Integrity checking method in document transmission

A technology for integrity verification and file transfer, which is applied in the field of verification in file transfer, can solve the problems of affecting transmission speed, consuming large resources, network congestion, etc., to reduce bandwidth and resource occupancy, reduce equipment pressure, and ensure full effect

Inactive Publication Date: 2009-06-10
CHINA DIGITAL VIDEO BEIJING
View PDF5 Cites 60 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This integrity verification method can effectively prevent data loss (or damage), but when the amount of data in the transmitted file is large, especially when transferring media files, retransmitting the entire file will consume a lot of resources and greatly affect the transmission. speed, and even cause network congestion, therefore, there is an urgent need for an integrity verification method suitable for large-scale file transfers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integrity checking method in document transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] In the transmission process, under normal circumstances, the work that the server end of this embodiment (i.e. the data sending end) needs to do is as follows: read the content of the local physical file to the memory; use the specified integrity algorithm to calculate the data in the memory A message digest of the data; send the data and the data message digest to the network.

[0023] The client of this embodiment (ie, the data receiving end) needs to do the following work: accept data transmission from the network; use a specified integrity algorithm to verify the received data; write the verified data into a local physical file.

[0024] In this embodiment, the file first needs to be divided into blocks. For the size of each block of the file block, various elements of the network, summary, and hard disk should be considered at the same time. Generally speaking, the data size of the sub-file block is preferably an integer multiple of 256, and the data size of the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an integrality checking method during transmitting documents. The method comprises the following steps: carrying out block processing on the documents to be transmitted to obtain a plurality of sub document blocks; extracting a check code of each sub document block respectively, and transmitting all the sub document blocks and the check codes thereof to the receiving terminal; extracting the check code of each received sub document block at the receiving terminal; and comparing the check code of the extracted sub document block with the check code of the same received sub document block for each sub document block. When the two check codes are identical, the sub document block passes the check; and when the two check codes are not identical, the sub document block needs to be retransmitted. Compared with the prior art, the method has the advantages of retransmitting the damaged data at lower cost, reducing the bandwidth and resource occupancy rate for retransmitting a large data amount document, reducing equipment pressure of the network environment to the maximum extent and fully ensuring the integrality of the media documents.

Description

technical field [0001] The invention belongs to the field of computer networks, in particular, the invention relates to a verification method in file transmission. Background technique [0002] File transfer technology is an important part of computer network technology. Currently, common file transfer technologies include file copy, FTP file transfer protocol, TCP / IP transfer protocol, etc. During the file transfer process, data loss (or damage) sometimes occurs. To solve this problem, it is necessary to verify the integrity of the received file data. Common data integrity verification algorithms include: MD5 and SHA1. The SHA1 algorithm has higher requirements on network components such as routers. MD5 is a message digest algorithm invented by RSA, which has the advantages of fast and efficient. In addition, the application program developed by JAVA language can easily embed the MD5 algorithm. At present, the download resources provided by many foreign websites on the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L1/18G06F11/14
Inventor 赵祎孙伟王弋珵
Owner CHINA DIGITAL VIDEO BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products