美文网首页
Security Overview

Security Overview

作者: winnisz | 来源:发表于2017-03-14 17:41 被阅读0次

    Security Overview

    Code Signing Overview:

    To create a digital signature, the signing software computes a special type of checksum called a hash (or digest) based on a piece of data or code and encrypts that hash with the signer’s private key. This encrypted hash is called a signature.

    hash(根据数据或者代码计算出一种具体类型的效验和)

    用签名者的私钥将 hash  加密

    To verify that signature, the verifying software computes a hash of the data or code. It then uses the signer’s public key to decrypt the signature, thus obtaining the original hash as computed by the signer. If the two hashes match, the data has not been modified since it was signed by someone in possession of the signer’s private key.

    效验签名的目的就是确保用自制私钥签名后的数据没有被修改

    Code Requirements:

    The criteria used to evaluate a code signature are called code requirements.

    更新有效,跟先前的版本是the same app

    To use a certificate for signing, you need the private key, so that your code signing certificates will show up in this list.

    If you have a private key for a certificate, you can unfold the certificate to show the private key:

    相关文章

      网友评论

          本文标题:Security Overview

          本文链接:https://www.haomeiwen.com/subject/gswhnttx.html