Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application programming interface security management method and system

A programming interface and application program technology, applied in the field of information security, can solve the problem of being unable to block illegal access to business data, and achieve the effects of preventing loopholes, ensuring controllability, and preventing malicious attacks on the interface

Active Publication Date: 2021-07-09
亿阳安全技术有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a security management method and system for an application programming interface, which is used to solve the problem that the prior art cannot prevent illegal access to business data through API

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application programming interface security management method and system
  • Application programming interface security management method and system
  • Application programming interface security management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0030] In the description of the present application, it should be understood that the term "plurality" means two or more, unless otherwise specifically defined. The terms "including", "comprising" and similar terms should be understood as open-ended terms, ie "including / comprising but not limited to". The term "based on" is "based at least in part on". The term "an embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one further embodiment". Relevant definitions of other terms will be given in the description below.

[0031] refer to figure 1, showing the flow of an embodiment of the application programming interface security management method of the present appl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a security management method and system for an application programming interface. On the gateway server side, the method includes: receiving business logic interface information submitted by a publisher; According to the port number of the interface, generate the external access address of the interface according to the preset format, and establish the association between the external access address of the interface and the business logic interface information; receive the interface call request sent by the subscriber; request the token center to The identity of the subscriber who issued the interface call request is authenticated. If the authentication is passed, the interface call request is forwarded to the corresponding business logic interface according to the association between the external access address of the interface and the business logic interface information, and the The execution result of the business logic interface is returned to the subscriber. Through the above means, the present application can effectively solve the problem that the prior art cannot prevent illegal access to service data through the API.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, relates to a method and system for security management of an application programming interface. Background technique [0002] With the rapid development and popularization of computer and network technology, in order to facilitate the mutual access between various programs, the application programming interface (API, Application Programming Interface) technology came into being. The invention and development of API have greatly promoted the development of the computer industry. Progress; With the explosive growth of APP applications and smart devices, more and more retailers, media, governments, and financial service companies have begun to disclose Web APIs. How to manage these APIs safely and effectively is not easy for enterprises. [0003] API is a cornerstone of the new economy in the future. The biggest difference between a successful company or bus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L63/02H04L63/0807H04L63/20
Inventor 杜鹏赵贵阳周春楠
Owner 亿阳安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products