First, sort timestamp, nonce, token in lexicographical order;
Second, splicing the sorted three parameters, sha1 encryption;
Third, compare the encrypted string with the signature to see if the request comes from WeChat;
First, sort timestamp, nonce, token in lexicographical order;
Second, splicing the sorted three parameters, sha1 encryption;
Third, compare the encrypted string with the signature to see if the request comes from WeChat;