File integrity verification method and file processor

An integrity verification and file processing technology, applied in the field of communication, can solve the problems of inapplicability and time-consuming, and achieve the effect of shortening the detection process, the time of file check value extraction and file integrity verification

Active Publication Date: 2014-01-01
HUAWEI TECH CO LTD
View PDF8 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This obviously takes a long time, especially for files with a large amount of data, such as 10GB, it may not be suitable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File integrity verification method and file processor
  • File integrity verification method and file processor
  • File integrity verification method and file processor

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] figure 1 A flowchart showing a file integrity verification method according to an embodiment of the present invention. Such as figure 1 As shown, the file integrity verification method may mainly include the following steps:

[0060] Step S100, dividing the file into at least two data blocks according to a predetermined block strategy; and

[0061] Step S110, verify the integrity of the data block based on the check value file of the file, wherein the check value file includes the respective check values ​​of the at least two data blocks, if any of the data blocks determined to be incomplete, the document is determined to be incomplete and the verification is stopped.

[0062] Specifically, when a file is received, usually a check value file distributed with the file is also received, and the check value file is mainly used to verify the integrity of the file. In a possible implementation manner, the verification value file of the file can be generated by the foll...

Embodiment 2

[0067] figure 2 A flowchart showing a file integrity verification method according to another embodiment of the present invention. figure 2 Winning mark and figure 1 Steps with the same numbers have the same functions, and for the sake of brevity, detailed descriptions of these steps are omitted.

[0068] Such as figure 2 as shown, figure 2 The file integrity verification method shown is the same as figure 1 The main difference between the shown file integrity verification methods is that the above step S110 may specifically include the following steps:

[0069] Step S1101, calculating the check value of the data block;

[0070] Step S1102, comparing the calculated check value of the data block with the check value of the data block in the check value file; and

[0071] Step S1103, if the result of the above comparison is the same, it is determined that the data block is complete, otherwise it is determined that the data block is incomplete.

[0072] Specifically,...

Embodiment 3

[0077] image 3 A flowchart showing a file integrity verification method according to another embodiment of the present invention. image 3 Winning mark and figure 1 , figure 2 The same steps have the same functions, and detailed descriptions of these steps are omitted for brevity.

[0078] The main difference between this embodiment of the present invention and the previous embodiment is that the check value file is a Bloom vector library, and the Bloom vector library includes the Bloom vectors of each of the data blocks, and the distribution of each of the data blocks The Bloom vector is obtained by passing the check value of each data block through a Bloom filter when the check value file is generated.

[0079] Specifically, such as Figure 4 As shown, after the file is divided into data blocks, in a possible implementation manner, each data block obtained after the division may be evenly distributed to different threads. Each thread directly generates the verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a file integrity verification method and a file processor. The file integrity verification method includes the steps that a file is segmented into at least two data blocks according to a preset blocking strategy; the integrity of the data blocks is verified based on a verification value file of the file, wherein the verification value file comprises respective verification values of the at least two data blocks, and if any data block is identified as not integral, the file is judged as not integral, and verification is stopped. By the adoption of the file integrity verification method and the file processor, time for extracting the verification value of the file and verifying the integrity of the file can be shortened, and inherent falsification characteristic of a file integrity verification method in the prior art is avoided.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a file integrity verification method and a file processor. Background technique [0002] Since files may be damaged during storage and transmission, file integrity verification is required. Usually, file integrity verification is mainly divided into two stages: verification value file generation and integrity detection. For example, in the verification value file generation stage, first cut the file into multiple data blocks, and then use multiple threads to execute HASH (hash) algorithms on the data blocks in parallel, such as MD5 (Message Digest Algorithm MD5, the fifth edition of the message digest algorithm) ) algorithm to obtain the check value of each data block respectively, and obtain the check value of the entire file by adding the check value of each data block, and save the check value of the entire file in the checksum file. In the stage of integrity detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F9/44G06F17/30
CPCG06F21/64
Inventor 王显雷
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products