CN102325167A - Verifying method for network file transmission - Google Patents
Verifying method for network file transmission Download PDFInfo
- Publication number
- CN102325167A CN102325167A CN201110205282A CN201110205282A CN102325167A CN 102325167 A CN102325167 A CN 102325167A CN 201110205282 A CN201110205282 A CN 201110205282A CN 201110205282 A CN201110205282 A CN 201110205282A CN 102325167 A CN102325167 A CN 102325167A
- Authority
- CN
- China
- Prior art keywords
- file
- hash codes
- piece
- blocks
- files
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Information Transfer Between Computers (AREA)
Abstract
The invention provides a verifying method for network file transmission. File block transmission data and block hash codes are adopted in the method. The method comprises the following steps of: after block transmission finishes, extracting the block hash codes and comparing the extracted block hash codes with the value acquired by transmission, if an error happens, retransmitting the value from another data source, otherwise, preserving the block data and the block hash codes in a file; after the file is transmitted, acquiring secondary verification hash codes of file blocks from a server, performing secondary verification hash code extraction on the file preserving the block hash codes, comparing, if different, newly requesting the server for the addresses of other file servers, and retransmitting; and repeating the processes till the secondary verification hash codes of the file blocks are compared successfully. Compared with the prior art, the method has the advantages that: besides hash code verification of the file blocks, secondary verification of the hash codes of the file blocks is performed, so that the complete accuracy of file verification is ensured and the reliability of file transmission is improved. The secondary verified hash codes of the file blocks are acquired by secondary hash calculation of the hash codes of the file blocks, the number of the file blocks is limited, and the advantage is obvious compared with massive time consumption in hash calculation of the whole file. When the secondary verified hash codes of the file blocks are different, error file blocks of the file can be quickly found by using the block hash codes; and compared with a mode of directly downloading the file blocks, massive broadband resources are saved.
Description
Technical field
The invention belongs to computer network field, a kind of specifically method of calibration of network file transmission.
Background technology
Modern network is a part indispensable in the live and work; People append the high-quality multimedia of high definition and enjoy; The high-definition multimedia file is later development trend so, but the data volume of high-definition multimedia file is very big, and the file data amount maybe several G to tens G.The efficiency of transmission of the Network Transmission of this large-data documents, reliability just need urgent the solution.
The existing network file carries out the piecemeal transmission usually, only through the hash codes of documents piece, judges whether current downloaded files piece is correct.In document transmission process, there is some malicious data sometimes, send wrong piece content, and be directed against the hash codes that this content generates.The terminal is after receiving this piece, even extract the hash codes of piece and the contrast that transmission obtains voluntarily, decision block receives correct, and actual is pseudo-data, so have only the verification of blocks of files hash codes can not guarantee fully that file verification is correct.If also have the hash calculation of carrying out whole file after file transfer finishes by the time again, if the great situation of file data amount, then hash calculation itself just needs the time and the bandwidth resources of labor.For overcoming the problems referred to above, the present invention proposes a kind of method of network file transfer check.
Summary of the invention
A kind of method of calibration of network file transmission comprises the steps:
1) original document is uploaded onto the server, and server carries out piecemeal to file to be handled, and the size of definite piece, piece hash codes, piece number and piece secondary verification hash codes;
2) terminal downloads file carries out the demand file piece to server, and server carries out the Downloadable address of inquiry file piece, and to the return address, terminal, this document piece and piece hash codes are downloaded according to this address in the terminal;
3) carry out hash calculation after the terminal downloads blocks of files voluntarily, compare with file in download piece hash codes, if identical, the verification of judgement blocks of files is passed through; Otherwise, file block error, this document piece is asked at the terminal again, repeats 2) step, till the blocks of files verification is passed through;
4) the blocks of files verification is passed through, and terminal preservation blocks of files and piece hash codes are in file;
5) according to 2) to 4) steps request blocks of files and piece hash codes, all download completion up to blocks of files;
6) terminal request file in download piece secondary verification hash codes, server backspace file piece secondary verification hash codes is carried out secondary verification hash calculation with the blocks of files hash codes that the terminal is preserved, and compares both, if identical, end of file transfer; Otherwise, judge in the blocks of files to have erroneous block, need find out the erroneous block in the blocks of files;
7) terminal asks to download the blocks of files hash codes from first BOB(beginning of block) again, and the piece hash codes of preserving with terminal document compares, if identical, judges that this document blocks of data is correct, carries out next blocks of files inquiry, to the last a block file piece; If inequality, judge this document piece mistake, then ask the blocks of files of this address to be downloaded, and this document piece and hash codes in the overlay file;
8) find the wrong file piece after, carry out blocks of files secondary verification hash codes again relatively, till identical, file transfer is accomplished also and is finished.
