API topology hiding method, device and system
An API call and topology technology, applied in the field of application programming interface topology hiding, can solve the problems of reducing the system security of CAPIF, unable to provide API call services, malicious attacks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] The implementation of the embodiments of the present application will be described in detail below in conjunction with the accompanying drawings.
[0067] The API topology hiding method provided in the embodiment of this application can be used to hide figure 1 The AEF of the API that provides the service (Service) in the shown CAPIF, such as figure 1 As shown, the CAPIF may include: an API call entity (also called an API invoker (invoker)), CCF, AEF, API Publish Function (API Publish Function, APF), an API management function entity, AEF, APF, and API management Functional entities belong to the API provider domain (domain), and different functional entities can be connected through CAPIF-x interfaces. For example, API calling entities can be connected to CCF through CAPIF-1 interfaces. exist figure 1 In the shown CAPIF, the API calling entity can be in the same public land mobile network (Public Land MobileNetwork, PLMN) trust domain (Trust Domain) with other functi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


