CN101140592A - Keywords storing and researching method and apparatus - Google Patents

Keywords storing and researching method and apparatus Download PDF

Info

Publication number
CN101140592A
CN101140592A CNA2007101755441A CN200710175544A CN101140592A CN 101140592 A CN101140592 A CN 101140592A CN A2007101755441 A CNA2007101755441 A CN A2007101755441A CN 200710175544 A CN200710175544 A CN 200710175544A CN 101140592 A CN101140592 A CN 101140592A
Authority
CN
China
Prior art keywords
field
cryptographic hash
random number
carried out
prestores
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007101755441A
Other languages
Chinese (zh)
Inventor
胡睿
沈士军
李猛
徐振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CNA2007101755441A priority Critical patent/CN101140592A/en
Publication of CN101140592A publication Critical patent/CN101140592A/en
Priority to PCT/CN2008/072552 priority patent/WO2009046669A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a storage and search method for key words and a relevant device, and belongs to the field of communication. The method comprises: Divide a key word into a plurality of fields; take a random number corresponding with the first field; perform shifting operation for constants, and then, perform XOR operation with the shift results and a random number, in order to gain a hash value corresponding with the first field; begin with the second field, take a random number corresponding with the current field; perform shifting operation for the hash value corresponding with a previous field of the current field, and then, perform XOR operation with the shift results and a random number for the current field, so as to gain a hash value corresponding with the current field; store the key word into a storage area at an address with a hash value corresponding with the final field address; and search key words with the method in a corresponding storage region. The device comprises: A division module, the first hash value acquisition module, a multi-stage hash value acquisition module and a storage module. In the invention, distribution of the final hash value is quite approximate to a theoretical random distribution, in order to increase searching accuracy.

