Security Overview

2017-03-14  本文已影响0人  winnisz

Security Overview

Code Signing Overview:

To create a digital signature, the signing software computes a special type of checksum called a hash (or digest) based on a piece of data or code and encrypts that hash with the signer’s private key. This encrypted hash is called a signature.

hash(根据数据或者代码计算出一种具体类型的效验和)

用签名者的私钥将 hash  加密

To verify that signature, the verifying software computes a hash of the data or code. It then uses the signer’s public key to decrypt the signature, thus obtaining the original hash as computed by the signer. If the two hashes match, the data has not been modified since it was signed by someone in possession of the signer’s private key.

效验签名的目的就是确保用自制私钥签名后的数据没有被修改

Code Requirements:

The criteria used to evaluate a code signature are called code requirements.

更新有效,跟先前的版本是the same app

To use a certificate for signing, you need the private key, so that your code signing certificates will show up in this list.

If you have a private key for a certificate, you can unfold the certificate to show the private key:

上一篇下一篇

猜你喜欢

热点阅读