In the technique scheme, described hash codes is the file verification sign indicating number, adopts hash algorithm to obtain.
In the technique scheme, the blocks of files secondary verification hash codes that described server end obtains is that the hash calculation once more that original document piece hash codes is carried out obtains, and is unique effective value of network file transfer check.
In the technique scheme, in the described step 3), during the demand file piece, prevent repeated downloads wrong file piece again, server returns other addresses, and is different with address before.
In the technique scheme; In the described step 7); Terminal request blocks of files hash codes, server returns a plurality of addresses, and is different with address in the step 3); The terminal is downloaded the piece hash codes from a plurality of addresses respectively and is compared, and gets the final piece Hash code value that maximum this server of conduct of return value same ratio is obtained.
Compared with prior art,, also carried out the secondary verification of blocks of files hash codes, guaranteed the total correctness of file verification, improved the reliability of file transfer except carrying out the verification of blocks of files hash codes.Blocks of files secondary verification hash codes of the present invention be to utilize the hash calculation once more of blocks of files hash codes to obtain, the blocks of files limited amount, the hash calculation that contrasts whole file needs the time and the bandwidth resources of labor, and is with the obvious advantage.When blocks of files secondary verification hash codes is inequality, utilize the piece hash codes, can find out file fast and have the wrong file piece, with the mode comparison of direct file in download piece, saved a large amount of bandwidth resources.The present invention is specially adapted to data volume file transfer greatly, like the high-definition multimedia file transfer.
Description of drawings
Fig. 1 server and terminal downloads structure chart.
Fig. 2 is file complete transmission checking process figure.
Embodiment
Below in conjunction with accompanying drawing and specific embodiment, each details of the present invention is described in detail.
Fig. 1 server and terminal downloads structure chart.
Server is the resource allocation center, in whole network file transmission, plays tie.Server also is large-scale database, writes down all terminal node information, comprises IP address of terminal, terminal serial number, end path, All Files piece secondary verification hash codes etc., sets up the terminal node information table, can visit at any time and inquire about.
File carries out legal correct data for the first time to be uploaded, server record fileinfo such as the file ID of this document when uploading, file size, blocks of files size, blocks of files hash codes, blocks of files secondary verification hash codes.Especially blocks of files secondary verification hash codes is to carry out once more the value that hash calculation obtains by the All Files piece hash codes of this document, is unique effective value that file is downloaded the verification that finishes.File ID and blocks of files secondary verification hash codes are one to one, and this information of server record can not changed.
The terminal is exactly a node in whole network, and work such as upload file, file in download are carried out at all terminals under the scheduling of server.The demanding terminal file in download is at first to server end request file in download piece.Server returns the uploading nodes address, terminal that this document piece exists through the inquiry terminal informational table of nodes, and this document piece and piece hash codes are downloaded from this uploading nodes address in the terminal.
As shown in Figure 2, the said method of the embodiment of the invention specifically may further comprise the steps:
Hash calculation is carried out voluntarily with the blocks of files that download obtains in step 102, terminal, obtains the piece hash codes, again with server obtain the piece hash codes compare, if inequality, then ask this document piece and piece hash codes again.
If step 103 is above-mentioned more identical, think that then verification passes through, data are correct, and blocks of files and piece hash codes are saved in the file.
Step 104, that whether the inquiry file piece is all downloaded is complete, does not accomplish if all download, and carries out next blocks of files and the request of piece hash codes, promptly returns step 101.
If step 105 blocks of files all download to be accomplished, the terminal carries out voluntarily to all piece hash codes of file that hash calculation obtains blocks of files secondary verification hash codes, and to server requests and download the secondary verification hash codes that obtains this document.The blocks of files secondary verification hash codes that obtains from server is that the hash calculation once more that original document piece hash codes is carried out obtains, and is unique effective value of network file complete checks.