Description

Key word storage, lookup method and equipment
Technical field
The present invention relates to the communications field, particularly key word storage, lookup method and equipment.
Background technology
In data communication field, exact-match lookup is the mode that a kind of list item of using always is searched, MAC (Media AccessControl for example, the medium Access Control) table, ARP (Address Resolution Protocol, address resolution protocol) table, multicast table, Netstream table (network flow table) etc. all need exact-match lookup.What exact-match lookup was the most frequently used is that Hash (Hash) is searched algorithm, referring to Fig. 1, network processing unit will be searched KEY (key word) and send to hash algorithm equipment, calculate by well-designed hash function by hash algorithm equipment and to search the pairing cryptographic hash of KEY, this cryptographic hash is the address of a Hash bucket, find corresponding Hash bucket, the list item that from this Hash bucket, takes out all storages with search KEY and compare one by one, find out the list item of coupling fully, lookup result is returned to network processing unit.
Hash operation refers to that but the key word of the limited more possibility of number (as the key word of 72 bit lengths, is just had 2 72Plant possibility) be mapped to less Hash bucket (as 2 18Individual memory address) in.Can accelerate the seek rate of key word like this, and save the space.As seen, Hash is the mapping relations of a kind of " many-one ", and a plurality of different key words can be mapped to same Hash bucket (memory address of key word), i.e. " conflict ".The degree of depth of Hash bucket (or space size of each memory address) has determined the key word number that can deposit in the middle of the Hash bucket.Theoretically, it all is possible that 100 even 1000 different key words are mapped to same Hash bucket, just the problem of probability.But because the restriction of storage space, the degree of depth of Hash bucket is limited, and the key word number that deposits in memory address is limited in other words.
Hash function is the core of Hash lookup algorithm, and its implementation can be divided into following two classes:
The first kind: introduce random factor, make the distribution of cryptographic hash can approach stochastic distribution to greatest extent, such as PKP Hash, BUZ Hash etc.;
Second class: do not introduce random factor, input search KEY be divided into directly be shifted after several sections, mathematical operation such as XOR mutually; For example Shu Ru search key is " ABCD ", and wherein A, B, C and D are the binary sequences of equal length, and this type of Hash operation is as follows so: respectively with A, B, C and D displacement, and A XOR B XOR C XOR D then, the value that obtains at last is exactly a cryptographic hash.With the cryptographic hash visit Hash bucket that obtains, the cryptographic hash that promptly obtains is the address of storage key.
In realizing process of the present invention, the inventor finds:
First kind hash function is applied in the word processing field of computing machine, be to be that unit carries out Hash operation with " characters of 8 bit lengths ", the scope of cryptographic hash can only be 0-255, also just can only visit 256 memory addresss, so can not directly apply to the exact-match lookup of data communication field;
The second class hash function is not owing to introduce random factor, and the distribution of cryptographic hash and theoretic stochastic distribution have gap, needs darker bucket the hash-collision probability can be dropped to 100,000/(being that a conflict can appear in the 100K list item).And darker bucket need take bigger storage space, and when searching the coupling list item, needs the list item of visit (reading) many, causes seek rate slow.
Summary of the invention
In order to make key word be evenly distributed in each memory block, the embodiment of the invention provides a kind of key word storing method and equipment.Described technical scheme is as follows:
A kind of key word storing method, described method comprises:
Key word is divided into a plurality of fields;
From the random factor array that prestores, get the first field random number corresponding;
The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Since second field, from the random factor array that prestores, get current field random number corresponding;
Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
When to the end during the cryptographic hash of field correspondence, store described key word into memory block that the address is the cryptographic hash of described last field correspondence.
The embodiment of the invention also provides a kind of key word memory device, and described equipment comprises:
Cut apart module, be used for key word is divided into a plurality of fields;
The first cryptographic hash acquisition module is used for getting the described first field random number corresponding that module segmentation goes out of cutting apart from the random factor array that prestores; The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Multistage cryptographic hash acquisition module is used for since second field, gets current field random number corresponding from the random factor array that prestores; Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
Memory module is used for obtaining from described multistage cryptographic hash acquisition module the cryptographic hash of last field correspondence, stores described key word into memory block that the address is the cryptographic hash of described last field correspondence.
The beneficial effect of above-mentioned key word storing method and equipment is:
By key word being divided into a plurality of fields, back one field is carried out Hash operation according to the cryptographic hash of the field of front, makes that the distribution of final hash value and theoretic stochastic distribution are very approaching, the hash-collision probability is dropped to theoretic minimum.
In order to improve the accuracy of coupling, the embodiment of the invention provides the keyword search method and apparatus.Described technical scheme is as follows:
A kind of keyword search method, described method comprises:
Receive search request, the key word in the described search request is divided into a plurality of fields;
From the random factor array that prestores, get the first field random number corresponding;
The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Since second field, from the random factor array that prestores, get current field random number corresponding;
Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
When to the end during the cryptographic hash of field correspondence, be that described key word is searched in the memory block of the cryptographic hash of described last field correspondence in the address.
The embodiment of the invention also provides a kind of keyword search equipment, and described equipment comprises:
Cut apart module, be used to receive search request, the key word in the described search request is divided into a plurality of fields;
The first cryptographic hash acquisition module is used for getting the described first field random number corresponding that module segmentation goes out of cutting apart from the random factor array that prestores; The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Multistage cryptographic hash acquisition module is used for since second field, gets current field random number corresponding from the random factor array that prestores; Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
Searching module, be used for when described multistage cryptographic hash acquisition module obtains the cryptographic hash of last field correspondence, is that described key word is searched in the memory block of the cryptographic hash of described last field correspondence in the address.
The beneficial effect of above-mentioned keyword search method and apparatus is:
Technique scheme, by key word being divided into a plurality of fields, back one field is carried out Hash operation according to the cryptographic hash of the field of front, makes the distribution and the theoretic stochastic distribution that finally obtain cryptographic hash very approaching, the accuracy that has improved matched and searched.
Description of drawings
Fig. 1 is the application synoptic diagram of the Hash lookup algorithm that provides in the prior art;
Fig. 2 is the key word storing method process flow diagram that the embodiment of the invention 1 provides;
Fig. 3 is the key word memory device synoptic diagram that the embodiment of the invention 2 provides;
Fig. 4 is the keyword search method flow diagram that the embodiment of the invention 3 provides;
Fig. 5 is the keyword search method synoptic diagram that the embodiment of the invention 3 provides;
Fig. 6 is the keyword search equipment synoptic diagram that the embodiment of the invention 4 provides.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
The Hash operation of the present invention by the multi-stage pipeline formula makes that the distribution of final hash value and theoretic stochastic distribution are very approaching, and then the hash-collision probability dropped to theoretic minimum, improved the accuracy of matched and searched in the data communication field.
Embodiment 1
Referring to Fig. 2, present embodiment provides a kind of key word storing method, may further comprise the steps:
Step 101: key word is divided into a plurality of fields;
Wherein, the length of each field can be 8 bits, when the length of key word is not the integral multiple of 8 bits, and curtailment 8 bits of the last field that can occur being divided, at this moment, and the afterbody zero padding of field in the end, it is supplied is 8 bits.
Step 102: from the random factor array that prestores, get the first field random number corresponding;
This random factor array is a special array, each at random number average a sequence number is arranged.The length of each random number is unfixing in the array, can be 8 bits, can be 16 bits or 24 bits yet, present embodiment is 8 bits, 256 random binary number are arranged in this array, after they are vertically arranged, 128 " 0 " and 128 " 1 " are arranged all on arbitrary vertical bit position.Present embodiment is that 24 bits are example with the length of random number, and this random factor array representation is as follows:
Random number 0 → 1111....1011....0110....
Random number 1 → 0000....0100....1001....
……
Random number 253 → 1000....0110....0101....
Random number 254 → 0101....1100....1110....
Random number 255 → 1010....0011....1011....
Scale-of-two to first field is asked the decimal system, and metric result is the sequence number of above-mentioned random factor array, and which random number what this sequence number was represented the first field correspondence is, according to this sequence number, takes out random number corresponding.
Step 103: the constant that prestores is carried out shift operation, and the result of displacement and the first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Wherein, the constant that prestores can be the arbitrary constant of the equal in length of the random number in length and the above-mentioned random factor array.
Step 104:, from the random factor array that prestores, get current field random number corresponding since second field;
Step 105: the cryptographic hash to the last field correspondence of current field is carried out shift operation, and the result of displacement and current field random number corresponding are carried out XOR, obtain the cryptographic hash of current field correspondence;
Step 106: when to the end during the cryptographic hash of field correspondence, store above-mentioned key word into memory block that the address is the cryptographic hash of last field correspondence, i.e. Dui Ying Hash bucket.
When key word is divided into a plurality of field in the said method, the length of field can suitably be regulated as required, the number of random number in the length decision random factor array of field, it is the size of random factor array, the length of each field is big more, corresponding random factor array is just big more, and needed storage space is just big more.If the length of divided field is more little, then the middle cryptographic hash of required calculating is just many more, and operand is just big more; Therefore the length of present embodiment preferred field is 8 bits, certainly, also can be the field of other length.
By the said method storage key, can guarantee to the maximum limit that key word is evenly distributed in each memory block (Hash bucket), the condition that facilitates for the keyword search in later stage.
Embodiment 2
Referring to Fig. 3, present embodiment provides a kind of key word memory device, comprising:
Cut apart module 201, be used for key word is divided into a plurality of fields;
