How is the BusinessConnect fingerprint algorithm generated?

How is the BusinessConnect fingerprint algorithm generated?

book

Article ID: KB0092461

calendar_today

Updated On:

Products Versions
TIBCO BusinessConnect EDI Protocol Powered by Instream -
Not Applicable -

Description

Resolution:
The EDI duplicate detection algorithm is implemented in the EDI layer and it has not changed in EDI 6.x from EDI 5.x. Second, the EDI duplicate detection algorithm is simple but is strong enough. It combines the following values according to a certain sequence, then an MD5 hash code for the combined content is generated. The MD5 hash code is encoded in Base64 to get the fingerprint.

Operation ID ( e.g. 00403/005010/850)
Transaction set (e.g. 850)
TP name ( e.g. Company1)
Interchange control number
Group control number
Transaction control number
Transaction content (between ST and SE or UNH and UNT)
Protocol name (e.g. X12 or EDIFACT) 

BC installation name (e.g. BC-DT1)

Issue/Introduction

How is the BusinessConnect fingerprint algorithm generated?

Additional Information

BusinessConnect EDI User's Guide.