WO1999067912A1 - Error detection in compressed data transmission - Google Patents

Error detection in compressed data transmission Download PDF

Info

Publication number
WO1999067912A1
WO1999067912A1 PCT/US1999/012319 US9912319W WO9967912A1 WO 1999067912 A1 WO1999067912 A1 WO 1999067912A1 US 9912319 W US9912319 W US 9912319W WO 9967912 A1 WO9967912 A1 WO 9967912A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data stream
block
code
set forth
Prior art date
Application number
PCT/US1999/012319
Other languages
French (fr)
Inventor
Kenneth Lindsay York
Original Assignee
Unisys Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Unisys Corporation filed Critical Unisys Corporation
Publication of WO1999067912A1 publication Critical patent/WO1999067912A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/004Arrangements for detecting or preventing errors in the information received by using forward error control
    • H04L1/0056Systems characterized by the type of code used
    • H04L1/0061Error detection codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems

Definitions

  • the present invention relates to a system and method for checking the integrity of data files transferred at high speeds in compressed format.
  • Another method of increasing the speed of data transmission is to compress the data without loss so that data being transmitted is in a format up to one-tenth its original size. Theoretically this would increase the speed of transmission by one order of magnitude.
  • Data compression while desirable, carries with it a loss of computer time during processing and other problems which are usually ignored.
  • State of the art mainframe computers can easily format one million or more bytes per second.
  • Data links and high speed networks presently used for high speed data transfer are capable of exceeding this data rate.
  • data files whether compressed or not using these data links can be transferred over such data links at a minimum of time.
  • Such transmission links are not always available in all locations of the world and it often becomes desirable to increase the rate of transmission of data over lines and links by employing data compression of the data files before transmission.
  • compressed data in compressed format is not fault tolerant and that the older and slower transmission lines and data link are more prone to causing transmission errors in the transmission path.
  • Numerous data files concerning financial data, manufacturing data and inventory data are being transmitted over such lines.
  • a typical example will illustrate the point.
  • More and more world wide manufacturing and sales companies desire to transmit data concerning manufacturing needs, inventory and sales from all remote locations to a central location which has the enterprise computing system.
  • the central system is usually capable of updating all data on a daily basis and generating reports and issuing orders and calculating data to maintain a balance of incoming parts with outgoing sales without depletion of sales items at any one location.
  • a method for enhancing the validity of transmitted data files which comprises reading the data from a data file and formatting the data into alpha numerical characters which may be compressed by a known compression code which produces a variable length data stream.
  • the data stream is then divided into blocks of N bytes where N represents an integer.
  • a check code is inserted into the formatted data stream between the predetermined number of N bytes to provide a data stream with a validity code enhancement embedded in the data stream.
  • Figure 1 is schematic block diagram of a prior art computer system arranged to transmit data in digital format over a telephone line
  • Figure 2 is a schematic block diagram of a prior art computer system equipped with a network interface card arranged to transmit data in digital format over a network
  • Figure 3A is simplified block diagram showing a computer arranged to read an original data file and create a new duplicate file
  • Figure 3B is a simplified block diagram showing a first computer arranged to read an original data file and transmit it asynchronously to a second computer which asynchronously reproduces the transmitted data as a new duplicate file;
  • Figure 3C is a simplified block diagram showing a computer arranged to read and decompress a duplicate or compressed file and to provide a reproduction of the original data file;
  • Figure 4 is a simplified block diagram showing a preferred embodiment of the present invention which employs a first computer to transfer data files by formatting a data stream of variable length compressed code values and insert a block code in the data stream for transmission over available networks to a second computer which is capable of striping off the block codes and checking the data stream to be stored in compressed and decoded or uncompressed format;
  • Figure 5 is a simplified block diagram illustrating the points in a data stream where compression and block error codes are generated and inserted as well as the point in the data stream where encryption may be performed;
  • Figure 6 is a schematic block diagram of six data stream formats illustrating the placement of special codes in the data stream for data being transmitted and/or stored;
  • Figure 7 is a schematic block diagram illustrating a preferred embodiment example of steps employed to insert error checking block codes in a variable length data stream;
  • Figure 8 is a schematic block diagram illustrating a preferred embodiment method of determining an efficient compression ratio of different codes which may or not be employed to compress the data stream;
  • Figure 9 is a schematic block diagram illustrating a method for determining on the fly a predetermined one of selected data compression codes which can be used to efficiently compress the data stream.
  • Figure 10 is a schematic block diagram illustrating an apparatus in steps for carrying out tests to determine the most efficient data compression code or combination of codes for use in compressing a data stream.
  • Fig. 1 showing a schematic block diagram of a prior art computing system 10 arranged to transmit data in digital format over a telephone line.
  • the original data file 11 is shown as a main memory unit or disk file which is accessed by a host computing system 12 and the information is supplied through an internal or external modem 13 which is provided with means for compressing data in digital format that is supplied to a telephone line and telephone exchange 14 which in turn is placed on a telephone system 15 for transmission to a remotely located telephone exchange which is not shown in this particular drawing.
  • the speed of transmission of the digital data through the telephone exchange and telephone system is the bottle neck or limiting factor for the speed of digital data.
  • FIG. 2 showing a schematic block diagram of a prior art computing system 10A equipped with a network interface card for transmitting data in digital format over a network.
  • the same computer 12 as shown in Fig. 1 is provided with a network protocol stack 16 which interfaces with a network interface card 17 that produces digital data in package format on line 18 which is connected to the network 19. It is well know that information which is placed on the network may be taken off the network at a remote location and deciphered or decoded or reformatted to produce the original data.
  • Fig. 2 showing a schematic block diagram of a prior art computing system 10A equipped with a network interface card for transmitting data in digital format over a network.
  • the same computer 12 as shown in Fig. 1 is provided with a network protocol stack 16 which interfaces with a network interface card 17 that produces digital data in package format on line 18 which is connected to the network 19. It is well know that information which is placed on the network may be taken off the network at a remote location and deciphered or decoded or reformatted to
  • the network provider 19 becomes the bottle neck. If the network provider uses any portion of the prior art telephone system this becomes the bottle neck. However, if the network provider and system is connected over a physically fast transport means then the speed of transmission may be enhanced up to the capability of the computer and it's NIC card. Quite often the speeds of these NIC cards using a fast internet make it possible to transmit accurately and economically information at rates of 100 megabits per second.
  • Fig. 3A showing a simplified block diagram of an original main file 11 which is accessed by a computer 12.
