摘要 |
In some embodiments, techniques for document integrity may include detecting an initiator associated with a key, detecting the end of an HTTP header, determining that no terminator matching the key has been detected, and rejecting the HTTP header. In some embodiments, techniques for document integrity may include generating a key and associating the key with an initiator insertion point and a terminator insertion point. |