The first cryptographic hash acquisition module 202 is used for getting from the random factor array that prestores and cuts apart the first field random number corresponding that module 201 is partitioned into; The constant that prestores is carried out shift operation, and the result of displacement and the first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Multistage cryptographic hash acquisition module 203 is used for since second field, gets current field random number corresponding from the random factor array that prestores; Cryptographic hash to the last field correspondence of current field is carried out shift operation, and the result of displacement and current field random number corresponding are carried out XOR, obtain the cryptographic hash of current field correspondence;
Memory module 204 is used for obtaining from multistage cryptographic hash acquisition module 203 cryptographic hash of last field correspondence, stores key word into memory block that the address is the cryptographic hash of last field correspondence.
The module 201 of cutting apart in the present embodiment is divided into field of per 8 bits with key word, and during last field less than 8 bits, the end zero padding is filled.Random factor array that prestores and constant no longer describe in detail here with embodiment 1.
Embodiment 3
Referring to Fig. 4, present embodiment provides a kind of keyword search method, may further comprise the steps:
Step 301: key word is divided into a plurality of fields;
Wherein, the length of each field can be 8 bits, when the length of key word is not the integral multiple of 8 bits, and curtailment 8 bits of the last field that can occur being divided, at this moment, and the afterbody zero padding of field in the end, it is supplied is 8 bits.
Step 302: from the random factor array that prestores, get the first field random number corresponding;
This random factor array no longer describes in detail here with embodiment 1.
Step 303: the constant that prestores is carried out shift operation, and the result of displacement and the first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Wherein, the constant that prestores can be arbitrary constant, the equal in length of the random number in its length and the above-mentioned random factor array.
Step 304:, from the random factor array that prestores, get current field random number corresponding since second field;
Step 305: the cryptographic hash to the last field correspondence of current field is carried out shift operation, and the result of displacement and current field random number corresponding are carried out XOR, obtain the cryptographic hash of current field correspondence;
Step 306: when to the end during the cryptographic hash of field correspondence, be that above-mentioned key word is searched in the memory block (Hash bucket) of the cryptographic hash of last field correspondence in the address.
Referring to Fig. 5, the KEY dispenser receives after the search request, with searching the KEY field that to be divided into L length be 8 bits, gives L level Hash streamline respectively and handles.Processing procedure is as follows:
1) first order Hash streamline receive search KEY the highest 8 bits (first field) afterwards, as index (index range is 0-255), from the random factor array that prestores, fetch a random number with this 8 bit; Then, certain constant that prestores is carried out shift operation, its result carries out XOR with the random number of fetching just now; The result who obtains at last is exactly the middle cryptographic hash of first order Hash streamline output, gives second level Hash streamline with this result and handles.
2) second level Hash streamline at first with second 8 bit searching KEY received as index, from the random factor array that prestores, fetch a random number, this random number may be same with the random number of fetching in the first order Hash streamline, may not be same also; To carry out shift operation from the middle cryptographic hash that first order Hash streamline obtains then, its result carries out XOR with the random number of fetching just now; The result who obtains at last is exactly the middle cryptographic hash of second level Hash streamline output, gives third level Hash streamline with this result and handles.
3) Sheng Xia Hash pipeline processes and second level Hash streamline are similar, and the output valve of afterbody (i.e. L level) Hash streamline is exactly final cryptographic hash.Final cryptographic hash finds corresponding Hash bucket by the mapping of memory interface module.From the Hash bucket, take out all list items, carry out final comparison with the original KEY that searches,, then return matching result if one of them list item coupling (promptly accurate the coupling) is fully with it arranged by the matched and searched module.
Further, when the list item number is N, the number of Hash bucket is M, preferred M 〉=N, and M=2 m, wherein m is the length of random number in the random factor array (binary number).Because the random number in the random factor array that prestores is a regular length, such as being 24 bits, so for realize different list item numbers (N '≤M '=2 m') search, each grade Hash streamline carries out XOR after obtaining the position that needs to move to right (24-m ') after the random number that prestores again.
Present embodiment is by being divided into key word a plurality of fields, and back one field is carried out Hash operation according to the cryptographic hash of the field of front, has improved the accuracy of matched and searched.
Embodiment 4
Referring to Fig. 6, present embodiment provides a kind of keyword search equipment, comprising:
Cut apart module 401, be used to receive search request, the key word in the search request is divided into a plurality of fields;
The first cryptographic hash acquisition module 402 is used for getting from the random factor array that prestores and cuts apart the first field random number corresponding that module 401 is partitioned into; The constant that prestores is carried out shift operation, and the result of displacement and the first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Multistage cryptographic hash acquisition module 403 is used for since second field, gets current field random number corresponding from the random factor array that prestores; Cryptographic hash to the last field correspondence of current field is carried out shift operation, and the result of displacement and current field random number corresponding are carried out XOR, obtain the cryptographic hash of current field correspondence;
Searching module 404, be used for when multistage cryptographic hash acquisition module 403 obtains the cryptographic hash of last field correspondence, is the memory block search key of the cryptographic hash of last field correspondence in the address.
