Last Updated on: 2024-09-10 07:19:13
This topic describes the method of signing message queue data.
Before you get the real data
, you can set the tamper-proof MD5 signature verification. The signature algorithm is processed in the following steps:
sign
and the parameters with an empty value) into key=val
.key
. Format example of the assembled string: k1=v1||k2=v2
.k1=v1||k2=v2...kn=vn||key
.sign
value, it means the data has not been tampered. Otherwise, the data has been tampered.