CN108365961A - The response method and server that interface call method and terminal device, interface call - Google Patents

The response method and server that interface call method and terminal device, interface call Download PDF

Info

Publication number
CN108365961A
CN108365961A CN201810001742.4A CN201810001742A CN108365961A CN 108365961 A CN108365961 A CN 108365961A CN 201810001742 A CN201810001742 A CN 201810001742A CN 108365961 A CN108365961 A CN 108365961A
Authority
CN
China
Prior art keywords
interface
identifying code
keyword
short message
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810001742.4A
Other languages
Chinese (zh)
Other versions
CN108365961B (en
Inventor
丁晶晶
徐国诚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201810001742.4A priority Critical patent/CN108365961B/en
Priority to PCT/CN2018/097311 priority patent/WO2019134361A1/en
Publication of CN108365961A publication Critical patent/CN108365961A/en
Application granted granted Critical
Publication of CN108365961B publication Critical patent/CN108365961B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The present invention is suitable for Internet technical field, provide a kind of interface call method and terminal device, a kind of response method and server that interface calls, by the device identification for receiving mobile device, interface parameters and interface verify short message, it is verified from interface and extracts interface identifying code in short message, and it is based on the corresponding algorithm of device identification, signature operation is carried out to the abstract of interface identifying code respectively, and interface parameters is encrypted, obtain interface ciphering field and identifying code signature field, and by device identification, interface ciphering field and identifying code signature field are assembled into interface call request, and interface call request is sent to server, to improve automatization level and the safety when interface calls.

Description

The response method and server that interface call method and terminal device, interface call
Technical field
The invention belongs to Internet technical field more particularly to a kind of interface call methods and terminal device, a kind of interface The response method and server of calling.
Background technology
Current many terminal devices are required for when realizing certain function from the relevant interface of server calls, ordinary circumstance Under, the user of terminal device is after the parameter for inputting interface to be called, it is also necessary to carry out subsequent operation manually to realize interface It calls, this brings great inconvenience to user.In order to allow user's more easily using terminal equipment, exist in the prior art The method that some interfaces call automatically, but when server needs terminal device to provide identifying code, existing interface is adjusted automatically It just cannot achieve with method.
In addition to this, existing interface automatic-calling method may make number of users there is also the relatively low problem of safety According to or server interface data be stolen in automatic calling process.
To sum up, the prior art has that the degree of automation is low and safety is poor when being called into line interface.
Invention content
In view of this, an embodiment of the present invention provides a kind of interface call method and terminal devices, to solve the prior art The problem of existing safety difference during interface calls and preserves.
The first aspect of the embodiment of the present invention provides a kind of interface call method, including:
Device identification, interface parameters and the server for receiving mobile device are sent to the interface verification of the mobile device Short message;
It is verified from the interface and extracts interface identifying code in short message;
Encryption Algorithm is determined according to the device identification, and the interface parameters is added by the Encryption Algorithm It is close, generate interface ciphering field;
The abstract for calculating the interface identifying code is made a summary as identifying code;
Signature key is determined according to the device identification, and identifying code abstract is signed by the signature key Name operation, generates identifying code signature field;
The device identification, the interface ciphering field and the identifying code signature field are assembled into interface calling to ask It asks, and the interface call request is sent to server.
The second aspect of the embodiment of the present invention provides a kind of response method that interface calls, including:
Receive the interface call request that terminal is sent;
Device identification, interface ciphering field and the identifying code label of mobile device are parsed from the interface call request File-name field;
Determine signature key according to the device identification, and by the signature key to the identifying code signature field into Row decoding operation, is verified code abstract;
It is made a summary according to the identifying code and restores outgoing interface identifying code;
If it is identical that the interface identifying code and server are sent to the interface identifying code of the mobile device, according to Device identification determines decipherment algorithm, and calculating is decrypted to the interface ciphering field by the decipherment algorithm, and generation connects Mouth parameter;
If there is the parameter consistent with the interface parameters in the server, connect according to the interface parameters is corresponding The pending data that mouth logic sends the terminal is handled.