At first ask from first (K=0) hash codes of file at the terminal, and server end returns and different before a plurality of uploading nodes addresses, and piece Hash agate is downloaded at the terminal respectively from a plurality of addresses; And these values are compared; Get the final piece Hash agate value that maximum this server of conduct of return value same ratio is obtained, the piece hash codes with the terminal document preservation compares again, if identical; Then carry out the hash codes request of next piece (K+1), to the last till the block file piece; If different, think that then this document blocks of data is wrong, so blocks of files and hash codes to this new uploading nodes demand file blocks of data, are downloaded and preserved in request with the piece hash codes of preserving in the file.
After if the blocks of files error in data has been searched and has been revised, carry out blocks of files secondary verification hash codes once more and compare, if inequality, circulation step 106 is checked success until blocks of files secondary verification hash codes, the expression terminal document is downloaded and is accomplished.
Step 107, terminal document are downloaded and are accomplished, and the verification of expression file transfer finishes.
Should be noted that the foregoing description at last just to explanation of the present invention, rather than limitation of the present invention, any innovation and creation that do not exceed in the connotation scope of the present invention all fall within protection scope of the present invention.
Claims (5)
1. the method for calibration of a network file transmission comprises the steps:
1) original document is uploaded onto the server, and server carries out piecemeal to file to be handled, and the size of definite piece, piece hash codes, piece number and piece secondary verification hash codes;
2) terminal downloads file carries out the demand file piece to server, and server carries out the Downloadable address of inquiry file piece, and to the return address, terminal, this document piece and piece hash codes are downloaded according to this address in the terminal;
3) carry out hash calculation after the terminal downloads blocks of files voluntarily, compare with file in download piece hash codes, if identical, the verification of judgement blocks of files is passed through; Otherwise, file block error, this document piece is asked at the terminal again, repeats 2) step, till the blocks of files verification is passed through;
4) the blocks of files verification is passed through, and terminal preservation blocks of files and piece hash codes are in file;
5) according to 2) to 4) steps request blocks of files and piece hash codes, all download completion up to blocks of files;
6) terminal request file in download piece secondary verification hash codes, server backspace file piece secondary verification hash codes is carried out secondary verification hash calculation with the blocks of files hash codes that the terminal is preserved, and compares both, if identical, end of file transfer; Otherwise, judge in the blocks of files to have erroneous block, need find out the erroneous block in the blocks of files;
7) terminal asks to download the blocks of files hash codes from first BOB(beginning of block) again, and the piece hash codes of preserving with terminal document compares, if identical, judges that this document blocks of data is correct, carries out next blocks of files inquiry, to the last a block file piece; If inequality, judge this document piece mistake, then ask the blocks of files of this address to be downloaded, and this document piece and hash codes in the overlay file;
8) find the wrong file piece after, carry out blocks of files secondary verification hash codes again relatively, till identical, file transfer is accomplished also and is finished.
2. according to the method for calibration of the described network file transmission of claim 1, it is characterized in that described hash codes is the file verification sign indicating number, adopt hash algorithm to obtain.
3. the method for calibration of transmitting according to the described network file of claim 1; It is characterized in that; The blocks of files secondary verification hash codes that described server end obtains is that the hash calculation once more that original document piece hash codes is carried out obtains, and is unique effective value of network file transfer check.
4. according to the method for calibration of the described network file of claim 1 transmission, it is characterized in that in the said step 3), during the demand file piece, prevent repeated downloads wrong file piece again, server returns other addresses, and is different with address before.
