17972039. RESOLVING DEDUPLICATION MATCHES WHEN USING NON-CRYPTOGRAPHIC HASH simplified abstract (Dell Products L.P.)

From WikiPatents
Revision as of 05:28, 26 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

RESOLVING DEDUPLICATION MATCHES WHEN USING NON-CRYPTOGRAPHIC HASH

Organization Name

Dell Products L.P.

Inventor(s)

Alexander Shknevsky of Fair Lawn NJ (US)

Uri Shabi of Tel Mond (IL)

Aleksey Kabishcher of Marlborough MA (US)

RESOLVING DEDUPLICATION MATCHES WHEN USING NON-CRYPTOGRAPHIC HASH - A simplified explanation of the abstract

This abstract first appeared for US patent application 17972039 titled 'RESOLVING DEDUPLICATION MATCHES WHEN USING NON-CRYPTOGRAPHIC HASH

Simplified Explanation

The technique described in the abstract of the patent application involves managing deduplication using a non-cryptographic hash function. It includes obtaining metadata for a candidate block and a target block, checking for a mismatch based on the metadata, and abandoning deduplication if a mismatch is found.

  • Obtaining metadata for candidate and target blocks
  • Checking for a mismatch based on the obtained metadata
  • Abandoning deduplication if a mismatch is detected

Potential Applications

This technology could be applied in data storage systems, backup solutions, and cloud computing platforms to efficiently manage duplicate data and optimize storage space.

Problems Solved

1. Efficient management of duplicate data 2. Optimization of storage space 3. Streamlining data deduplication processes

Benefits

1. Improved storage efficiency 2. Reduced storage costs 3. Enhanced data management capabilities

Potential Commercial Applications

Optimizing data storage solutions for businesses Improving backup and recovery processes Enhancing data deduplication services

Possible Prior Art

One possible prior art could be the use of cryptographic hash functions for data deduplication processes in storage systems.

What are the potential security implications of using a non-cryptographic hash function for deduplication?

Using a non-cryptographic hash function may raise concerns about the security of the deduplication process, as cryptographic hash functions are specifically designed to provide secure hashing. It is important to evaluate the potential vulnerabilities and risks associated with using a non-cryptographic hash function in deduplication systems.

How does this technique compare to existing methods of managing deduplication in terms of efficiency and performance?

This technique may offer advantages in terms of efficiency and performance compared to existing methods by utilizing a non-cryptographic hash function for deduplication. However, a detailed comparison with existing methods would be necessary to determine the specific benefits and limitations of this approach.


Original Abstract Submitted

A technique for managing deduplication using a non-cryptographic hash function includes obtaining metadata associated with both a candidate block presented for deduplication and a target block having a hash-based match to the candidate block. The technique further includes checking for a mismatch between the candidate block and the target block based on the obtained metadata. In response to the checking determining a mismatch, the technique further includes abandoning deduplication of the candidate block, such that the candidate block is stored independently of the target block.