The module 401 of cutting apart in the present embodiment is divided into field of per 8 bits with key word, and during last field less than 8 bits, the end zero padding is filled.Random factor array that prestores and constant no longer describe in detail here with embodiment 1.
The technical scheme that above embodiment provides can realize that corresponding software is stored in the physical mediums such as hard disk, floppy disk or CD of computing machine by software.
Technique scheme, by key word being divided into a plurality of fields, back one field is carried out Hash operation according to the cryptographic hash of the field of front, make that the distribution and the theoretic stochastic distribution of final hash value are very approaching, the hash-collision probability is dropped to theoretic minimum, improved the accuracy of matched and searched in the data communication field;
Simultaneously, the length of each field adopts 8 bits, and the corresponding random factor array length that prestores is 256, and is both economical, because the random factor array is big more, needed storage space is just big more.
The above only is preferred embodiment of the present invention, and is in order to restriction the present invention, within the spirit and principles in the present invention not all, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. a key word storing method is characterized in that, described method comprises:
Key word is divided into a plurality of fields;
From the random factor array that prestores, get the first field random number corresponding;
The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Since second field, from the random factor array that prestores, get current field random number corresponding;
Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
When to the end during the cryptographic hash of field correspondence, store described key word into memory block that the address is the cryptographic hash of described last field correspondence.
2. key word storing method as claimed in claim 1 is characterized in that, the length of each field is 8 bits in described a plurality of fields.
3. key word storing method as claimed in claim 2 is characterized in that, when last field less than 8 bits, described method also comprises:
By in the afterbody zero padding of described last field described last field being supplied is 8 bits.
4. key word storing method as claimed in claim 1 is characterized in that, the length of the random number in the described random factor array is unfixing, and correspondingly, the length of the described constant that prestores equals the length of the random number in the described random factor array.
5. a key word memory device is characterized in that, described equipment comprises:
Cut apart module, be used for key word is divided into a plurality of fields:
The first cryptographic hash acquisition module is used for getting the described first field random number corresponding that module segmentation goes out of cutting apart from the random factor array that prestores; The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Multistage cryptographic hash acquisition module is used for since second field, gets current field random number corresponding from the random factor array that prestores; Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
Memory module is used for obtaining from described multistage cryptographic hash acquisition module the cryptographic hash of last field correspondence, stores described key word into memory block that the address is the cryptographic hash of described last field correspondence.
6. a keyword search method is characterized in that, described method comprises:
Receive search request, the key word in the described search request is divided into a plurality of fields;
From the random factor array that prestores, get the first field random number corresponding;
The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Since second field, from the random factor array that prestores, get current field random number corresponding;
Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
When to the end during the cryptographic hash of field correspondence, be that described key word is searched in the memory block of the cryptographic hash of described last field correspondence in the address.
7. critical lookup method as claimed in claim 6 is characterized in that, the length of each field is 8 bits in described a plurality of fields.
8. keyword search method as claimed in claim 7 is characterized in that, when last field less than 8 bits, described method also comprises:
By in the afterbody zero padding of described last field described last field being supplied is 8 bits.
9. keyword search method as claimed in claim 6 is characterized in that, the length of the random number in the described random factor array is unfixing, and correspondingly, the length of the described constant that prestores equals the length of the random number in the described random factor array.
10. a keyword search equipment is characterized in that, described equipment comprises:
Cut apart module, be used to receive search request, the key word in the described search request is divided into a plurality of fields;
The first cryptographic hash acquisition module is used for getting the described first field random number corresponding that module segmentation goes out of cutting apart from the random factor array that prestores; The constant that prestores is carried out shift operation, and the result of displacement and the described first field random number corresponding are carried out XOR, obtain the cryptographic hash of the first field correspondence;
Multistage cryptographic hash acquisition module is used for since second field, gets current field random number corresponding from the random factor array that prestores; Cryptographic hash to the last field correspondence of described current field is carried out shift operation, and the result of displacement and described current field random number corresponding are carried out XOR, obtain the cryptographic hash of described current field correspondence;
Searching module, be used for when described multistage cryptographic hash acquisition module obtains the cryptographic hash of last field correspondence, is that described key word is searched in the memory block of the cryptographic hash of described last field correspondence in the address.
CNA2007101755441A 2007-09-30 2007-09-30 Keywords storing and researching method and apparatus Pending CN101140592A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CNA2007101755441A CN101140592A (en) 2007-09-30 2007-09-30 Keywords storing and researching method and apparatus
PCT/CN2008/072552 WO2009046669A1 (en) 2007-09-30 2008-09-26 Method and device for storing and searching keyword