5. the method for calibration of transmitting according to the described network file of claim 1; It is characterized in that, in the said step 7), terminal request blocks of files hash codes; Server returns a plurality of addresses; Different with address in the step 3), the terminal is downloaded the piece hash codes from a plurality of addresses respectively and is compared, and gets the final piece Hash code value that maximum this server of conduct of return value same ratio is obtained.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110205282A CN102325167A (en) | 2011-07-21 | 2011-07-21 | Verifying method for network file transmission |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110205282A CN102325167A (en) | 2011-07-21 | 2011-07-21 | Verifying method for network file transmission |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102325167A true CN102325167A (en) | 2012-01-18 |
Family
ID=45452836
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110205282A Pending CN102325167A (en) | 2011-07-21 | 2011-07-21 | Verifying method for network file transmission |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102325167A (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102745606A (en) * | 2012-07-12 | 2012-10-24 | 中联重科股份有限公司 | Control equipment, method and system for super lifting device and engineering machinery |
CN103458029A (en) * | 2013-09-02 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Method, system and device for accelerating downloading through browser |
CN103457724A (en) * | 2012-06-05 | 2013-12-18 | 中兴通讯股份有限公司 | Method and system for point-to-point data safe transmission |
CN103561056A (en) * | 2013-10-12 | 2014-02-05 | 北京奇虎科技有限公司 | Document transmission method, device and system |
CN103874047A (en) * | 2012-12-17 | 2014-06-18 | 华为终端有限公司 | Service information finding method and equipment |
CN103873504A (en) * | 2012-12-12 | 2014-06-18 | 鸿富锦精密工业(深圳)有限公司 | System enabling data blocks to be stored in distributed server and method thereof |
CN103873438A (en) * | 2012-12-12 | 2014-06-18 | 鸿富锦精密工业(深圳)有限公司 | Compression packet uploading and duplication-removing system and method |
CN103973421A (en) * | 2013-02-06 | 2014-08-06 | 腾讯科技(深圳)有限公司 | File transmitting method and device |
CN104283933A (en) * | 2013-07-12 | 2015-01-14 | 腾讯科技(深圳)有限公司 | Data downloading method, client-side and system |
CN105117489A (en) * | 2015-09-21 | 2015-12-02 | 北京金山安全软件有限公司 | Database management method and device and electronic equipment |
CN105227680A (en) * | 2015-10-26 | 2016-01-06 | 广东佳学信息科技有限公司 | A kind of smart machine file download Validity control method |
CN107085692A (en) * | 2017-03-31 | 2017-08-22 | 武汉斗鱼网络科技有限公司 | A kind of method and device for being safely loaded with Flash file |
CN107122661A (en) * | 2017-03-31 | 2017-09-01 | 武汉斗鱼网络科技有限公司 | A kind of method and device for being safely loaded with Flash file |
CN108093007A (en) * | 2016-11-23 | 2018-05-29 | 卓望数码技术(深圳)有限公司 | The method and system of a kind of Fast synchronization data under low-bandwidth network |
CN108573007A (en) * | 2017-06-08 | 2018-09-25 | 北京金山云网络技术有限公司 | Method, apparatus, electronic equipment and the storage medium of data consistency detection |
CN109245927A (en) * | 2018-09-06 | 2019-01-18 | 郑州云海信息技术有限公司 | Warning system and method in cloud data system |
US10278055B2 (en) | 2013-03-28 | 2019-04-30 | Futurewei Technologies, Inc. | System and method for pre-association discovery |
CN110377454A (en) * | 2019-06-17 | 2019-10-25 | 中国平安人寿保险股份有限公司 | Data verification method, device, computer equipment and storage medium |
CN110502870A (en) * | 2018-05-18 | 2019-11-26 | 北京果仁宝软件技术有限责任公司 | Works management method, device and equipment based on block chain |
CN110769030A (en) * | 2019-09-12 | 2020-02-07 | 上海艾拉比智能科技有限公司 | Method, terminal, server and storage medium for downloading file |
CN112131609A (en) * | 2020-08-27 | 2020-12-25 | 国网湖北省电力有限公司电力科学研究院 | Merkle tree-based electric energy quality data exchange format file integrity verification method and system |
CN112286877A (en) * | 2020-11-05 | 2021-01-29 | 珠海格力电器股份有限公司 | File detection method and device, electronic equipment and storage medium |
CN113448275A (en) * | 2021-07-30 | 2021-09-28 | 重庆市农业科学院 | Embedded control greenhouse control system |
CN117134981A (en) * | 2023-09-07 | 2023-11-28 | 中南大学湘雅二医院 | AI learning-based physical operation surface wound pressure data processing method and system |
