首页>
外国专利>
Data integrity securing method for e.g. peer-to-peer communication network, involves computing hash values of data packets, and detecting data integrity breach when hash values and additional data packet hash values are not equal
Data integrity securing method for e.g. peer-to-peer communication network, involves computing hash values of data packets, and detecting data integrity breach when hash values and additional data packet hash values are not equal
The method involves detecting data integrity breach of data blocks, when hash values are not equal. Permuted, repermuted and/or encrypted data is repermuted, permuted and/or decrypted by an integrity testing unit (1.1P). Sequence of the permutation, repermutation and/or encryption is same as or inverse of sequence of the integrity testing unit. A set of hash values of data packets are computed by the integrity testing unit. The breach is detected when the set of hash values and additional data packet hash values are not equal.
展开▼