Last Updated on : 2025-01-23 06:16:34download
This topic describes the method of signing message queue data.
Before you get the real data
, you can set the tamper-proof MD5 signature verification. The signature algorithm is processed in the following procedure:
sign
and the parameters with an empty value) into key=val
.key
. The assembled string looks like this: k1=v1||k2=v2
.k1=v1||k2=v2...kn=vn||key
.sign
value. Otherwise, the data has been tampered with.The data is decrypted after the signature is verified.
Access Secret
as the key to decrypt and get the actual message data.Is this page helpful?
YesFeedbackIs this page helpful?
YesFeedback