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007101755441A CN101140592A (en) 2007-09-30 2007-09-30 Keywords storing and researching method and apparatus

Publications (1)

Publication Number Publication Date
CN101140592A true CN101140592A (en) 2008-03-12

Family

ID=39192544

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007101755441A Pending CN101140592A (en) 2007-09-30 2007-09-30 Keywords storing and researching method and apparatus

Country Status (2)

Country Link
CN (1) CN101140592A (en)
WO (1) WO2009046669A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009046669A1 (en) * 2007-09-30 2009-04-16 Huawei Technologies Co., Ltd. Method and device for storing and searching keyword
CN101620523B (en) * 2009-07-29 2011-04-13 深圳国微技术有限公司 Random number generator circuit
WO2012034470A1 (en) * 2010-09-13 2012-03-22 腾讯科技(深圳)有限公司 Hash algorithm-based method and apparatus for data storage
CN101860431B (en) * 2009-04-10 2012-04-25 雷凌科技股份有限公司 Hash key generation method and device
CN103001878A (en) * 2012-11-26 2013-03-27 中兴通讯股份有限公司 Determination method and device for media access control (MAC) address Hash collision
CN101692651B (en) * 2009-09-27 2014-12-31 中兴通讯股份有限公司 Method and device for Hash lookup table
CN107248939A (en) * 2017-05-26 2017-10-13 中国人民解放军理工大学 Network flow high-speed associative method based on hash memories
CN107330047A (en) * 2017-06-28 2017-11-07 华信塞姆(成都)科技有限公司 A kind of FPGA training and enquiry circuit implementation method based on perfect hash algorithm
CN104104604B (en) * 2013-04-04 2018-10-02 马维尔以色列(M.I.S.L.)有限公司 The method and device of accurate match Hash lookup database in network switch device
CN110188242A (en) * 2019-05-30 2019-08-30 北京三快在线科技有限公司 Unmanned equipment localization method, device, unmanned equipment and storage medium
CN111198882A (en) * 2019-12-26 2020-05-26 东软集团股份有限公司 Data processing method and device, storage medium and electronic equipment
WO2020224091A1 (en) * 2019-05-06 2020-11-12 平安科技(深圳)有限公司 Sequence generation method and apparatus, computer device, and storage medium
CN112181974A (en) * 2019-07-01 2021-01-05 上海宏路数据技术股份有限公司 Identification information distribution method, system and storage equipment
CN114422389A (en) * 2022-02-24 2022-04-29 成都北中网芯科技有限公司 High-speed real-time network data monitoring method based on Hash and hardware acceleration
CN115714644A (en) * 2022-10-31 2023-02-24 北京海泰方圆科技股份有限公司 Random number generation method and device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109656468B (en) * 2017-10-11 2022-05-27 深圳市中兴微电子技术有限公司 Method and device for realizing data storage
CN110532284B (en) * 2019-09-06 2023-05-23 深圳前海环融联易信息科技服务有限公司 Mass data storage and retrieval method and device, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4922417A (en) * 1986-10-24 1990-05-01 American Telephone And Telegraph Company Method and apparatus for data hashing using selection from a table of random numbers in combination with folding and bit manipulation of the selected random numbers
CN100470550C (en) * 2007-04-02 2009-03-18 华为技术有限公司 Information storing method, information search method and engine device
CN101140592A (en) * 2007-09-30 2008-03-12 华为技术有限公司 Keywords storing and researching method and apparatus