CN117979118A (en) * | 2024-03-29 | 2024-05-03 | 杭州海康威视数字技术股份有限公司 | Data stream recording method, device, recorder and recording system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079709A (en) * | 2006-06-15 | 2007-11-28 | 腾讯科技(深圳)有限公司 | Single-node-to-multi-node concurrent download system and method |
CN101547184A (en) * | 2008-03-24 | 2009-09-30 | 突触计算机系统(上海)有限公司 | Method and device for authenticating data block transmitted in network |
WO2011062387A2 (en) * | 2009-11-23 | 2011-05-26 | (주)피스페이스 | Device and method for eliminating file duplication in a distributed storage system |
-
2011
- 2011-07-21 CN CN201110205282A patent/CN102325167A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101079709A (en) * | 2006-06-15 | 2007-11-28 | 腾讯科技(深圳)有限公司 | Single-node-to-multi-node concurrent download system and method |
CN101547184A (en) * | 2008-03-24 | 2009-09-30 | 突触计算机系统(上海)有限公司 | Method and device for authenticating data block transmitted in network |
WO2011062387A2 (en) * | 2009-11-23 | 2011-05-26 | (주)피스페이스 | Device and method for eliminating file duplication in a distributed storage system |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103457724A (en) * | 2012-06-05 | 2013-12-18 | 中兴通讯股份有限公司 | Method and system for point-to-point data safe transmission |
CN103457724B (en) * | 2012-06-05 | 2017-02-08 | 中兴通讯股份有限公司 | Method and system for point-to-point data safe transmission |
CN102745606B (en) * | 2012-07-12 | 2014-12-24 | 中联重科股份有限公司 | Control equipment, method and system for super lifting device and engineering machinery |
CN102745606A (en) * | 2012-07-12 | 2012-10-24 | 中联重科股份有限公司 | Control equipment, method and system for super lifting device and engineering machinery |
CN103873504A (en) * | 2012-12-12 | 2014-06-18 | 鸿富锦精密工业(深圳)有限公司 | System enabling data blocks to be stored in distributed server and method thereof |
CN103873438A (en) * | 2012-12-12 | 2014-06-18 | 鸿富锦精密工业(深圳)有限公司 | Compression packet uploading and duplication-removing system and method |
CN103874047B (en) * | 2012-12-17 | 2017-08-04 | 华为终端有限公司 | Information on services finds method and apparatus |
CN103874047A (en) * | 2012-12-17 | 2014-06-18 | 华为终端有限公司 | Service information finding method and equipment |
US9892124B2 (en) | 2013-02-06 | 2018-02-13 | Tencent Technology (Shenzhen) Company Limited | Method and device for transferring file |
CN103973421A (en) * | 2013-02-06 | 2014-08-06 | 腾讯科技(深圳)有限公司 | File transmitting method and device |
US10278055B2 (en) | 2013-03-28 | 2019-04-30 | Futurewei Technologies, Inc. | System and method for pre-association discovery |
CN104283933A (en) * | 2013-07-12 | 2015-01-14 | 腾讯科技(深圳)有限公司 | Data downloading method, client-side and system |
CN104283933B (en) * | 2013-07-12 | 2018-11-23 | 腾讯科技(深圳)有限公司 | Method, client and the system of downloading data |
CN103458029A (en) * | 2013-09-02 | 2013-12-18 | 百度在线网络技术(北京)有限公司 | Method, system and device for accelerating downloading through browser |
CN103561056A (en) * | 2013-10-12 | 2014-02-05 | 北京奇虎科技有限公司 | Document transmission method, device and system |
CN105117489B (en) * | 2015-09-21 | 2018-10-19 | 北京金山安全软件有限公司 | Database management method and device and electronic equipment |
CN105117489A (en) * | 2015-09-21 | 2015-12-02 | 北京金山安全软件有限公司 | Database management method and device and electronic equipment |
CN105227680A (en) * | 2015-10-26 | 2016-01-06 | 广东佳学信息科技有限公司 | A kind of smart machine file download Validity control method |
CN108093007A (en) * | 2016-11-23 | 2018-05-29 | 卓望数码技术(深圳)有限公司 | The method and system of a kind of Fast synchronization data under low-bandwidth network |
CN107122661A (en) * | 2017-03-31 | 2017-09-01 | 武汉斗鱼网络科技有限公司 | A kind of method and device for being safely loaded with Flash file |
CN107085692A (en) * | 2017-03-31 | 2017-08-22 | 武汉斗鱼网络科技有限公司 | A kind of method and device for being safely loaded with Flash file |
CN107122661B (en) * | 2017-03-31 | 2019-10-25 | 武汉斗鱼网络科技有限公司 | A kind of method and device being safely loaded with Flash file |
CN107085692B (en) * | 2017-03-31 | 2019-10-25 | 武汉斗鱼网络科技有限公司 | A kind of method and device being safely loaded with Flash file |
CN108573007A (en) * | 2017-06-08 | 2018-09-25 | 北京金山云网络技术有限公司 | Method, apparatus, electronic equipment and the storage medium of data consistency detection |
