Last Updated on : 2023-05-25 01:55:31
This topic describes the method of signing message queue data.
Before you get the real data
, you can set the tamper-proof MD5 signature verification. The signature algorithm is processed in the following steps:
sign
and the parameters with an empty value) into key=val
.key
. Format example of the assembled string: k1=v1||k2=v2
.k1=v1||k2=v2...kn=vn||key
.sign
value, it means the data has not been tampered. Otherwise, the data has been tampered.The data is decrypted after the signature is checked.
accessKey
through the AES (ECB mode) to get the real device status data.Is this page helpful?
YesFeedbackIs this page helpful?
YesFeedback