Data access method, server and terminal
A server-side, data access technology, applied in the network field, can solve problems such as loss of legitimate users of APIKEY, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] refer to figure 1 , shows a flowchart of steps of a data access method according to Embodiment 1 of the present application.
[0027] The data access method of the present embodiment includes the following steps:
[0028] Step S102: During a process in which the terminal requests to use the API of the server through the client program, the server receives the request for using the API sent by the terminal.
[0029] Wherein, the request includes an APIKEY (application programming interface signature), and the APIKEY is generated by the terminal according to the dynamic key sent by the server and the public key stored by the terminal. The public key saved by the terminal is obtained through non-communication and encrypted storage, which has strong confidentiality. Even if it is illegally intercepted in the middle, it is difficult to decrypt and obtain.
[0030] The access to the server-side API needs to be carried out through the client program. In this application, the...
Embodiment 2
[0036] refer to figure 2 , shows a schematic diagram of a data access method according to Embodiment 2 of the present application.
[0037] The data access method of the present embodiment includes the following steps:
[0038] Step S202: the client requests the server to use the API.
[0039] Wherein, the client stores a public key (public key) consistent with that of the server. The public keys stored on the client and the server are obtained through non-communication methods, such as through manual input. The client requests the server to use the API through a non-browser client program.
[0040] Preferably, the client in this embodiment is a mobile terminal. But not limited thereto, any client in a general sense, such as a personal computer terminal, can be used to implement this embodiment.
[0041] Step S204: the client generates an APIKEY according to the public key, the dynamic key and / or other request parameters, and requests the server to use the API.
[0042]...
Embodiment 3
[0053] refer to image 3 , shows a flowchart of steps of a data access method according to Embodiment 3 of the present application.
[0054] The data access method of the present embodiment includes the following steps:
[0055] Step S302: the client stores the same key (public key) as the server and the client; the server stores the same key (public key) as the server and the client.
[0056] Wherein, both the public key stored on the client side and the public key stored on the server side are obtained through non-communication methods. In this embodiment, the client is a mobile terminal.
[0057] Step S304: the client requests the server for pages not related to security, and the server saves and returns the client ID (such as sessionid) and the dynamic key.
[0058] In this embodiment, the client requests and accesses the server through a non-browser client program.
[0059] Through the client identification, the server can quickly verify the client's request according...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 