Implementing method and system for ensuring JMS message safety certificate
A technology of security authentication and implementation method, applied in the field of JMS message security authentication, can solve the problems of not being able to authenticate the security of JMS message sources and preventing message replay, and achieve the effects of high efficiency, simple use and strong stability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0073] 1) Prepare the JMS environment, generate an asymmetric key pair, and test the application.
[0074] 2) Encapsulate the message content into a message class, which contains at least two attributes: content (message content) and createTime (transmission timestamp, as a unique identifier).
[0075] 3) Convert the object into a JSON string, perform MD5 operation on the string to obtain a hash, and use the private key to encrypt the hash code to generate signature information.
[0076] 4) Put the JSON string format content into the JMS message content, and add the JMS attribute (_message_sign) whose value is the signature information obtained in (3), and generate it in the TOPIC of JMS
[0077] 5) The test application listens to the TOPIC of JMS. After receiving the message, it first takes out the signature value of the message signature attribute (_message_sign) and compares it with the local persistent message signature library of the application. If it exists, the message...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


