Authentication method and device for interface calling, storage medium and electronic equipment
A technology of interface invocation and authentication method, applied in the field of information processing, can solve problems such as insufficient security of interface invocation, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0081] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific implementations described here are only used to illustrate and explain the present disclosure, not to limit the present disclosure.
[0082] figure 1 It is a flow chart of an authentication method for an interface call shown in an exemplary embodiment of the present disclosure. The method is applied to the call initiator, and the method includes:
[0083] S11. Generate an authentication message for invoking the interface of the called terminal, where the authentication message includes information on the number of calls, and the information on the number of calls indicates that this interface call is the number of times the call originator initiates to the called end transfer.
[0084] S12. Send the authentication message to the called end.
[0085] Wherein, the authentication message sent each time ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