  • the computer 12 is provided with a commercially available computer software program 21 to enable the computer 12 to compress the original main file and generate a new file 22 in a compressed format.
  • the cables which connect the elements of 11, 12 and 22 are high speed cables and the process is only limited by the ability of the computer 12 to perform the compression algorithm.
  • Fig. 3B showing a simplified block diagram of a system for transmitting the new file 22 and generating a copy of the compressed new file 22.
  • the new file 22 is coupled to a computer 23 employed to transmit data over data link or cable or line 24 to a receiving computer 25 and to create the new file 22.
  • the information in the new file is transmitted to a remote location and a copy of the new file 26 is generated.
  • This system enables the accumulation of the original main file 11 in a new file for a rapid transmission over the line 24.
  • Fig. 3C showing a simplified block diagram of the computer system 25A arranged to take a copy of the new file 26 and reproduce it as a new main file 27.
  • the copy of the new file 26 is first decompressed by computer 25A using decompression software 21A similar to the software 21 to produce an expanded and decoded file of new file 26 and then end up with a reproduction 27 of the main file 11.
  • Fig. 4 showing a simplified block diagram of a preferred embodiment of the present invention in which a first computer is employed to transfer a data file from a first location over a network in a compressed format and to receive the information in the compressed format at a second computer which is capable of stripping off block codes and checking the data stream for errors before decoding the compressed information which is stored in it's original format as a data file.
  • the data file 28 may be in any form including disk or tape and other forms such as solid state memory which may be accessed at high speed by the computer 29 shown as CPU 1.
  • CPU 29 is provided with numerous application software packages and operating systems and here includes a loss less data compression software package shown as LZW 31.
  • Another software package 32 includes software for formatting the data stream on line 30 into blocks of four bytes each of which comprises eight bits.
  • the formatting software 32 enables the CPU 29 and the software 31 to output Lempel/Ziv/Welch codes of variable length at the output on line 34 and to insert after every N number of bytes a block code generated by block code generator 33 in the data stream.
  • the data stream 30 has been compressed in CPU 29 and replaced by a stream of codes on line 34 which includes somewhere in the stream at the end of a predetermined number of blocks a block code of 32 bits.
  • the block code is a check sum of the bits in the data stream between block codes.
  • Line 34 is shown schematically connected to a network 35 which may comprise for example a transport control protocol/ internet protocol (TCP/IP) .
  • TCP/IP transport control protocol/ internet protocol
  • the network may include software and /or hardware and/or at least one of the operational boards in the computer 29. This may also include one of the interface boards to the network.
  • the network 35 is shown connected by line 36 to computer 37 shown as CPU 2.
  • the computer 37 also is provided with a proper interface to receive the information on the network.
  • the information comprises a stream of blocks of data codes periodically provided with block codes which may be a sum check, a redundancy check or other suitable check codes.
  • the data stream is directed into the computer 37 and the block code 33 is read.
  • the data decompression block shown as LZW decodes the data stream in computer 37. When a block code is read in block 33 it is compared in computer 37 with the same block code that is generated from the incoming data stream 36 even though it is in an encoded format.
  • the read block code 33 compares with the again regenerated block code in computer 37 the bits of the data stream are checked for at least one error in the data stream.
  • the decoded information on line 38 may now be recorded in new file 39 which comprises an original copy of the file information transmitted from file 28 across the network 35 to the new file 39.
  • computers located anywhere in the world may assimilate critical information and format it into a compressed data stream with a check block code and transmit it over a network which could comprise a bottle neck for speed of transmission, to a centrally located enterprise computer 37.
  • the computer may store the information for later use and for processing in file 39.
  • more than one remote site can have a computer CPU 1 and a file 28 for processing and transmitting information to an enterprise computer for later processing.
  • the information being transmitted may be done on the fly in a continuous stream and collected in the data file 39 for further processing at a later time.
  • the file transfer system CPUl may comprise a Unisys NX or A series mainframe computer, a Unix based server or computer, a IBM MVS computer, an IBM AS400 TM computer or any of the computers which employ Windows NT TM, Windows 95TM etc operating systems.
  • FIG. 5 showing a simplified block diagram illustrating the points in a data stream of the type shown in Fig. 4 where data compression and block error codes are generated and inserted as well as the points in the data stream where encryption may be performed.
  • the data file 28 shown in Fig. 4 is shown producing a data stream having a point EPl where the data stream may be first encrypted.
  • the encrypted data stream may be compressed by block 31 which corresponds to the LZW software block 31 in computer 29 of Fig. 4.
  • the block code 33 generated by computer 29 is shown inserting a block code into the data stream. If the data stream was not encrypted at point EPl it may now be encrypted at point EP2.
  • the data stream After being compressed and encrypted, the data stream is transmitted over the network 35 and if encrypted at point EP2 it must now be decoded or decrypted at point DP2. In either case the data stream is stripped of it's block code at block 33 and decompressed or decoded at block 31. If the data stream had been encrypted at point EPl it may now be decrypted or decoded at point DPI and the original information stored in data file 39 as explained with reference to Fig. 4. In the embodiment shown in Fig. 5 any time encryption is used on the data stream in conjunction with a compression algorithm either before or after the encryption it becomes extremely difficult to unscramble the information being transmitted because it does not conform to standard procedures for analyzing encrypted information.
  • FIG. 6 showing a schematic diagram of six data stream formats which illustrate the placement of special codes in the data stream for data being transmitted and stored from a remote location.
  • Data stream A is shown comprising a series of nine bit codes.
  • LZW Lempel/Ziv/Welch
  • the data stream 41 is shown having a stop or end code 42 which denotes one of the special codes used in the preferred embodiment of the present invention.
  • data streams B & C which comprise streams 43 & 45 both having stop codes 42 & block codes 44.
  • the compressed data stream 43 is in it's original stream form and is formatted by CPU 29 into the stream 45 by insertion of block codes 44 every N number of blocks and at the end of the stream whether or not N number of blocks have been reached.
  • a stop code 42 is provided and a block code 44 is produced for the information proceeding the stop code 42.
  • data stream 46 at D shown having a stream of code values 47 shown as LZW code.
  • the block codes 44 follow N number of blocks for checking the values for a single error.
  • a change code 48 which is used to denote a change from LZW coding to run length encoding (RLE) as shown at 49.
  • RLE coded information is also coded with a block code 44 and a block code 44 follows every N number of blocks.
  • the last portion of the data stream 46 is shown having a stop code 42 which follows the compression code and this is followed by a block code 44.
  • the last block code 44 follows what ever information proceeded the last stop code 42.
  • a block code 44 is inserted after N Blocks in the data stream 51.
  • a stop code 42 followed a block code 44.
  • the block codes 44 may be inserted at different places in the data stream as long as the transmitting party and the receiving party both know where to place the codes and where they may be recovered.
  • a block code which includes a special code that provides the receiver with the exact location of the next block code may be inserted in the data stream.
