Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

283 results about "Distribute hash table" patented technology

Content addressable storage systems and methods employing searchable blocks

In accordance with exemplary embodiments of the present invention, a content addressable data structure system may include directed acyclic graphs (DAGs) of data content that are addressed using both a user-defined search key and content of data blocks. Internal keys of retention roots of the DAGs may be derived from the user-defined search key while the remaining blocks may be content addressed. As opposed to using a content address, the user may provide the search key when retrieving and deleting DAGs retaining the data content. In addition, the internal keys may be implemented using internal content addressable storage operations, such as applying a hash function and employing a distributed hash table.
Owner:NEC CORP

Content acquisition method, node and content network

The invention discloses a content acquisition method, a content acquisition node and a content network, which belong to the field of communication. The method comprises the following steps of: receiving a content request, wherein the content request at least comprises an identifier of requested contents; judging whether the contents corresponding to the identifier can be locally acquired or not, and if the contents corresponding to the identifier can be locally acquired, locally acquiring the contents corresponding to the identifier; otherwise, querying a name resolution system according to the identifier to obtain a target node corresponding to the identifier, and acquiring the contents corresponding to the identifier from the target node, wherein the name resolution system comprises a hierarchical distributed hash table and a global content resolution structure; and the global content resolution structure supports name aggregation and longest match searching. The node comprises a content agent module and a content acquisition module. The content network comprises the content acquisition node and a transmission network. In the content acquisition method, the content acquisition node and the content network, a content-oriented network architecture is constructed by adopting a distributed scheme, the content delivery efficiency and the safety of the network are improved by introducing an optimization strategy, network investment is reduced, and the network is more adaptive to the rapid increasing of the contents.
Owner:HUAWEI TECH CO LTD

Distributed storage of routing information in a link state protocol controlled network

A distributed hash table is implemented to store routing information on a network. Node IDs exchanged in connection with implementation of a link state routing protocol are used as keys in the distributed hash table, and routes are stored at one or more nodes on the network. When a route is learned, the route is processed against the set of keys to determine which nodes should store the route. When a route is needed, the route is processed against the set of keys to determine which nodes should have the route information. The manner in which the route is processed against the set of keys is the same in both instances, so that the DHT may be used to store and retrieve route information on the network. The DHT may be implemented to store MAC addresses, IP addresses, MPLS labels, or other information of interest to enable routes to be stored and learned by network elements on the network.
Owner:RPX CLEARINGHOUSE

Cloud data safe deleting system and method without support of trusted third party

The invention discloses a cloud data safe deleting system and method without the support of a trusted third part. The system comprises a distributed hash table network, a user side and a cloud. The distributed hash table network is used for storing decryption key fragments. The user side is used for encrypting and decrypting files and deleting key information and comprises a file encryption module, a file decryption module, a key distribution and reorganization module, a local key information module and a file deletion module. The file encryption module and the file decryption module are used for encrypting and decrypting the files respectively; the key distribution and reorganization module is used for fragmenting and reorganizing keys; the local key information module is used for storing relevant key information; the file deletion module is used for deleting the key information. The cloud is provided with a data server and a key management server and used for storing data ciphertext information and key information and comprises the data server and the key management server, wherein the data server is used for storing file ciphertexts, and the key management server is used for managing key relevant information. The cloud data safe deleting system and method can be used for a cloud storage environment to protect data privacy of the user side.
Owner:HUAZHONG UNIV OF SCI & TECH

Data storage method based on distributed hash table and erasure codes

The invention discloses a data storage method based on a distributed hash table and erasure codes, and mainly relates to the field of distributed storage. The data storage method includes the following steps that a storage system manages data blocks wholly through a decentralized distributed hash table structure; in order to guarantee reliability, redundancy storage is conducted on the data blocks through erasure code coding; data are regularly scanned in a background process to maintain uniformity and redundancy of the data. According to the data storage method based on the distributed hash table and the erasure codes, the storage system has the decentralized structure and is better than a traditional distributed storage system in expansibility, and storage cost caused by data redundancy is reduced through the erasure codes on the premise that reliability of the data is guaranteed.
Owner:RESEARCH INSTITUTE OF TSINGHUA UNIVERSITY IN SHENZHEN

Distributed file system architectural method supporting mass data access

The invention discloses a distributed file system architectural method supporting mass data access. The method is based on a distributed Hash table, and access nodes are obtained by conducting Hash mapping on a file path. By the adoption of the fully distributed type non-centralized architectural design, new nodes can join a cluster after several times of communications. A Kademlia algorithm is adopted for addressing among the nodes, and a routing table is divided and the distance between the nodes is obtained through exclusive-or operation to achieve skip of the most adjacent nodes. A leader is selected through a PaxosLease algorithm to handle the mapping operation on the nodes so as to solve the consensus problem. Block storage of fixed size is conducted on actual data of files, and redundant backup is conducted on the multiple nodes, so that the requirements for safety and distributed calculation are met. When an architectural system generated according to the architectural method processes mass files, the processing efficiency can be remarkably improved, and the good effect can be achieved in the environment with the low latency requirement.
Owner:SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products