摘要 |
To facilitate the controlled use of information in a public network, data comprising verification data, an encrypted verification digest, and payload data representing information may be received along with a hash algorithm for verification. The received verification data is hashed with the hash algorithm to obtain a derived verification digest. A digest key is received and used for decrypting the encrypted verification digest. Then the derived verification digest may be compared with said decrypted verification digest to determine whether the payload data is genuine.
|