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009046669A1 (en) * 2007-09-30 2009-04-16 Huawei Technologies Co., Ltd. Method and device for storing and searching keyword
CN101860431B (en) * 2009-04-10 2012-04-25 雷凌科技股份有限公司 Hash key generation method and device
CN101620523B (en) * 2009-07-29 2011-04-13 深圳国微技术有限公司 Random number generator circuit
CN101692651B (en) * 2009-09-27 2014-12-31 中兴通讯股份有限公司 Method and device for Hash lookup table
WO2012034470A1 (en) * 2010-09-13 2012-03-22 腾讯科技(深圳)有限公司 Hash algorithm-based method and apparatus for data storage
US9104676B2 (en) 2010-09-13 2015-08-11 Tencent Technology (Shenzhen) Company Limited Hash algorithm-based data storage method and system
CN103001878B (en) * 2012-11-26 2018-02-16 中兴通讯股份有限公司 The determination method and device of MAC Address hash-collision
CN103001878A (en) * 2012-11-26 2013-03-27 中兴通讯股份有限公司 Determination method and device for media access control (MAC) address Hash collision
CN104104604B (en) * 2013-04-04 2018-10-02 马维尔以色列(M.I.S.L.)有限公司 The method and device of accurate match Hash lookup database in network switch device
CN107248939A (en) * 2017-05-26 2017-10-13 中国人民解放军理工大学 Network flow high-speed associative method based on hash memories
CN107248939B (en) * 2017-05-26 2020-07-31 中国人民解放军理工大学 Network flow high-speed correlation method based on hash memory
CN107330047A (en) * 2017-06-28 2017-11-07 华信塞姆(成都)科技有限公司 A kind of FPGA training and enquiry circuit implementation method based on perfect hash algorithm
CN107330047B (en) * 2017-06-28 2020-06-30 华信塞姆(成都)科技有限公司 FPGA training and inquiring circuit implementation method based on perfect Hash algorithm
WO2020224091A1 (en) * 2019-05-06 2020-11-12 平安科技(深圳)有限公司 Sequence generation method and apparatus, computer device, and storage medium
CN110188242A (en) * 2019-05-30 2019-08-30 北京三快在线科技有限公司 Unmanned equipment localization method, device, unmanned equipment and storage medium
CN112181974B (en) * 2019-07-01 2023-06-02 上海嗨普智能信息科技股份有限公司 Identification information distribution method, system and storage device
CN112181974A (en) * 2019-07-01 2021-01-05 上海宏路数据技术股份有限公司 Identification information distribution method, system and storage equipment
CN111198882A (en) * 2019-12-26 2020-05-26 东软集团股份有限公司 Data processing method and device, storage medium and electronic equipment
CN114422389A (en) * 2022-02-24 2022-04-29 成都北中网芯科技有限公司 High-speed real-time network data monitoring method based on Hash and hardware acceleration
CN114422389B (en) * 2022-02-24 2023-09-12 成都北中网芯科技有限公司 High-speed real-time network data monitoring method based on hash and hardware acceleration
CN115714644A (en) * 2022-10-31 2023-02-24 北京海泰方圆科技股份有限公司 Random number generation method and device
CN115714644B (en) * 2022-10-31 2023-08-15 北京海泰方圆科技股份有限公司 Random number generation method and device

Also Published As

Publication number Publication date
WO2009046669A1 (en) 2009-04-16

Similar Documents

Publication Publication Date Title
CN101140592A (en) Keywords storing and researching method and apparatus
CN106815350B (en) Dynamic ciphertext multi-keyword fuzzy search method in cloud environment
US9438412B2 (en) Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings
CN101692651B (en) Method and device for Hash lookup table
EP2146292B1 (en) Method and apparatus for extracting information from a database
CN101404032B (en) Video retrieval method and system based on contents
CN100445999C (en) Data storaging and searching method
CN101621502A (en) Method and device for storing and searching routing table
CN108304409B (en) Carry-based data frequency estimation method of Sketch data structure
CN105488050A (en) Database multi-index method, apparatus and system
Moataz et al. Resizable tree-based oblivious RAM
CN106326475A (en) High-efficiency static hash table implement method and system
CN113254955A (en) Forward security connection keyword symmetric searchable encryption method, system and application
CN108460030B (en) Set element judgment method based on improved bloom filter
CN105446897A (en) High-speed cache Hashing
EP1990745B1 (en) Data object identifiers
CN104253754A (en) ACL (access control list) fast matching method and equipment
CN101635001B (en) Method and apparatus for extracting information from a database
CN112380004B (en) Memory management method, memory management device, computer readable storage medium and electronic equipment
CN106844529A (en) Data cached update method, device and system
CN102984071B (en) Method for organizing routing table of segment address route and method for checking route
CN105930104B (en) Date storage method and device
CN107294855B (en) A kind of TCP under high-performance calculation network searches optimization method
CN111465929A (en) Method and system for content-agnostic file indexing
CN111190545B (en) Method for carrying out LPM rule compression storage on trie structure based on software implementation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication