. Effective data can be reserved to the maximum extent, and useless data can be removed. Repeated parts of the same transaction operation in the original data are extracted to the maximum extent, and duplicate removal of the original data is achieved.
Owner:STATE GRID ELECTRIC POWER RES INST +3

A deduplication cloud storage method for outsourced data supporting privacy and integrity protection

The invention discloses an outsourced data deduplication cloud storage method supporting privacy and integrity protection. First of all, the deduplication of data files on the client side and the deduplication of security authentication tags are realized, which greatly reduces the communication overhead and the storage burden of the cloud server. Secondly, the use of extractor technology makes the ciphertext of the outsourced stored data not depend on the encryptor and encryption algorithm, but on the data itself, so that the deduplication of ciphertext data can be realized, and the deduplication process and integrity audit process are guaranteed. Data Privacy. Finally, RS erasure coding technology is used to improve the fault tolerance of deduplication cloud storage, and it also supports cloud service providers to spontaneously and regularly entrust third-party auditors to conduct batch public cloud audits of data stored in cloud servers to ensure data integrity. At the same time, it also supports data owners to initiate public cloud audits on the integrity of files anytime and anywhere, and can always protect the privacy of data during the audit and deduplication process. The method provided by the invention is effective in deduplication and efficient in integrity cloud auditing.
Owner:中科柏诚科技(北京)股份有限公司

Resource processing method and device, electronic equipment and storage medium

The invention relates to a resource processing method and device, electronic equipment and a storage medium, relates to the technical field of information processing, and aims to at least solve the problem of low accuracy when a social platform performs duplicate removal on video resource recommendation in related arts. The method comprises the following steps: acquiring identification information of candidate resources; according to the generation time of the candidate resources, progressively increasing the identification information corresponding to the candidate resources; under the condition that the identification information of the candidate resources is not stored in the identification information set, comparing the identification information of the candidate resources with the minimum value of the identification information corresponding to the hash value in the filter; when the identification information of the candidate resource is greater than or equal to the minimum value of the identification information corresponding to the hash value in the filter, determining whether the identification information of the candidate resource is stored in the filter; and under the condition that the identification information of the candidate resource is stored in the filter, determining that the candidate resource is not used as the recommended resource of the target account.
Owner:BEIJING DAJIA INTERNET INFORMATION TECH CO LTD

Data deduplication method and device for traffic playback, test method and device, computer equipment and storage medium

The invention discloses a data deduplication method and device for traffic playback, a test method and device, computer equipment and a storage medium, and the data deduplication method comprises the steps of collecting a service request; obtaining byte code information of the service request, and extracting features of the byte code information; generating a feature value corresponding to the feature of the byte code information, wherein the feature value is used for uniquely representing the byte code information; and de-duplicating the service request by using the feature value to obtain de-duplicated service request data. According to the invention, the byte code information of the service request can reflect the relevant characteristics of the service request from the code level and directly reflect the difference of different service requests, so that the relevant characteristics of the byte code information are utilized to perform de-duplication on the service request, thereby achieving the accurate de-duplication on the service flow.
Owner:SHANGHAI JUNZHENG NETWORK TECH CO LTD

Data processing method, intelligent terminal and storage medium

The invention discloses a data processing method, an intelligent terminal and a storage medium. The method comprises the following steps: receiving heartbeat data sent by a client application; importing the heartbeat data into a big data cluster; storing the heartbeat data in a bit encoding mode; and according to a used data warehouse tool, developing a user-defined bit code calculation function,and calling the user-defined function to perform bit code related calculation on the heartbeat data according to actual data analysis requirements. According to the method, the product use state of the user in a certain time period of the current day is recorded in a bit coding mode, the product use time distribution of the user in one day can be recorded in one field, the use condition of the user in the current day is recorded in a single field, and the use condition of the user in the current year can be stored in several fields in the current day; only a plurality of pieces of data of users need to be stored in one year, the storage space is greatly reduced, deduplication of heartbeat data in the same time period is achieved, related calculation is conducted on data based on bit coding, and the calculation efficiency can be improved.
Owner:重庆市易平方科技有限公司

Voice search method and device based on artificial intelligence

The invention provides an artificial intelligence based voice searching method and device. The artificial intelligence based voice searching method comprises the steps of firstly receiving a first query sentence input by a user; then carrying out lexical analysis on the first query sentence and determining a first entity list included in the first query sentence; then carrying out pinyin labeling on each entity in the first entity list and determining a first pinyin list; then determining a second entity list in fuzzy matching with the first pinyin list based on a preset pinyin entity library and further determining a third entity list corresponding to voice input by the user; and then getting rid of one word fragment in a second query sentence which is composed of entities in the third entity list to obtain a third query sentence, wherein the word fragment has the pinyin edition distance to other word segments less than a first preset value. Therefore, influence from a voice identification error to search in a voice searching process is reduced, duplication elimination of repeated fragments is realized, the accuracy of voice searching is increased, and the user experience is improved.
Owner:BEIJING BAIDU NETCOM SCI & TECH CO LTD

A cloud data deduplication and integrity audit method based on convergent encryption

The invention discloses a cloud data duplication elimination and integrity auditing method based on convergence encryption. According to the method, through adoption of a convergence key encapsulation / de-encapsulation algorithm based on blind signatures, convergence keys can be securely stored and moreover convergence key duplication elimination can be realized; and through utilization of a BLS signature algorithm based on the convergence keys, auditing public keys are stored by a trusted third party TTP, the TTP carries out proxy auditing, and duplication elimination of auditing signatures and the auditing public keys is realized. The method comprises the specific steps of carrying out system initialization; carrying out key initialization; carrying out file initialization; carrying out authentication evidence initialization; carrying out key encapsulation; carrying out data storage; carrying out duplication challenge; carrying out duplication response; carrying out duplication authentication; carrying out request auditing; carrying out proxy auditing; carrying out auditing response; carrying out auditing authentication; and carrying out file downloading. According to the method,a utilization rate of a cloud storage space is improved, the duplication elimination of auditing signatures and the auditing public keys is realized, and the storage and computing cost of a client arereduced.
Owner:NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products