  • the data stream can not be deciphered by a person receiving the data stream without having the additional information and/or an encryption key as to where the block codes would occur.
  • the information is transmitted during real time and received in real time and can be decoded in real time and stored for a future use. If operators of the preferred embodiment system desired to make the system completely fool proof they could embed information in the data stream which could only be decoded and found after the complete data stream is transmitted.
  • the block check code can be predetermined how often the block check code must be inserted in the data stream. As a general rule it is best to place the block code in the data stream prior to a point where degradation of the integrity of the data begins. Since this point occurs so seldom as a fraction of one percent, it is possible to place block codes in any of the data streams explained above without loosing more than one fifth of one percent of the data time or increasing the amount of transmission time by one fifth of one percent.
  • Fig. 7 showing a block flow diagram illustrating the preferred embodiment steps employed to insert error checking block codes into a stream of variable length data compression codes.
  • Fig. 4 a continuous data stream being feed to a computer 29.
  • the start of the data stream at block 53 results in the computer reading the continuous data stream at block 54 and the computer 29 encodes the LZW algorithm at block 55 which is then formatted into blocks of information comprising a predetermine number of bits which comprise a predetermine number of bytes as shown in block 56.
  • N number of blocks the check code is inserted as shown at block 57 and this information is transmitted as a continuous data stream which is integrated as shown at block 58.
  • the data stream is received as shown in Fig. 4 by computer 37.
  • the computer 37 effectively generates the same block code as computer 29 using the transmitted data stream without the block code as shown at block 59.
  • a newly generated block code at block 61 is compared in computer 37 to the transmitted block code 44 to determine if the new block code is equal to the received block code as shown at block 62. When this occurs the information may be stored as being proofed for errors as shown at block 63. If not, the computer 37 must alert the host computer 29 that the just received information is invalid and must be retransmitted as shown at block 64.
  • the data stream is transferred to block 56 it is also used to generate at check code and to generate a block count as shown as block 65.
  • Fig. 8 showing a schematic block diagram illustrating a method of determination an efficient compression code comprising different codes and which may be made on the fly for use in block 55 of Fig. 7.
  • Fig. 8 Before explaining the preferred use of Fig. 8 it should be understood that if time permits, it is possible for an operator to examine the data to be transferred and to determine a most efficient compression code or no compression code before the attempt to transmit the information. Further, the user may have historical data which would indicate to the user which combination of compression codes operate most efficiently with the data to be transferred.
  • Fig. 8 may be used as an on the fly test for an efficient compression code or may be used on site prior to providing the information to the network for transmission to an enterprise system. The method starts at block 67 and causes the continuous data stream to be read at block 68.
  • the data stream is encoded with an efficient compression code at block 69 which applicants have found to comprise either LZW or RLE on top of LZW.
  • the bits encoded in the data stream may be summed before and after compression so as to produce a ratio of input bits or bytes which are compared to the output bits or bytes to produce the compression ratio factor K at block 71. If the compression ratio only compresses by a factor of about 10 -15% compression, then the burden of compressing the data and slowing down the data stream is not worth the cost to the system. If the data is properly compressing, the data stream is formatted into encoded blocks of data as shown at block 72.
  • a check code 44 is inserted every N number of blocks as shown at block 73 then the data stream is ready to be transmitted as a compressed data stream with embedded blocks codes as shown at block 74.
  • This information passes to a transmitter of the type shown in Fig. 4. If at block 71 the compression ratio factor indicated that the compression code being used was not producing satisfactory results a new code could be tried as shown at block 75.
  • This information is preferably used to restart the transmission of data and to restart the new compression algorithm.
  • This information is passed to formatting block 72 prior to the time the check code is inserted into the data stream comprising blocks of data separated by the check code shown at block 73.
  • Fig. 9 showing a schematic block diagram of a method for determining on the fly which of the predetermined set of data compression codes can be used to efficiently compress the data stream.
  • the continuous data stream is read at block 68 (also shown in Fig. 7 and 8) the data stream is preferably compressed using LZW data compression or RLE data compression.
  • the determination is made at block 81 whether one or the other produces a more desirable data compression ratio. It may then be determined whether a combination on RLE followed by LZW will produce an even greater compression ratio as shown in block 82 in which case it may be possible to transmit with one of the three compression ratio techniques as shown at block 83.
  • Block 83 also produces a block indication at one of the blocks 84, 85 or 86 which of the data compression ratio techniques should be used and also produces a restart signal on line 87 which is used to restart the data stream as explained herein before employing the selected form of data compression. It is possible at block 82 to make a determination that the data is not properly responding to an attempt to compress the data and it is desirable to continue transmitting the data stream without performing data compression as shown at block 88. When this occurs, the block 88 must produce a restart signal on line 89 to inform the system that no further data compression should be performed on the data stream and the data stream is then not compressed as shown on line 91. The block code 44 is still inserted in the data stream.
  • Fig. 10 showing a schematic block diagram illustrating an apparatus and steps for carrying out test to be used to determine the most efficient compression code similar to Fig. 9.
  • the selection sequence is shown started at block 67.
  • the continuous data stream is read at block 68 to produce a data stream at mux 92 that has a select line 95 which will divert the data stream into one of the four algorithms shown and produce an output of a compressed data stream at mux 93.
  • mux 93 and select line 95 may be omitted because the output of the compression code generator shown are being produced sequentially at the time in the computer performing the compression algorithm, thus, the compressed data performed by one of the compression algorithms is inputted into a block 94 which compares the compression ratio for each of the different codes and preferable selects the highest code on line 95.
  • Code selection signals may be used in Figs. 7 to 9 to continuously select the preferred compression ratio technique. However, if the test comparison ratio block 94 determines that the data is not properly compressing it is possible to select none of the available data compression algorithms and the data is transmitted without data compression.
  • the present invention provides an integrity check of the information being transmitted in one continuous real time on the fly operation with a checking step which does not degrade the efficiency of the system.
  • 8 bit bytes are employed and 32 bits (4 bytes) are used for a check sum block code. This check sum block code is inserted every 2000-6000 bytes which represents an insignificant penalty in the data stream of less than l/10 th of 1% of the time.
  • this error checking block code substantially enhances the integrity of data which may be corrupted by any one of a plurality of networks links, or lines through which the data flows. It has been found that the integrity of the data is not corrupted in the computer but in the transmission over numerous routes, thus, the present invention provides a means for insuring that data produced at one end arrives unimpaired at the other end.

Abstract

In a system for enhancing the integrity of transmitted data files from one memory to a remotely located memory there is provided an original data stream which is compressed by a known data compression code. The compressed data stream (45) may be in a variable length format and is not provided with the usual parity code bits. To assure that compressed data is received both loss less and error free, the compressed data stream (45) is divided into blocks of N bytes. At the end of N bytes a check code (44) is inserted into the compressed data stream. The transmitted and received compressed data stream is processed as N blocks of bytes having a received block code (44). The received blocks of data are used to generate new block codes (44) which are compared with the transmitted block codes to determine if a one bit error has occurred in each block of N bytes. If an error occurs in the transmission of compressed data, the block (N) is not stored in the memory of the receiver and the transmitter must resend the entire block of N bytes until no error in transmission is detected. The same system for enhancing the integrity of a transmitted data file can be employed with data that is double data compressed and/or encrypted.

Description

ERROR DETECTION IN COMPRESSED DATA TRANSMISSION
BACKROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a system and method for checking the integrity of data files transferred at high speeds in compressed format.
2. Description of the Prior Art
Systems for transferring very large files are classified in class 370, subclasses 260+, 465+ and 536+. One such system is shown described in my U.S. patent 5,680,400 assigned to same assignee as the present invention. The system described therein splits data to be transferred into a plurality of streams for asynchronous transmission for the purpose of increasing the speed of the transfer over parallel lines, cables or phone links.
Another method of increasing the speed of data transmission is to compress the data without loss so that data being transmitted is in a format up to one-tenth its original size. Theoretically this would increase the speed of transmission by one order of magnitude. Data compression, while desirable, carries with it a loss of computer time during processing and other problems which are usually ignored. State of the art mainframe computers can easily format one million or more bytes per second. Data links and high speed networks presently used for high speed data transfer are capable of exceeding this data rate. Thus, data files whether compressed or not using these data links can be transferred over such data links at a minimum of time. Such transmission links are not always available in all locations of the world and it often becomes desirable to increase the rate of transmission of data over lines and links by employing data compression of the data files before transmission. It is not generally known that compressed data in compressed format is not fault tolerant and that the older and slower transmission lines and data link are more prone to causing transmission errors in the transmission path. Numerous data files concerning financial data, manufacturing data and inventory data are being transmitted over such lines. A typical example will illustrate the point. More and more world wide manufacturing and sales companies desire to transmit data concerning manufacturing needs, inventory and sales from all remote locations to a central location which has the enterprise computing system. The central system is usually capable of updating all data on a daily basis and generating reports and issuing orders and calculating data to maintain a balance of incoming parts with outgoing sales without depletion of sales items at any one location.
Accordingly, it would be most important that the data generated at remote locations is reproduced without error at the central location at a minimum of cost and time. When data compression is employed to increase the amount of data transferable in a given unit of time, the occurrence of errors in transmission can corrupt the compressed data to the point to where it is useless and/or meaningless in it's decoded format.
It would be desirable to provide a method and apparatus for transferring large data files such as inventory and sales data from points all over the world to a central enterprise host system over various available communication lines and data links in compressed format which would insure a very high degree of integrity of the data received and decoded.
SUMMARY OF THE INVENTION
It is the principal object of the present invention to provide a method and apparatus for enhancing the integrity of compressed and transmitted data.
It is a principal object of the present invention to provide a method and means for checking compressed data that has been transmitted to a receiver for decoding.
It is a principal object of the present invention to provide a method and means for checking compressed data that is virtually without cost of any kind to the system. It is an object of the present invention to provide a method and apparatus for efficiently compressing and decoding data being transferred between remotely located computers . It is an object of the present invention to provide an apparatus and a method for generating and inserting a novel block check code in a compressed data stream which is transparent to the encoder and decoder. It is an object of the present invention to provide a novel block check and encryption code which can be inserted in a compressed or noncompressed data stream at low cost to prevent interception of confidential and proprietary data. It is an object of the present invention to provide a block code generator for inserting block check codes between a predetermined large number of blocks of data that is easily recognizable in a variable length data stream. It is the general object of the present invention to provide a method of checking transmitted data on the fly in one step.
According to these and other objects of the present invention there is provided a method for enhancing the validity of transmitted data files which comprises reading the data from a data file and formatting the data into alpha numerical characters which may be compressed by a known compression code which produces a variable length data stream. The data stream is then divided into blocks of N bytes where N represents an integer. At the end of N bytes a check code is inserted into the formatted data stream between the predetermined number of N bytes to provide a data stream with a validity code enhancement embedded in the data stream.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is schematic block diagram of a prior art computer system arranged to transmit data in digital format over a telephone line; Figure 2 is a schematic block diagram of a prior art computer system equipped with a network interface card arranged to transmit data in digital format over a network;
Figure 3A is simplified block diagram showing a computer arranged to read an original data file and create a new duplicate file;
Figure 3B is a simplified block diagram showing a first computer arranged to read an original data file and transmit it asynchronously to a second computer which asynchronously reproduces the transmitted data as a new duplicate file;
Figure 3C is a simplified block diagram showing a computer arranged to read and decompress a duplicate or compressed file and to provide a reproduction of the original data file;
Figure 4 is a simplified block diagram showing a preferred embodiment of the present invention which employs a first computer to transfer data files by formatting a data stream of variable length compressed code values and insert a block code in the data stream for transmission over available networks to a second computer which is capable of striping off the block codes and checking the data stream to be stored in compressed and decoded or uncompressed format;
Figure 5 is a simplified block diagram illustrating the points in a data stream where compression and block error codes are generated and inserted as well as the point in the data stream where encryption may be performed;
Figure 6 is a schematic block diagram of six data stream formats illustrating the placement of special codes in the data stream for data being transmitted and/or stored; Figure 7 is a schematic block diagram illustrating a preferred embodiment example of steps employed to insert error checking block codes in a variable length data stream;
Figure 8 is a schematic block diagram illustrating a preferred embodiment method of determining an efficient compression ratio of different codes which may or not be employed to compress the data stream;
Figure 9 is a schematic block diagram illustrating a method for determining on the fly a predetermined one of selected data compression codes which can be used to efficiently compress the data stream; and
Figure 10 is a schematic block diagram illustrating an apparatus in steps for carrying out tests to determine the most efficient data compression code or combination of codes for use in compressing a data stream.
DESCRIPTION OF THE PREFERRED ENBODIMENTS Refer now to Fig. 1 showing a schematic block diagram of a prior art computing system 10 arranged to transmit data in digital format over a telephone line. For purposes of this description the original data file 11 is shown as a main memory unit or disk file which is accessed by a host computing system 12 and the information is supplied through an internal or external modem 13 which is provided with means for compressing data in digital format that is supplied to a telephone line and telephone exchange 14 which in turn is placed on a telephone system 15 for transmission to a remotely located telephone exchange which is not shown in this particular drawing. In Fig. 1 the speed of transmission of the digital data through the telephone exchange and telephone system is the bottle neck or limiting factor for the speed of digital data. In the United States the telephone companies presently provide a standard line which will transmit only 56.5 kilobits per second. There are other types of telephone lines which will transmit more data but this is the most common in the United States at this time. Refer now to Fig. 2 showing a schematic block diagram of a prior art computing system 10A equipped with a network interface card for transmitting data in digital format over a network. The same computer 12 as shown in Fig. 1 is provided with a network protocol stack 16 which interfaces with a network interface card 17 that produces digital data in package format on line 18 which is connected to the network 19. It is well know that information which is placed on the network may be taken off the network at a remote location and deciphered or decoded or reformatted to produce the original data. In the Fig. 2 embodiment the network provider 19 becomes the bottle neck. If the network provider uses any portion of the prior art telephone system this becomes the bottle neck. However, if the network provider and system is connected over a physically fast transport means then the speed of transmission may be enhanced up to the capability of the computer and it's NIC card. Quite often the speeds of these NIC cards using a fast internet make it possible to transmit accurately and economically information at rates of 100 megabits per second.
Refer now to Fig. 3A showing a simplified block diagram of an original main file 11 which is accessed by a computer 12. The computer 12 is provided with a commercially available computer software program 21 to enable the computer 12 to compress the original main file and generate a new file 22 in a compressed format. In this embodiment the cables which connect the elements of 11, 12 and 22 are high speed cables and the process is only limited by the ability of the computer 12 to perform the compression algorithm.
Refer now to Fig. 3B showing a simplified block diagram of a system for transmitting the new file 22 and generating a copy of the compressed new file 22. The new file 22 is coupled to a computer 23 employed to transmit data over data link or cable or line 24 to a receiving computer 25 and to create the new file 22. The information in the new file is transmitted to a remote location and a copy of the new file 26 is generated. This system enables the accumulation of the original main file 11 in a new file for a rapid transmission over the line 24.
Refer now to Fig. 3C showing a simplified block diagram of the computer system 25A arranged to take a copy of the new file 26 and reproduce it as a new main file 27. In this embodiment the copy of the new file 26 is first decompressed by computer 25A using decompression software 21A similar to the software 21 to produce an expanded and decoded file of new file 26 and then end up with a reproduction 27 of the main file 11.
Summarizing Figures 1, 2, 3 it will be understood that the prior art systems were not adapted for efficient utilization of the computers nor where they designed for rapid transfer of information from one remote location to a central location where the files could be processed.
Refer now to Fig. 4 showing a simplified block diagram of a preferred embodiment of the present invention in which a first computer is employed to transfer a data file from a first location over a network in a compressed format and to receive the information in the compressed format at a second computer which is capable of stripping off block codes and checking the data stream for errors before decoding the compressed information which is stored in it's original format as a data file. In the preferred embodiment system shown in Fig. 4 the data file 28 may be in any form including disk or tape and other forms such as solid state memory which may be accessed at high speed by the computer 29 shown as CPU 1. CPU 29 is provided with numerous application software packages and operating systems and here includes a loss less data compression software package shown as LZW 31. Another software package 32 includes software for formatting the data stream on line 30 into blocks of four bytes each of which comprises eight bits. The formatting software 32 enables the CPU 29 and the software 31 to output Lempel/Ziv/Welch codes of variable length at the output on line 34 and to insert after every N number of bytes a block code generated by block code generator 33 in the data stream. Thus it will be appreciated that the data stream 30 has been compressed in CPU 29 and replaced by a stream of codes on line 34 which includes somewhere in the stream at the end of a predetermined number of blocks a block code of 32 bits. The block code is a check sum of the bits in the data stream between block codes. Line 34 is shown schematically connected to a network 35 which may comprise for example a transport control protocol/ internet protocol (TCP/IP) . The network may include software and /or hardware and/or at least one of the operational boards in the computer 29. This may also include one of the interface boards to the network. The network 35 is shown connected by line 36 to computer 37 shown as CPU 2. The computer 37 also is provided with a proper interface to receive the information on the network. The information comprises a stream of blocks of data codes periodically provided with block codes which may be a sum check, a redundancy check or other suitable check codes. The data stream is directed into the computer 37 and the block code 33 is read. The data decompression block shown as LZW decodes the data stream in computer 37. When a block code is read in block 33 it is compared in computer 37 with the same block code that is generated from the incoming data stream 36 even though it is in an encoded format. When the read block code 33 compares with the again regenerated block code in computer 37 the bits of the data stream are checked for at least one error in the data stream. The decoded information on line 38 may now be recorded in new file 39 which comprises an original copy of the file information transmitted from file 28 across the network 35 to the new file 39. It will be understood that computers located anywhere in the world may assimilate critical information and format it into a compressed data stream with a check block code and transmit it over a network which could comprise a bottle neck for speed of transmission, to a centrally located enterprise computer 37. The computer may store the information for later use and for processing in file 39. Further, it would be understood that more than one remote site can have a computer CPU 1 and a file 28 for processing and transmitting information to an enterprise computer for later processing. The information being transmitted may be done on the fly in a continuous stream and collected in the data file 39 for further processing at a later time. When information is being supplied from different data centers around the world it can be stored until all of the information to be processed is accumulated in one master file 39 which comprises numerous original files from remote locations. In the preferred embodiment of the present invention the file transfer system CPUl may comprise a Unisys NX or A series mainframe computer, a Unix based server or computer, a IBM MVS computer, an IBM AS400 ™ computer or any of the computers which employ Windows NT ™, Windows 95™ etc operating systems.
Refer now to Fig. 5 showing a simplified block diagram illustrating the points in a data stream of the type shown in Fig. 4 where data compression and block error codes are generated and inserted as well as the points in the data stream where encryption may be performed. The data file 28 shown in Fig. 4 is shown producing a data stream having a point EPl where the data stream may be first encrypted. The encrypted data stream may be compressed by block 31 which corresponds to the LZW software block 31 in computer 29 of Fig. 4. Further, the block code 33 generated by computer 29 is shown inserting a block code into the data stream. If the data stream was not encrypted at point EPl it may now be encrypted at point EP2. After being compressed and encrypted, the data stream is transmitted over the network 35 and if encrypted at point EP2 it must now be decoded or decrypted at point DP2. In either case the data stream is stripped of it's block code at block 33 and decompressed or decoded at block 31. If the data stream had been encrypted at point EPl it may now be decrypted or decoded at point DPI and the original information stored in data file 39 as explained with reference to Fig. 4. In the embodiment shown in Fig. 5 any time encryption is used on the data stream in conjunction with a compression algorithm either before or after the encryption it becomes extremely difficult to unscramble the information being transmitted because it does not conform to standard procedures for analyzing encrypted information. Stated differently examination of a Lempel/Ziv/Welch encoded data stream which comprises variable length block codes presents an almost insurmountable problem of decryption unless the actual encryption algorithm is known. Refer now to Fig. 6 showing a schematic diagram of six data stream formats which illustrate the placement of special codes in the data stream for data being transmitted and stored from a remote location. Data stream A is shown comprising a series of nine bit codes. Lempel/Ziv/Welch (LZW) codes are selected, preferably in numerical order and the lower code numbers may be transmitted with fewer than nine bits. When the dictionary addresses for strings of alpha numerical characters are all used, the 9 bit code values will followed by the 10 bit codes and the 10 bit codes will be followed by the higher number codes. The data stream 41 is shown having a stop or end code 42 which denotes one of the special codes used in the preferred embodiment of the present invention. Refer now to data streams B & C which comprise streams 43 & 45 both having stop codes 42 & block codes 44. In the preferred embodiment in the present invention the compressed data stream 43 is in it's original stream form and is formatted by CPU 29 into the stream 45 by insertion of block codes 44 every N number of blocks and at the end of the stream whether or not N number of blocks have been reached. A stop code 42 is provided and a block code 44 is produced for the information proceeding the stop code 42. Thus, in the preferred embodiment of the present invention it is not necessary to fill the last number of N blocks before producing the block code 44 at the end.
Refer now to data stream 46 at D shown having a stream of code values 47 shown as LZW code. As explained before, the block codes 44 follow N number of blocks for checking the values for a single error. In data stream 46 there is shown a change code 48 which is used to denote a change from LZW coding to run length encoding (RLE) as shown at 49. RLE coded information is also coded with a block code 44 and a block code 44 follows every N number of blocks. The last portion of the data stream 46 is shown having a stop code 42 which follows the compression code and this is followed by a block code 44. The last block code 44 follows what ever information proceeded the last stop code 42.
