Verification method, device and system of transmitted data

A technology for transmitting data and verifying methods, which is applied in the computer field and can solve problems such as the inability to reduce the risk of file transmission errors

Active Publication Date: 2015-09-16
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a method, device and system for verifying transmission d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method, device and system of transmitted data
  • Verification method, device and system of transmitted data
  • Verification method, device and system of transmitted data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] Before describing further details of the various embodiments of the present application, reference will be made to figure 1 to describe one suitable computing architecture that can be used to implement the principles of the present application. In the following description, unless indicated otherwise, various embodiments of the present application are described with reference to acts and symbolic representations of operations that are performed by one or more computers. It will thus be appreciated that such acts and operations, which are sometimes referred to as computer-implemented, include the manipulation of electrical signals representing data in a structured form by the processing unit of a computer. This manipulation transforms the data or maintains it at a location in the computer's memory system, which reconfigures or changes the operation of the computer in a manner well understood by those skilled in the art. A data structure that maintains data is a physical...

Embodiment approach

[0042] First, the receiving client reads the currently received data segment and the storage space value corresponding to the currently received data segment.

[0043] Then, after creating a verification storage space according to the storage space value corresponding to the currently received data segment, save the currently received data segment to the verification storage space, and generate a received file corresponding to the currently received data segment.

[0044] Finally, a predetermined verification algorithm is used to perform verification processing on the received file, and a verification value corresponding to the currently received data segment is generated.

[0045] It can be seen from the above solution that in an optional embodiment provided by the present application, since the sending client will store the current data segment after saving the currently transmitted data segment among the n data segments in the preset storage space The storage space of the s...

Embodiment 2

[0048] According to an embodiment of the present invention, a method embodiment for implementing the above-mentioned system embodiment is also provided. It should be noted that the steps shown in the flow charts of the drawings can be implemented in a computer system such as a set of computer-executable instructions and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0049] figure 2 is a schematic flowchart of a method for verifying transmission data according to Embodiment 2 of the present invention.

[0050] Such as figure 2 As shown, the verification method of the transmitted data may include the following implementation steps:

[0051] Step S20, the sending client locally simulates a virtual receiving module. This step realizes the automatic creation of a virtual receiving module on the sending client to verify whether the local network connec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verification method, device and system of transmitted data. The method includes the following steps that: a transmitting client locally simulates a virtual receiving module; after a data block of a file to be transmitted is divided into n data segments, the data segments are sequentially transmitted to the virtual receiving module through a first transmission channel; when each data segment is transmitted, a corresponding check code can be generated, the check code corresponding to each data segment is transmitted to the virtual receiving module through a second transmission channel; the virtual receiving module verifies the data segments which are sequentially received, and forwards successfully-verified data segments through the first transmission channel, and forwards the check codes corresponding to the successfully-verified data segments through the second transmission channel. With the verification method, device and system of the transmitted data of the invention adopted, error risks of the transmitted file can be decreased.

Description

technical field [0001] The present invention relates to the field of computers, in particular to a method, device and system for verifying transmission data. Background technique [0002] The purpose of network communication is to transmit data information to the receiver in a safe and reliable manner. However, due to reasons such as transmission distance, transmission network status, transmission interference, and hacker interception, some unpredictable errors may occur in the transmission of data between device terminals. However, if errors in data transmission cannot be detected in time, data transmission will fail and network traffic will be wasted. [0003] In order to solve the above problems, in the existing technology, when the user transmits data to the external client through the sending client, the file to be transmitted can be verified before the sending client transmits the data, and after the transmission to the target client Perform post-transmission verifica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L1/00
Inventor 李丹华
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products