A method and device for solving hash collision

A hash collision and device technology, applied in the computer field, can solve problems such as hash algorithm hash collisions, reduce the number of hash collisions, improve the performance of the whole machine, and ensure data consistency.

Active Publication Date: 2021-07-06
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a hash conflict in the hash algorithm, that is, different data get the same hash value through the hash operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for solving hash collision

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0040] 1. The host will issue multiple data of a certain size;

[0041] 2. Calculate the fingerprint value of each data through the hash algorithm;

[0042] 3. Query whether the finger pattern value is saved in the store;

[0043] 4. When the fingerprint value is not queried in the system, it means that the current processing is non-repetitive data, which needs to be saved to the hard disk, and save the fingerprint value - physical address metadata, logical address - physical address metadata and Physical address - logical address metadata;

[0044] 5. When the finger pattern value is queried in the system, it is determined whether the finger pattern is locked. When it is not locked, the data is compared to the current data in the hard disk, and the data is identical, and the data is identical to the current processing is duplicate data. Do a heavy deletion, the data does not need to be saved to the hard disk, just save the logical address of the data - physical address metadata a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method and device for solving hash conflicts. The method includes the following steps: calculating the fingerprint value for the data to be stored, and inquiring whether the fingerprint value is stored in the hard disk; in response to the fingerprint value being stored in the hard disk, judging Whether the fingerprint value is locked; in response to the unlocked fingerprint value, judging whether the data is the same as the corresponding data in the hard disk; in response to the data being different from the corresponding data in the hard disk, saving the data and the first set of metadata corresponding to the data in the hard disk , and lock the fingerprint value to prevent other threads from repeatedly querying the data in the hard disk. By using the method of the present invention, while ensuring data consistency without affecting performance, the number of repeated processing of hash conflicts between threads can be reduced, repeated calculations can be reduced, and the performance of the whole machine can be improved.

Description

Technical field [0001] BACKGROUND OF THE INVENTION Well to more specifically, a method and apparatus for solving hash conflicts. Background technique [0002] In the storage area, massive data query and storage need to occupy large resources, which seriously affects the performance of data storage. In these data, there is a large amount of repetition data. In order to reduce the resource occupied by the storage data, improve data storage performance, which can only save only one in the storage medium, and reduce the disc without affecting the data consistency The amount of data is delivered. The method of determining whether the data is repeated is to calculate the data fingerprint value by the hash algorithm, and by the same basis for the same data as the fingerprint value. However, there is a hash conflict in the hash algorithm, that is, different data is obtained by the hash transportation. Inventive content [0003] In view of this, the embodiment of the present invention is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F3/06
CPCG06F3/0614G06F3/0658
Inventor 岳斌
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products