The third aspect of the embodiment of the present invention provides a kind of terminal device, including memory and processor, described to deposit The computer program that can be run on the processor is stored in reservoir, when the processor executes the computer program, Realize following steps:
Device identification, interface parameters and the server for receiving mobile device are sent to the interface verification of the mobile device Short message;
It is verified from the interface and extracts interface identifying code in short message;
Encryption Algorithm is determined according to the device identification, and the interface parameters is added by the Encryption Algorithm It is close, generate interface ciphering field;
The abstract for calculating the interface identifying code is made a summary as identifying code;
Signature key is determined according to the device identification, and identifying code abstract is signed by the signature key Name operation, generates identifying code signature field;
The device identification, the interface ciphering field and the identifying code signature field are assembled into interface calling to ask It asks, and the interface call request is sent to server.
The fourth aspect of the embodiment of the present invention provides a kind of server, including memory and processor, the storage The computer program that can be run on the processor is stored in device, it is real when the processor executes the computer program Existing following steps:
Receive the interface call request that terminal is sent;
Device identification, interface ciphering field and the identifying code label of mobile device are parsed from the interface call request File-name field;
Determine signature key according to the device identification, and by the signature key to the identifying code signature field into Row decoding operation, is verified code abstract;
It is made a summary according to the identifying code and restores outgoing interface identifying code;
If it is identical that the interface identifying code and server are sent to the interface identifying code of the mobile device, according to Device identification determines decipherment algorithm, and calculating is decrypted to the interface ciphering field by the decipherment algorithm, and generation connects Mouth parameter;
If there is the parameter consistent with the interface parameters in the server, connect according to the interface parameters is corresponding The pending data that mouth logic sends the terminal is handled.
5th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, the computer program to realize following steps when being executed by processor:
Device identification, interface parameters and the server for receiving mobile device are sent to the interface verification of the mobile device Short message;
It is verified from the interface and extracts interface identifying code in short message;
Encryption Algorithm is determined according to the device identification, and the interface parameters is added by the Encryption Algorithm It is close, generate interface ciphering field;
The abstract for calculating the interface identifying code is made a summary as identifying code;
Signature key is determined according to the device identification, and identifying code abstract is signed by the signature key Name operation, generates identifying code signature field;
The device identification, the interface ciphering field and the identifying code signature field are assembled into interface calling to ask It asks, and the interface call request is sent to server.
6th aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer program, the computer program to realize following steps when being executed by processor:
Receive the interface call request that terminal is sent;
Device identification, interface ciphering field and the identifying code label of mobile device are parsed from the interface call request File-name field;
Determine signature key according to the device identification, and by the signature key to the identifying code signature field into Row decoding operation, is verified code abstract;
It is made a summary according to the identifying code and restores outgoing interface identifying code;
If it is identical that the interface identifying code and server are sent to the interface identifying code of the mobile device, according to Device identification determines decipherment algorithm, and calculating is decrypted to the interface ciphering field by the decipherment algorithm, and generation connects Mouth parameter;
If there is the parameter consistent with the interface parameters in the server, connect according to the interface parameters is corresponding The pending data that mouth logic sends the terminal is handled.
In embodiments of the present invention, short message is verified by receiving device identification, interface parameters and the interface of mobile device, It is verified from interface and extracts interface identifying code in short message, and be based on the corresponding algorithm of device identification, interface identifying code is plucked respectively Signature operation is carried out, and interface parameters is encrypted, obtains interface ciphering field and identifying code signature field, and will set Standby mark, interface ciphering field and identifying code signature field are assembled into interface call request, and interface call request is sent To server, to improve automatization level and the safety when interface calls.
Description of the drawings
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be only the present invention some Embodiment for those of ordinary skill in the art without having to pay creative labor, can also be according to these Attached drawing obtains other attached drawings.
