A Data Integrity Merging System
A data integrity and integrity technology, applied in the Internet field, can solve problems such as inability to merge data, inability to deduplicate data, etc., to achieve the effect of improving integrity, improving analysis accuracy and reliability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] see figure 1 , a data integrity merging system, including a storage module, and also includes a merging module and an integrity evaluation module, the storage module uses the IP port quadruple as the KEY to store the traffic as the session focal point, and stores the original traffic and Combining flows are stored separately; the merging module first establishes the four-tuple flow table of UDP and TCP, and the data packets of the same session are merged in the same session by four-tuple and protocol identification, and the merging of all flows is simplified as Merge of a single session; then perform MD5 calculation on the whole packet, and use the MD5 value to judge the deduplication. If there is already a packet with the same MD5 in the session, it will be considered as a duplicate packet and discarded; if the packet is not a duplicate , are divided into UDP and TCP; the integrity assessment module estimates the integrity of the overall traffic by weighting the integr...
Embodiment 2
[0025] see figure 1 , a data integrity merging system, including a storage module, and also includes a merging module and an integrity evaluation module, the storage module uses the IP port quadruple as the KEY to store the traffic as the session focal point, and stores the original traffic and Combining flows are stored separately; the merging module first establishes the four-tuple flow table of UDP and TCP, and the data packets of the same session are merged in the same session by four-tuple and protocol identification, and the merging of all flows is simplified as Merge of a single session; then perform MD5 calculation on the whole packet, and use the MD5 value to judge the deduplication. If there is already a packet with the same MD5 in the session, it will be considered as a duplicate packet and discarded; if the packet is not a duplicate , are divided into UDP and TCP; the integrity assessment module estimates the integrity of the overall traffic by weighting the integr...
Embodiment 3
[0028] see figure 1 , a data integrity merging system, including a storage module, and also includes a merging module and an integrity evaluation module, the storage module uses the IP port quadruple as the KEY to store the traffic as the session focal point, and stores the original traffic and Combining flows are stored separately; the merging module first establishes the four-tuple flow table of UDP and TCP, and the data packets of the same session are merged in the same session by four-tuple and protocol identification, and the merging of all flows is simplified as Merge of a single session; then perform MD5 calculation on the whole packet, and use the MD5 value to judge the deduplication. If there is already a packet with the same MD5 in the session, it will be considered as a duplicate packet and discarded; if the packet is not a duplicate , are divided into UDP and TCP; the integrity assessment module estimates the integrity of the overall traffic by weighting the integr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com

