File verification method and a related device

A verification method and file technology, which is applied in the field of file verification, can solve the problems of occupying large hardware resources and wasting resources, and achieve the effects of improving efficiency, improving hardware performance, and reducing resource utilization

Pending Publication Date: 2019-03-19
SHENZHEN ONETHING TECH CO LTD
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a file verification method, a file verification device, a file verification system, a computer-readable storage medium, and a c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File verification method and a related device
  • File verification method and a related device
  • File verification method and a related device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] In a first embodiment, the method may include:

[0046] S10, the client sends a data request to the CDN network node according to the data extraction rule obtained from the source server, so that the CDN network node returns the target data corresponding to the data extraction rule;

[0047] In this step, the client first obtains the data extraction rules from the source server, receives the data extraction rules returned by the source server, and then sends data requests to the nodes of the CDN network and the index server according to the data extraction rules, so that the CDN network nodes can extract data according to the data extraction rules. The rule sends the target data to be extracted from the complete data to the client.

[0048]First, the application environment of this embodiment needs to be described, and this embodiment is mainly applied in a CDN (ContentDelivery Network) network. The process of downloading data before using the CDN network is that the s...

no. 3 example

[0082] In a third embodiment, the method may include:

[0083] S61. The client performs data extraction on the complete data according to the data extraction rules to obtain verification data;

[0084] The purpose of this step is to perform data extraction on the complete data according to the data extraction rules to obtain verification data. In this step, the complete data is extracted according to the different data extraction rules. The data extraction rule can be to extract the data from the first address to a certain length of the complete data. For example, extract the data from the first address to 3MB ( MByte storage unit) position data; it can also determine multiple addresses in the complete data, and extract the data from each address to a certain length; it can also divide the complete data into multiple data, and extract each data The data of the preset length in; wherein, the complete data can be equally divided or not, and the preset length of the extracted da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a file verification method, which comprises the following steps that: a client sends a data request to a CDN (Content Delivery Network) network node according to a data extraction rule obtained from a source server, so that the CDN network node returns target data corresponding to the data extraction rule; performing check value calculation on the target data to obtain a first check value; judging whether the first check value is the same as a second check value obtained from a source server or not; wherein the second check value is obtained by performing check value calculation on the source data corresponding to the target data by the source server according to the data extraction rule; and if yes, sending a complete data acquisition request to the CDN network node. The invention further discloses a file verification device, a file verification system, a computer readable storage medium and a computer program product. By verifying the target data, the calculation amount of verification calculation is reduced, the calculation efficiency is improved, and the hardware performance is improved.

Description

technical field [0001] The present invention relates to the technical field of file verification, in particular to a file verification method, a file verification device, a file verification system, a computer readable storage medium and a computer program product. Background technique [0002] At present, when a file needs to be verified, the MD5 value of the file is mainly calculated, and the MD5 value of the source file is compared with the MD5 value of the file to be verified, so as to verify the correctness of the file. However, some files currently have a large amount of data, and the calculation of the MD5 value will be very slow, which will affect the efficiency of file verification and reduce hardware performance. Moreover, when downloading source files from the CDN network for verification, it is possible that the data in the CDN network itself is wrong, which directly leads to the verification failure of the files downloaded to the client and re-obtaining the sour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/64H04L9/06
CPCG06F21/64H04L9/0643
Inventor 杜琛
Owner SHENZHEN ONETHING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products