Fig. 1 is the implementation flow chart of interface call method provided in an embodiment of the present invention;
Fig. 2 is the specific implementation flow chart of interface call method S102 provided in an embodiment of the present invention;
Fig. 3 is the additional extraction flow chart of identifying code provided in an embodiment of the present invention;
Fig. 4 is the implementation flow chart for the response method that interface provided in an embodiment of the present invention calls;
Fig. 5 is the structure diagram of interface calling device provided in an embodiment of the present invention;
Fig. 6 is the structure diagram for the responding device that interface provided in an embodiment of the present invention calls;
Fig. 7 is the schematic diagram of terminal device provided in an embodiment of the present invention;
Fig. 8 is the schematic diagram of server provided in an embodiment of the present invention
Specific implementation mode
In being described below, for illustration and not for limitation, it is proposed that such as tool of particular system structure, technology etc Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention can also be realized in the other embodiments of details.In other situations, it omits to well-known system, device, electricity The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
Fig. 1 shows that the implementation process of interface call method provided in an embodiment of the present invention, this method flow include step S101 to S106.The specific implementation principle of each step is as follows.
S101:Device identification, interface parameters and the server for receiving mobile device are sent to connecing for the mobile device Mouth verification short message.
In the embodiment of the present invention, there are terminal device, mobile device and server, wherein terminal device takes for calling Be engaged in device interface to realize that user needs the function called, mobile device to be used to receive the interface verification short message of server transmission, Server is used to respond the interface call request of terminal device, and corresponding service is provided for terminal device.
Illustratively, in our daily lifes, it is sometimes desirable to when using certain function of webpage by computer, webpage A short message for including identifying code often is sent to our mobile phone, when we pass through the identifying code in computer input short message Afterwards, computer can use certain function of webpage.In this illustration, computer is just as in the embodiment of the present invention Terminal device, mobile phone is as mobile device, and the server of webpage is as the server in the embodiment of the present invention.
It is to be appreciated that the terminal device that the executive agent of the embodiment of the present invention is not necessarily different from mobile device, Mobile device and terminal device can also be the same equipment.For example, mobile phone can both include the short message of identifying code as reception Mobile device, can also be used as the terminal device of the interface of invoking server.
Optionally, in embodiments of the present invention, the device identification of mobile device can be mobile device physical address, The model of CPU identification codes or mobile phone, so the device identification of mobile device is either the mark uniquely determined, can also be It identical with other mobile devices may be only intended to distinguish the mark of type.
Specifically, interface parameters is input by user, needs to call the parameter of which kind of interface for being indicated to server, can To understand that ground, server can provide corresponding service according to interface parameters after receiving interface parameters for terminal device.
Specifically, as described above, interface verification short message includes an identifying code, is only inputted by terminal device correct Identifying code after, server be possible to response terminal device interface call request.If it is to be appreciated that terminal device and shifting Dynamic equipment is different equipment, then mobile device needs interface verification short message being forwarded in terminal device;If terminal device with Mobile device is identical equipment, then terminal device directly analysis interface can verify short message.
S102 is verified from the interface and is extracted interface identifying code in short message.
In embodiments of the present invention, to need to automatically extract interface verification after terminal device interface pipeline joint verifies short message short Interface identifying code in letter.
As an embodiment of the present invention, as shown in Fig. 2, above-mentioned S102 includes:
S1021:According to preset keyword database, the keyword for including in the interface verification short message and institute are identified The corresponding criticality of keyword is stated, the keyword database includes the correspondence of keyword and criticality.
It is to be appreciated that all can include one or more crucial in the interface verification short message received in our daily lifes Word can lock the position where identifying code according to these keywords, to extract identifying code.
Illustratively, an interface verification short message is:“【Software A】581458 (software A mobile phone identifying codes please be completed to test Card), it is such as non-to operate in person, this short message please be ignore ".Another interface verifies short message:“【Software B】934047 (equipment lock verifications Code), for the device authentication that QQ number 12345678 logs in, please don't forward.It is such as not desired to receive such short message, R. S. V. P. T ", at this In two interface verification short messages, the words such as " identifying code ", " verification " can serve as keyword.
It is to be appreciated that not all interface verification short message has similar " identifying code " so apparent keyword, Such as an interface verification short message is:“【Software C】You just in request call X functions, are please called with 29834918 ", this Just there is no " identifying code " or " verification " to be used as keyword in interface verification short message.
