API request encryption method, data interaction method and system

An encryption method and data interaction technology, applied in the field of communication, can solve problems such as low security factor, and achieve the effects of ensuring security, unifying data standards, and expanding access capacity

Inactive Publication Date: 2018-09-07
苏州犀牛网络科技有限公司
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the present invention is to provide an encryption method for API requests, a data interaction method and a system, so as to alleviate the problem of low safety factor in existing business-level data encryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • API request encryption method, data interaction method and system
  • API request encryption method, data interaction method and system
  • API request encryption method, data interaction method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] Such as figure 1 As shown, the embodiment of the present invention provides an encryption method for an API request, which is executed by an electronic device (such as a client or a server), and the method may include the following steps:

[0063] Sorting step S101: sort the screening parameters in the API request according to the order of the ASCII code list of the parameter names.

[0064] Wherein, the above-mentioned screening parameters are request parameters excluding parameters whose parameter name is sign and parameters whose parameter name is byte[].

[0065] Specifically, when encrypting, the client and the server sort the screening parameters in the API request according to the order of the ASCII code table of the parameter names.

[0066] For example: foo=1, bar=2, foo_bar=3, foobar=4 The sorted order is bar=2, foo=1, foo_bar=3, foobar=4.

[0067] Concatenation step S102: Concatenate the sorted parameter names and parameter values ​​corresponding to the par...

Embodiment 2

[0085] Such as figure 2 and image 3 As shown, the embodiment of the present invention provides a data interaction method, which can be applied to multi-terminal data synchronization, that is, the data interaction method can realize multi-client data synchronization.

[0086] Specifically, the data interaction method includes:

[0087] Step S201: The client acquires an event command and converts it into an API request.

[0088] Wherein, the above-mentioned event instruction includes an event instruction manually triggered and / or an event instruction automatically triggered by a client hardware device; the above-mentioned API call request is used to initiate a call request of an open platform, and the above-mentioned API request includes public parameters and service parameters.

[0089] Specifically, the hardware system where the client is located will generate system events by means of automatic triggering or manual operation. Through the triggering of hardware system eve...

Embodiment 4

[0166] Such as Figure 4 As shown, the data interaction system in the prior art includes dubbo server cluster, tomcat cluster, registration center cluster and redis cluster, wherein, dubbo server cluster and tomcat cluster can be dynamically expanded, and the registration center cluster provides registration and consumption between services Redis clusters provide data caches with higher access performance than traditional databases. When a user visits a site, they reach the corresponding server cluster through the reverse proxy, and one of the servers responds and sends the information back to the user's terminal PC. Although the data interaction system in the prior art can solve the computing power of the server under high concurrency, in the current business model, various terminals are no longer limited to smart terminals such as PCs and mobile phones. In fact, such a technical solution has not been able to provide effective support.

[0167] Aiming at the problems caused...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an API request encryption method, a data interaction method and system and relates to the field of communications, so as to solve the problem that an existing service-level dataencryption mode is low in safety coefficient, the security of the service-level data is guaranteed, and the security coefficient is improved. The encryption method is applied to a client and a serverand comprises the following steps of a sorting step: sorting screening parameters in the API request according to a sequence of the ASCII code tables of the parameter names, wherein the screening parameters are the request parameters excluding the parameter names of sign and byte [ ]; a splicing step: sequentially assembling the sorted parameter names and parameter values corresponding to the parameter names in sequence, and generating a character string; an encoding step: encoding the spliced character string to generate a byte stream; and an encryption step: using a signature algorithm to carry out digest on the encoded byte stream to obtain a byte stream result. The signature algorithm comprises an MD5 algorithm or an HMAC-MD5 algorithm; and the byte stream result is represented in hexadecimal.

Description

technical field [0001] The present invention relates to the field of communication technologies, in particular to an API request encryption method, data interaction method and system. Background technique [0002] At present, the traditional business-level data encryption method is reversible encryption. After the data is intercepted, it is easy to be deciphered and cause the system interface to be attacked. [0003] To sum up, the existing business-level data encryption method has the problem of low safety factor. Contents of the invention [0004] In view of this, the purpose of the present invention is to provide an API request encryption method, data interaction method and system, so as to alleviate the problem of low safety factor in the existing business-level data encryption method. Can improve the safety factor. [0005] In a first aspect, an embodiment of the present invention provides an encryption method for an API request, including: [0006] Applies to clie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3239H04L9/3247H04L63/20
Inventor 沈振家
Owner 苏州犀牛网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products