CN110502870A (en) * | 2018-05-18 | 2019-11-26 | 北京果仁宝软件技术有限责任公司 | Works management method, device and equipment based on block chain |
CN109245927A (en) * | 2018-09-06 | 2019-01-18 | 郑州云海信息技术有限公司 | Warning system and method in cloud data system |
CN110377454A (en) * | 2019-06-17 | 2019-10-25 | 中国平安人寿保险股份有限公司 | Data verification method, device, computer equipment and storage medium |
CN110769030A (en) * | 2019-09-12 | 2020-02-07 | 上海艾拉比智能科技有限公司 | Method, terminal, server and storage medium for downloading file |
CN112131609A (en) * | 2020-08-27 | 2020-12-25 | 国网湖北省电力有限公司电力科学研究院 | Merkle tree-based electric energy quality data exchange format file integrity verification method and system |
CN112286877A (en) * | 2020-11-05 | 2021-01-29 | 珠海格力电器股份有限公司 | File detection method and device, electronic equipment and storage medium |
CN113448275A (en) * | 2021-07-30 | 2021-09-28 | 重庆市农业科学院 | Embedded control greenhouse control system |
CN113448275B (en) * | 2021-07-30 | 2023-05-05 | 重庆市农业科学院 | Greenhouse control system with embedded control |
CN117134981A (en) * | 2023-09-07 | 2023-11-28 | 中南大学湘雅二医院 | AI learning-based physical operation surface wound pressure data processing method and system |
CN117134981B (en) * | 2023-09-07 | 2024-05-14 | 中南大学湘雅二医院 | AI learning-based physical operation surface wound pressure data processing method and system |
CN117979118A (en) * | 2024-03-29 | 2024-05-03 | 杭州海康威视数字技术股份有限公司 | Data stream recording method, device, recorder and recording system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102325167A (en) | Verifying method for network file transmission | |
CN110995513B (en) | Data sending and receiving method in Internet of things system, internet of things equipment and platform | |
RU2613531C2 (en) | File sharing method, terminal and relay server | |
CN104468843A (en) | File uploading method and device | |
CN105554133A (en) | HTTP remote data access system and method | |
CN105786998A (en) | Database middleware system and method for processing data through database middleware system | |
CN102687472B (en) | Processing devices and methods for transmitting and receiving data | |
CN103259797B (en) | data file transmission method and platform | |
CN113157651B (en) | Method, system, equipment and medium for renaming resource files of android project in batches | |
CN112131609A (en) | Merkle tree-based electric energy quality data exchange format file integrity verification method and system | |
CN104243610A (en) | Distributed file transmission service method | |
US9084131B2 (en) | Data cut-over method and apparatus | |
CN112803950A (en) | Data compression method, device and equipment and computer storage medium | |
CN117687716A (en) | Method and system for uniformly acquiring kong plug-in business parameters based on lua development | |
CN104348815A (en) | Method and device for verifying verification code | |
CN106446138B (en) | Data packet storage method and device | |
CN110807000B (en) | File repair method and device, electronic equipment and storage medium | |
CN103929763A (en) | Method for comparison and reconstruction of geographic redundancy database | |
CN110895583B (en) | Method, device and system for acquiring data resources | |
US10447807B1 (en) | Dynamic middleware source selection for optimizing data retrieval from network nodes | |
CN104994074B (en) | A kind of implementation method of the health examination machine communication server | |
CN116955355A (en) | Block data processing method and device and electronic equipment | |
CN112016134B (en) | Method and device for verifying file integrity | |
CN106341480B (en) | Data packet uploading method and device | |
CN102263791A (en) | Method and system for checking resource files |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Xihu District Yi Lok Road Hangzhou city Zhejiang province 310012 No. 223 Yinjiang Technology Industrial Park B Building 5 floor Applicant after: Weiyuan Science-Technology Co., Ltd., Hanghzou Address before: 310012 13-D/E building A, Paradise Software Park, 3 West Road, Hangzhou, Zhejiang, Xihu District Applicant before: Weiyuan Science-Technology Co., Ltd., Hanghzou |
|
COR | Change of bibliographic data | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20161214 |
|
C20 | Patent right or utility model deemed to be abandoned or is abandoned |