As described in example above, in order to cope with the diversity of keyword in a variety of different interface verification short messages, the present invention Embodiment verifies short message by the interface of magnanimity, sums up a keyword database, is contained in the keyword database more A keyword.Further, since it may includes multiple keywords to be verified in short message in view of an interface, and short message is verified in interface The probability that identifying code occurs in the periphery of middle different keyword is different, therefore assigns a criticality for each keyword, So the keyword database further comprises the correspondence of keyword and criticality.It is to be appreciated that the pass of a keyword Key degree is higher, represent the keyword periphery occur identifying code probability it is bigger.
Specifically, it is based on keyword database, can identify that outgoing interface is verified in short message by text recognition algorithms includes Keyword.
S1022:Judge the number for including keyword in the interface verification short message.
As described above, may include one or more keywords in an interface verification short message, in the embodiment of the present invention In, due to handling containing only the method and interface verification of the processing containing multiple keywords for verifying short message there are one the interface of keyword The method of short message is different, so needing the number for the keyword for first determining whether to identify according to above-mentioned text recognition algorithms.
S1023:It, will be pre- before the keyword if including only a keyword in the interface verification short message If existing number is used as the interface identifying code between the default partition mark after partition mark and the keyword.
In embodiments of the present invention, in order to identify the identifying code in outgoing interface verification short message, other than identifying keyword It also needs to identify default partition mark.It is alternatively possible to using part punctuation mark as default partition mark.
Illustratively, as described in example above:One interface verifies short message:“【Software A】581458 (software A mobile phones are tested Code is demonstrate,proved, please complete to verify), it is such as non-to operate in person, this short message please be ignore ".Can by punctuation mark "】" and punctuation mark ", " As two default partition marks.
It is to be appreciated that in due to verifying short message in interface, identifying code appears in the context of keyword, and is separated by Charactor comparison it is few, it is possible to by way of identifying default partition mark, determine section where identifying code.Further, By existing number between the default partition mark after the default partition mark before the keyword and the keyword Word is as the interface identifying code.
It is to be appreciated why not directly the number in short message is verified in detection excuse to the embodiment of the present invention, it is because borrowing Multiple numbers are frequently present of in mouth verification short message, such as:Identifying code, time, cell-phone number, No. qq or other login accounts etc., So it needs to be determined that identifying code section that may be present, carries out digital extraction again later.
Notably, being not directly using all punctuation marks as default partition mark in embodiments of the present invention Will, but default partition mark is determined according to the interface identifying code short message of magnanimity.
Illustratively, if word " identifying code " is keyword, punctuation mark "】" and punctuation mark ", " be default partition Mark, still by taking example above as an example:One interface verifies short message:“【Software A】581458 (software A mobile phone identifying codes, have been asked At verification), it is such as non-to operate in person, this short message please be ignore ".Default partition mark before keyword be "】", after keyword Default partition mark is ", ", so can be verified in short message and intercept out from interface by two default partition marks "】581458 (software A mobile phone identifying codes please be completed to verify), ", by identifying the number in the part, obtains " 581458 " and tested as interface Demonstrate,prove the identifying code in short message.
Optionally, the method for the default partition mark of setting includes:It is verified in short message from multiple interfaces, filters out the frequency of occurrences More than or equal to the punctuation mark of first frequency threshold value, the first set of symbols is obtained;Calculate the mark in each first set of symbols Point symbol appears in the frequency between identifying code and keyword, the second frequency as each punctuation mark;Described first is accorded with Second frequency is more than the punctuation mark of second frequency threshold value and deletes in number group, obtains the second set of symbols;By second set of symbols Interior punctuation mark indicates as default partition.
It is to be appreciated that should be the frequency of occurrences in interface identifying code short message higher for default partition mark, but occur from The lower punctuation mark of frequency between identifying code and keyword, that is to say, that default partition mark should not be by identifying code and pass Keyword separates, and should separate identifying code and part of the keyword where common with other parts.