Refer now to data stream 51 at E which is similar to data stream 46 shown at B. In this data stream LZW compressed code 47 is changed at change code 48 to a double data compression code which comprises first run length encoding (RLE) which is further compressed by LZW encoding. This information is treated as single coded information in N numbers of blocks followed by block codes. At the end of the data stream following a stop code last a block code 44 is appended to the stream. A more detailed explanation of combining two data compression codes is described in our U.S. patents 4,558,302 and 4,971,407 incorporated by reference herein. Refer to stream F shown as stream 51 in which the LZW code 47 is change by change code 48 to a non encoded block of information shown at 52. At times it is more efficient to not encode information because the format may be such that it actually expands rather than contracts during the attempted data compression process. In the same manner as explained before, a block code 44 is inserted after N Blocks in the data stream 51. A stop code 42 followed a block code 44. Having explained the data streams A to F and how block codes may be inserted every N number of blocks, which could comprise a variable number of bits, it will be appreciated that the block codes 44 may be inserted at different places in the data stream as long as the transmitting party and the receiving party both know where to place the codes and where they may be recovered. For example, a block code which includes a special code that provides the receiver with the exact location of the next block code may be inserted in the data stream. This may vary from special code to special code as long as the decoder is capable of decoding the information provided. Another variation of the same concept would include a skip code in which the transmitter and receiver had prearranged to place their block codes at various locations in the data stream measured in either bits or blocks. Thus, the data stream can not be deciphered by a person receiving the data stream without having the additional information and/or an encryption key as to where the block codes would occur. In the preferred embodiment in the present invention the information is transmitted during real time and received in real time and can be decoded in real time and stored for a future use. If operators of the preferred embodiment system desired to make the system completely fool proof they could embed information in the data stream which could only be decoded and found after the complete data stream is transmitted. Further, depending on the compression algorithm employed it can be predetermined how often the block check code must be inserted in the data stream. As a general rule it is best to place the block code in the data stream prior to a point where degradation of the integrity of the data begins. Since this point occurs so seldom as a fraction of one percent, it is possible to place block codes in any of the data streams explained above without loosing more than one fifth of one percent of the data time or increasing the amount of transmission time by one fifth of one percent.
Refer now to Fig. 7 showing a block flow diagram illustrating the preferred embodiment steps employed to insert error checking block codes into a stream of variable length data compression codes. There is shown in Fig. 4 a continuous data stream being feed to a computer 29. The start of the data stream at block 53 results in the computer reading the continuous data stream at block 54 and the computer 29 encodes the LZW algorithm at block 55 which is then formatted into blocks of information comprising a predetermine number of bits which comprise a predetermine number of bytes as shown in block 56. After N number of blocks the check code is inserted as shown at block 57 and this information is transmitted as a continuous data stream which is integrated as shown at block 58. The data stream is received as shown in Fig. 4 by computer 37. At the block 59 the computer 37 effectively generates the same block code as computer 29 using the transmitted data stream without the block code as shown at block 59. A newly generated block code at block 61 is compared in computer 37 to the transmitted block code 44 to determine if the new block code is equal to the received block code as shown at block 62. When this occurs the information may be stored as being proofed for errors as shown at block 63. If not, the computer 37 must alert the host computer 29 that the just received information is invalid and must be retransmitted as shown at block 64. At the same time the data stream is transferred to block 56 it is also used to generate at check code and to generate a block count as shown as block 65. This permits the computer 29 to generate a block code as shown at block 66 and to inset it into the data stream every N number of blocks as shown at block 57. Having explained Fig. 4 with reference to the steps shown in Fig 7 it will be understood that some variations of the steps may be made at blocks 55 to 58 by using different codes and using the insertion technique at difference places in the data stream.
Refer now to Fig. 8 showing a schematic block diagram illustrating a method of determination an efficient compression code comprising different codes and which may be made on the fly for use in block 55 of Fig. 7. Before explaining the preferred use of Fig. 8 it should be understood that if time permits, it is possible for an operator to examine the data to be transferred and to determine a most efficient compression code or no compression code before the attempt to transmit the information. Further, the user may have historical data which would indicate to the user which combination of compression codes operate most efficiently with the data to be transferred. Fig. 8 may be used as an on the fly test for an efficient compression code or may be used on site prior to providing the information to the network for transmission to an enterprise system. The method starts at block 67 and causes the continuous data stream to be read at block 68. The data stream is encoded with an efficient compression code at block 69 which applicants have found to comprise either LZW or RLE on top of LZW. The bits encoded in the data stream may be summed before and after compression so as to produce a ratio of input bits or bytes which are compared to the output bits or bytes to produce the compression ratio factor K at block 71. If the compression ratio only compresses by a factor of about 10 -15% compression, then the burden of compressing the data and slowing down the data stream is not worth the cost to the system. If the data is properly compressing, the data stream is formatted into encoded blocks of data as shown at block 72. A check code 44 is inserted every N number of blocks as shown at block 73 then the data stream is ready to be transmitted as a compressed data stream with embedded blocks codes as shown at block 74. This information passes to a transmitter of the type shown in Fig. 4. If at block 71 the compression ratio factor indicated that the compression code being used was not producing satisfactory results a new code could be tried as shown at block 75. This information is preferably used to restart the transmission of data and to restart the new compression algorithm. Thus, when the data stream is read at block 68 it is necessary to generate a new special code as shown at block 76 indicating the compression code being employed. This information is passed to formatting block 72 prior to the time the check code is inserted into the data stream comprising blocks of data separated by the check code shown at block 73. Whatever the code is being employed, the same technique is employed to generate a check code as shown at block 78 and the inserted block check code 44 is shown being inserted at block 79 into the stream which passes through block 73. It will be understood that the steps explain with reference to Fig. 8 are very broad but illustrate an on the fly change of data compression techniques for use with the system shown in Fig. 4.
Refer now to Fig. 9 showing a schematic block diagram of a method for determining on the fly which of the predetermined set of data compression codes can be used to efficiently compress the data stream. When the continuous data stream is read at block 68 (also shown in Fig. 7 and 8) the data stream is preferably compressed using LZW data compression or RLE data compression. The determination is made at block 81 whether one or the other produces a more desirable data compression ratio. It may then be determined whether a combination on RLE followed by LZW will produce an even greater compression ratio as shown in block 82 in which case it may be possible to transmit with one of the three compression ratio techniques as shown at block 83. Block 83 also produces a block indication at one of the blocks 84, 85 or 86 which of the data compression ratio techniques should be used and also produces a restart signal on line 87 which is used to restart the data stream as explained herein before employing the selected form of data compression. It is possible at block 82 to make a determination that the data is not properly responding to an attempt to compress the data and it is desirable to continue transmitting the data stream without performing data compression as shown at block 88. When this occurs, the block 88 must produce a restart signal on line 89 to inform the system that no further data compression should be performed on the data stream and the data stream is then not compressed as shown on line 91. The block code 44 is still inserted in the data stream.
Refer now to Fig. 10 showing a schematic block diagram illustrating an apparatus and steps for carrying out test to be used to determine the most efficient compression code similar to Fig. 9. The selection sequence is shown started at block 67. The continuous data stream is read at block 68 to produce a data stream at mux 92 that has a select line 95 which will divert the data stream into one of the four algorithms shown and produce an output of a compressed data stream at mux 93. From a hardware point of view mux 93 and select line 95 may be omitted because the output of the compression code generator shown are being produced sequentially at the time in the computer performing the compression algorithm, thus, the compressed data performed by one of the compression algorithms is inputted into a block 94 which compares the compression ratio for each of the different codes and preferable selects the highest code on line 95. Code selection signals may be used in Figs. 7 to 9 to continuously select the preferred compression ratio technique. However, if the test comparison ratio block 94 determines that the data is not properly compressing it is possible to select none of the available data compression algorithms and the data is transmitted without data compression. Fig. 10 illustrates a system which will permit on the fly selection of one or more compression codes with out a restart and is equally applicable to other well known compressing codes. Having explained a preferred embodiment of the present invention and variations thereof, it will be appreciated that data compression does not include an integrity check and the use of data compression techniques could corrupt a stream of data. Thus, the present invention provides an integrity check of the information being transmitted in one continuous real time on the fly operation with a checking step which does not degrade the efficiency of the system. In the preferred embodiment of the present invention 8 bit bytes are employed and 32 bits (4 bytes) are used for a check sum block code. This check sum block code is inserted every 2000-6000 bytes which represents an insignificant penalty in the data stream of less than l/10th of 1% of the time. It has been found that even this error checking block code substantially enhances the integrity of data which may be corrupted by any one of a plurality of networks links, or lines through which the data flows. It has been found that the integrity of the data is not corrupted in the computer but in the transmission over numerous routes, thus, the present invention provides a means for insuring that data produced at one end arrives unimpaired at the other end.

