摘要 |
In some embodiments, techniques for document integrity may include detecting an initiator associated with a key, detecting the end of a document, determining that no terminator matching the key has been detected, and rejecting all or part of the document. In some embodiments, techniques for document integrity may include generating a key and associating the key with an initiator insertion point and a terminator insertion point.
|