Resolution: The EDI duplicate detection algorithm is implemented in the EDI layer and it has not changed in EDI 6.x from EDI 5.x. Second, the EDI duplicate detection algorithm is simple but is strong enough. It combines the following values according to a certain sequence, then an MD5 hash code for the combined content is generated. The MD5 hash code is encoded in Base64 to get the fingerprint.
Operation ID ( e.g. 00403/005010/850)
Transaction set (e.g. 850)
TP name ( e.g. Company1)
Interchange control number
Group control number
Transaction control number
Transaction content (between ST and SE or UNH and UNT)
Protocol name (e.g. X12 or EDIFACT)
BC installation name (e.g. BC-DT1)