Claims

1. A method of enhancing the integrity of a data file transmitted over conventional communications means (35), comprising the steps of:
accessing a data file (28) to be transferred to a remote area (39) without loss of data,
forming said data into a data stream (@30) of bytes values,
storing said stream of bytes (@30) values of data into a buffer memory of a computer means (29),
providing said computer means (29) with data compression algorithm means (31),
converting recurring strings of byte values in said stream of byte values to data compression code values (@31) ,
generating a new digital data stream of code values (@34) to be transmitted over said communication means, generating a block error code (44 @ 33) for predetermined length of bits (N) in said new digital data stream, and
inserting said block error code (44) into said new digital data stream after said predetermined length of bits, whereby said stream of data compression code values are provided with an error check code which may be recovered at a remote area (37, 39) .
2. The method as set forth in claim 1 wherein said step of converting recurring strings of byte values comprises the step of converting to variable length data compression code values.
3. The method as set forth in claim 2 wherein said step of converting recurring strings of byte values comprises the step of compressing the strings using an LZW data compression algorithm and/or a RLE data compression algorithm.
4. The method as set forth in claim 1 wherein said step of converting recurring strings of byte values comprises the step of converting to fixed length data compression code values.
5. The method as set forth in claim 1 wherein the step of inserting said block error code (44) comprises inserting the block code between a predetermined number of N bytes in said data stream (45) .
6. The method as set forth in claim 5 wherein the step of inserting further comprises generating and inserting the block error code (44) every 2,000 to 6,000 bytes in the data stream.
7. The method as set forth in claim 1 wherein the step of converting recurring strings to data compression code values further includes applying a plurality of different data compression algorithms (Figs. 9, 10),
testing the data compression ratios (94) of the different algorithms, and
selecting the algorithm (95) which achieves the highest data compression ratio.
8. The method as set forth in claim 7 which further includes inserting a change code (48) into said data stream prior to testing a different data compression algorithm.
9. The method as set forth in claim 7 wherein the step of selecting the algorithm (95) which achieves the highest data compression ratio further includes selecting none (96) of the available data compression algorithms .
10. The method as set forth in claim 7 wherein the step of selecting said algorithm further includes restarting (89) said data stream and converting recurring strings of byte values in said data stream to the data compression code so selected.
11. The method as set forth in claim 1 which further includes the step of encrypting said data stream.
12. The method as set forth in claim 1 which further includes encrypting said data stream after generating data compression code values.
13. The method of decoding a compressed data stream (@36) representative of a data file transmitted from a remote site, comprising the step of:
receiving said compressed data stream (@37, 33),
storing said compressed data stream in a first memory of a computer (37),
stripping off the block codes (@33) from said data stream (36, 45) , generating a block code (44) from the data in said compressed data stream (45), and
comparing (@37) the generated error block codes (44) with the block error codes (44) stripped from said data stream (36) .
14. The method as set forth in claim 13 which further includes the step of determining (@37) that said block error codes (44) do not match, and
raising a default error signal in a computer (37) so that the stored compressed data stream (36) which included the block error (44) will not be used.
15. The method as set forth in claim 14 wherein raising said default error signal further includes means for requesting a retransmittal of the block of data which included the block error.
16. The method as set forth in claim 14 wherein raising said default error signal further includes restarting the transmission of said compressed data stream.
17. The method as set forth in claim 13 which further includes raising a signal indicating of an error free transmission, and storing the compressed data stream in a data file.
18. The method as set forth in claim 17 which further includes the step of decoding the compressed data stream for use or for storage in a data file.
PCT/US1999/012319 1998-06-24 1999-06-03 Error detection in compressed data transmission WO1999067912A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US09/104,116 1998-06-24
US09/104,116 US6711709B1 (en) 1998-06-24 1998-06-24 Integrated block checking system for rapid file transfer of compressed data

Publications (1)

Publication Number Publication Date
WO1999067912A1 true WO1999067912A1 (en) 1999-12-29

Family

ID=22298752

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/012319 WO1999067912A1 (en) 1998-06-24 1999-06-03 Error detection in compressed data transmission

Country Status (2)

Country Link
US (1) US6711709B1 (en)
WO (1) WO1999067912A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2381426A (en) * 2001-10-29 2003-04-30 Roke Manor Research An encoding device which performs compression, FEC and encryption, in that order
CN1303771C (en) * 2000-11-21 2007-03-07 皇家菲利浦电子有限公司 A communication system having bad frame indicator means for resynchronization purposes

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6624761B2 (en) 1998-12-11 2003-09-23 Realtime Data, Llc Content independent data compression method and system
US6604158B1 (en) * 1999-03-11 2003-08-05 Realtime Data, Llc System and methods for accelerated data storage and retrieval
US6601104B1 (en) 1999-03-11 2003-07-29 Realtime Data Llc System and methods for accelerated data storage and retrieval
US7203834B1 (en) * 1999-12-02 2007-04-10 International Business Machines Corporation Method of updating encryption keys in a data communication system
US20010047473A1 (en) 2000-02-03 2001-11-29 Realtime Data, Llc Systems and methods for computer initialization
US20030191876A1 (en) * 2000-02-03 2003-10-09 Fallon James J. Data storewidth accelerator
DE10037004B4 (en) * 2000-07-29 2004-01-15 Sms Demag Ag Roll stand for belt edge-oriented shifting of the intermediate rolls in a 6-roll stand
US8692695B2 (en) 2000-10-03 2014-04-08 Realtime Data, Llc Methods for encoding and decoding data
US7417568B2 (en) * 2000-10-03 2008-08-26 Realtime Data Llc System and method for data feed acceleration and encryption
US9143546B2 (en) 2000-10-03 2015-09-22 Realtime Data Llc System and method for data feed acceleration and encryption
US7302628B2 (en) 2000-12-14 2007-11-27 Telefonaktiebolaget L M Ericsson (Publ) Data compression with incremental redundancy
US6981060B2 (en) * 2000-12-14 2005-12-27 Telefonaktiebolaget L M Ericsson (Publ) Compression based on channel characteristics
US7386046B2 (en) 2001-02-13 2008-06-10 Realtime Data Llc Bandwidth sensitive data compression and decompression
CN100508451C (en) * 2001-07-17 2009-07-01 夏普株式会社 Apparatus and method for generating data for detecting false alteration of encrypted data during processing
JP3857611B2 (en) * 2002-05-20 2006-12-13 富士通株式会社 Data compression program, data compression method, and data compression apparatus
TW200421792A (en) * 2003-03-27 2004-10-16 Matsushita Electric Ind Co Ltd Contents distribution system
US20050144087A1 (en) * 2003-07-09 2005-06-30 Jane Huang Disparate sales system integration and method
GB2422081B (en) * 2005-01-05 2010-09-29 Ling Dynamic Systems Statistical streaming
US8521752B2 (en) 2005-06-03 2013-08-27 Osr Open Systems Resources, Inc. Systems and methods for arbitrary data transformations
US7512748B1 (en) 2006-08-17 2009-03-31 Osr Open Systems Resources, Inc. Managing lock rankings
US8539228B1 (en) 2006-08-24 2013-09-17 Osr Open Systems Resources, Inc. Managing access to a resource
US8024433B2 (en) 2007-04-24 2011-09-20 Osr Open Systems Resources, Inc. Managing application resources
US7949693B1 (en) 2007-08-23 2011-05-24 Osr Open Systems Resources, Inc. Log-structured host data storage
EP2482191B1 (en) * 2011-01-31 2017-03-22 Fujitsu Limited Memory correctness checking in distributed computer systems
US8903874B2 (en) 2011-11-03 2014-12-02 Osr Open Systems Resources, Inc. File system directory attribute correction
JP5982869B2 (en) * 2012-02-28 2016-08-31 富士ゼロックス株式会社 Transmission / reception system and program
US9830329B2 (en) 2014-01-15 2017-11-28 W. Anthony Mason Methods and systems for data storage
KR102285940B1 (en) 2015-05-29 2021-08-05 에스케이하이닉스 주식회사 Data processing circuit, data storage device comprising data processing circuit and operating method thereof
US11515897B2 (en) 2015-05-29 2022-11-29 SK Hynix Inc. Data storage device
US10396827B2 (en) * 2015-09-25 2019-08-27 SK Hynix Inc. Data storage device
US11611359B2 (en) 2015-05-29 2023-03-21 SK Hynix Inc. Data storage device
US11177835B2 (en) 2015-09-25 2021-11-16 SK Hynix Inc. Data storage device
US10203897B1 (en) * 2016-12-02 2019-02-12 Nutanix, Inc. Dynamic data compression
CN110933071B (en) * 2019-11-27 2022-01-28 中国银行股份有限公司 Image file transmission method and device
CN111666564B (en) * 2020-05-14 2024-02-02 平安科技(深圳)有限公司 Application program safe starting method and device, computer equipment and storage medium
US20220374368A1 (en) * 2021-05-19 2022-11-24 Hughes Network Systems, Llc System and method for enhancing throughput during data transfer

