Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Verifying method for network file transmission

A network file and verification method technology, applied in the field of computer networks, can solve the problems of not completely guaranteeing the correctness of file verification, consuming a lot of time and bandwidth resources, etc., to save bandwidth resources, improve reliability, and ensure complete accuracy. Effect

Inactive Publication Date: 2012-01-18
HANGZHOU MICORUNIT TECH
View PDF3 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After the terminal receives the block, even if it extracts the hash code of the block by itself and compares it with the transmission, it determines that the block is received correctly, but it is actually fake data, so only the hash code verification of the file block cannot fully guarantee the correctness of the file verification
Also, if the hash calculation of the entire file is performed after the file transfer is completed, if the file data volume is extremely large, the hash calculation itself will consume a lot of time and bandwidth resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verifying method for network file transmission
  • Verifying method for network file transmission
  • Verifying method for network file transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The details of the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0021] figure 1 Server and terminal download structure diagram.

[0022] The server is the resource allocation center and acts as a link in the entire network file transfer. The server is also a large database, which records all terminal node information, including terminal IP address, terminal serial number, terminal path, secondary verification hash code of all file blocks, etc., and establishes a terminal node information table, which can be accessed and queried at any time.

[0023] When a file is uploaded legally and correctly for the first time, the server records the file ID, file size, file block size, file block hash code, file block secondary check hash code and other file information when the file is uploaded. In particular, the file block secondary verification hash code is the value obtained by re-hash calculati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verifying method for network file transmission. File block transmission data and block hash codes are adopted in the method. The method comprises the following steps of: after block transmission finishes, extracting the block hash codes and comparing the extracted block hash codes with the value acquired by transmission, if an error happens, retransmitting the value from another data source, otherwise, preserving the block data and the block hash codes in a file; after the file is transmitted, acquiring secondary verification hash codes of file blocks from a server, performing secondary verification hash code extraction on the file preserving the block hash codes, comparing, if different, newly requesting the server for the addresses of other file servers, and retransmitting; and repeating the processes till the secondary verification hash codes of the file blocks are compared successfully. Compared with the prior art, the method has the advantages that: besides hash code verification of the file blocks, secondary verification of the hash codes of the file blocks is performed, so that the complete accuracy of file verification is ensured and the reliability of file transmission is improved. The secondary verified hash codes of the file blocks are acquired by secondary hash calculation of the hash codes of the file blocks, the number of the file blocks is limited, and the advantage is obvious compared with massive time consumption in hash calculation of the whole file. When the secondary verified hash codes of the file blocks are different, error file blocks of the file can be quickly found by using the block hash codes; and compared with a mode of directly downloading the file blocks, massive broadband resources are saved.

Description

technical field [0001] The invention belongs to the field of computer networks, in particular to a verification method for network file transmission. Background technique [0002] Modern network is an indispensable part of life and work. People add high-definition and high-quality multimedia enjoyment, so high-definition multimedia files are the future development trend, but the data volume of high-definition multimedia files is huge, and the file data volume may be several gigabytes. to a dozen G. The transmission efficiency, stability and reliability of the network transmission of such large data files need to be solved urgently. [0003] Existing network files are usually transmitted in blocks, and only by comparing the hash codes of the file blocks can it be judged whether the currently downloaded file blocks are correct. During file transfers, sometimes there is some malicious data, the wrong block content is sent, and a hash code is generated for that content. After...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06H04L29/12
Inventor 刘亮潘红民王可心
Owner HANGZHOU MICORUNIT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products