Application signature method, device, system, computing device and storage medium
A technology for applying signatures and signed files, applied in user identity/authority verification, digital data protection, etc., can solve the problems of malicious replacement of the author's original application, stealing user data, attacks, etc., to avoid server-side consumption, improve processing efficiency, The effect of improving safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
[0040] Before describing the present invention, a brief description of the background knowledge involved in the present invention will be made first.
[0041] 1. Data summary
[0042] Data Digest Algorithm (Message Digest Algorithm) is an algorithm that can produce a special output format. Its principle is to extract some form of information from the original data according to certain operation rules. The extracted information is called the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