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4829526A (en) * 1985-03-04 1989-05-09 British Telecommunications Public Limited Company Data transmission
EP0652680A2 (en) * 1993-11-01 1995-05-10 Telefonaktiebolaget Lm Ericsson Method for communicating in a wireless communication system
EP0751643A1 (en) * 1995-06-26 1997-01-02 Koninklijke KPN N.V. Method and devices for the transmission of data with transmission error checking
US5745504A (en) * 1996-06-25 1998-04-28 Telefonaktiebolaget Lm Ericsson Bit error resilient variable length code

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4730348A (en) * 1986-09-19 1988-03-08 Adaptive Computer Technologies Adaptive data compression system
US5010553A (en) * 1988-12-05 1991-04-23 Compuquest, Inc. High speed, error-free data transmission system and method
US5130993A (en) * 1989-12-29 1992-07-14 Codex Corporation Transmitting encoded data on unreliable networks
GB9001312D0 (en) * 1990-01-19 1990-03-21 Hewlett Packard Ltd Storage of compressed data
US5115436A (en) * 1990-05-04 1992-05-19 Bell Communications Research Forward error correction code system
US5317603A (en) * 1992-12-30 1994-05-31 Gte Government Systems Corporation Isochronous interface apparatus
JP2576776B2 (en) * 1993-11-10 1997-01-29 日本電気株式会社 Packet transmission method and packet transmission device
US5600663A (en) * 1994-11-16 1997-02-04 Lucent Technologies Inc. Adaptive forward error correction system
US5680400A (en) 1995-05-31 1997-10-21 Unisys Corporation System for high-speed transfer of a continuous data stream between hosts using multiple parallel communication links
US5715260A (en) * 1995-06-12 1998-02-03 Telco Systems, Inc. Method and apparatus for providing a variable reset interval in a transmission system for encoded data
US5737638A (en) * 1995-07-14 1998-04-07 International Business Machines Corporation System for determining plurality of data transformations to be performed upon single set of data during single transfer by examining communication data structure
US6012159A (en) * 1996-01-17 2000-01-04 Kencast, Inc. Method and system for error-free data transfer
US6021433A (en) * 1996-01-26 2000-02-01 Wireless Internet, Inc. System and method for transmission of data
US5673322A (en) * 1996-03-22 1997-09-30 Bell Communications Research, Inc. System and method for providing protocol translation and filtering to access the world wide web from wireless or low-bandwidth networks
US6008743A (en) * 1997-11-19 1999-12-28 International Business Machines Corporation Method and apparatus for switching between data compression modes
US6243846B1 (en) * 1997-12-12 2001-06-05 3Com Corporation Forward error correction system for packet based data and real time media, using cross-wise parity calculation
US6141788A (en) * 1998-03-13 2000-10-31 Lucent Technologies Inc. Method and apparatus for forward error correction in packet networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4829526A (en) * 1985-03-04 1989-05-09 British Telecommunications Public Limited Company Data transmission
EP0652680A2 (en) * 1993-11-01 1995-05-10 Telefonaktiebolaget Lm Ericsson Method for communicating in a wireless communication system
EP0751643A1 (en) * 1995-06-26 1997-01-02 Koninklijke KPN N.V. Method and devices for the transmission of data with transmission error checking
US5745504A (en) * 1996-06-25 1998-04-28 Telefonaktiebolaget Lm Ericsson Bit error resilient variable length code

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1303771C (en) * 2000-11-21 2007-03-07 皇家菲利浦电子有限公司 A communication system having bad frame indicator means for resynchronization purposes
GB2381426A (en) * 2001-10-29 2003-04-30 Roke Manor Research An encoding device which performs compression, FEC and encryption, in that order

Also Published As

Publication number Publication date
US6711709B1 (en) 2004-03-23

Similar Documents

Publication Publication Date Title
US6711709B1 (en) Integrated block checking system for rapid file transfer of compressed data
US5953503A (en) Compression protocol with multiple preset dictionaries
US6122379A (en) Method and apparatus for performing simultaneous data compression and encryption
US6175944B1 (en) Methods and apparatus for packetizing data for transmission through an erasure broadcast channel
US7680269B2 (en) Method for ciphering a compressed audio or video stream with error tolerance
EP0950300B1 (en) Secondary channel using code violations
US4701745A (en) Data compression system
KR100667739B1 (en) Apparatus for transmitting/receiving wireless data and method thereof
US6580833B2 (en) Apparatus and method for entropy coding
JPS61212920A (en) Data compression and reception of coded compression data
JPH04227337A (en) Adaptive coding device using carry control and method therefor
JPH09230786A (en) Encoding method of data and device therefor
US6397360B1 (en) Method and apparatus for generating a fibre channel compliant frame
CN112491832B (en) File transmission method and device
EP1266455A1 (en) Method and apparatus for optimized lossless compression using a plurality of coders
EP1303918B1 (en) Signalling of signal significance information between an application layer and a channel encoder
US5721747A (en) Method and device for data transmission having improved error resilience with concomitant integrity protection
CN113704206A (en) Metadata processing method and device, electronic equipment and storage medium
KR20020070199A (en) Apparatus and method for encoding/decoding multimedia meta-data in error-resilient manner
US8228213B2 (en) Data compression system and associated methods
JP2830697B2 (en) Data processing device
Gryder et al. Survey of data compression techniques
EP0810737A2 (en) Method and apparatus for performing simultaneous data compression and encryption
KR20050098257A (en) Lossless data embedding
JPH088754A (en) Data compression transmission system and data transmitter and storage device using it

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): JP

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
122 Ep: pct application non-entry in european phase