S1024:If including multiple keywords in the interface verification short message, it is determined that special key word, the spy Different keyword is that position is highest near a preceding criticality in the interface verifies the multiple keywords for including in short message Keyword, and by before the special key word the default partition mark with it is described default after the special key word Existing number is used as the interface identifying code between partition mark.
Specifically, if there may be multiple keywords for an interface identifying code, criticality is selected from these keywords Highest keyword is as special key word.If there is the criticality highest arranged side by side of multiple keywords, then in these criticalities Position is near preceding one in interface verifies short message for selection in highest keyword arranged side by side, as special key word.
In embodiments of the present invention, it by the extraction to keyword and default partition mark, marks off identifying code and is connecing Section in mouth verification short message, extracts the number in the section as identifying code, realizes the automation point that short message is verified to interface Analysis, extracts identifying code in the case of no manual intervention, improves the degree of automation of entire interface calling procedure.
If since an interface is verified in short message, there are when multiple keywords, it is understood that there may be special key word positioning is inaccurate The case where, it is happened it may occur that identifying code extraction is incorrect.On the other hand, some short messages may there is no clear Position relationship in interface verifies short message of keyword or identifying code and keyword it is more special, then may also cause to test It demonstrate,proves code and extracts mistake.It is to be appreciated that if identifying code extracts mistake, after interface call request is sent to server, The identifying code that server feedback can be received mismatches response, and in order to preferably cope with the above situation, Fig. 3 shows of the invention real The additional extraction flow of identifying code of example offer is applied, the specific implementation principle of each step is as follows.
S301, according to preset keyword database, sentences if the identifying code for receiving server feedback mismatches response It whether there is in the disconnected interface verification short message and leave keyword.
The keyword of leaving is the keyword that not be used to extract the interface identifying code, the keyword database packet Include the correspondence of keyword and criticality.
The embodiment of the present invention is used to cope with the identifying code for receiving server feedback and mismatches the processing procedure after response, In specifically according to the keyword in keyword database extraction interface verification short message method in other inventive embodiments It is described, herein without repeating.
It is to be appreciated that since the identifying code for being connected to server feedback mismatches response, then pass through before proving One keyword extraction crosses interface identifying code, so needing to judge whether also have in interface verification short message in embodiments of the present invention The keyword that not be used to extract interface identifying code leaves keyword.It is to be appreciated that judging result is divided into 3 kinds of situations, point It is not:1, there are one to leave keyword;2, leave keyword there are multiple;3, there is no leave keyword.Of the invention real It applies in example, for above-mentioned 3 kinds of situations, there are 3 kinds of different processing methods.
S302, if there are leaving keyword described in one in interface verification short message, by it is described leave keyword it Described in existing number is used as between preceding default partition mark and the default partition mark left after keyword Interface identifying code.
It is to be appreciated that if only existing one leaves keyword, by being introduced in foregoing embodiments according to key The method of word and default partition mark extraction interface identifying code is carried by leaving keyword and default partition mark in this step Take interface identifying code.
S303, if described leaving keyword comprising multiple in interface verification short message, it is determined that special key word, it is described Special key word be include during the interface verifies short message it is multiple it is described leave keyword in position near a preceding pass Keyword is left described in key degree is highest, and the default partition before the special key word is indicated and the special pass Existing number is used as the interface identifying code between the default partition mark after keyword.
It is to be appreciated that leaving keyword if there is multiple, then one spy of selection in keyword is left from these again Different keyword, and it is again based on this special key word and default partition mark extraction interface identifying code.
S304 notifies user to check the verification if leaving keyword there is no described in interface verification short message Short message or notice server retransmit new verification short message.
In embodiments of the present invention, keyword is left if be not present in interface verification short message, proves to implement above The method of extraction identifying code is not suitable for current interface verification short message in the slave interface verification short message that example is introduced.
Optionally, since what is be likely to occur is fortuitous event, so server can be notified to movement in this case Equipment retransmits an interface and verifies short message, to be reanalysed based on new interface verification short message and extract identifying code.
Optionally, since the method for foregoing embodiments introduction may not be suitable for the word of current interface identifying code short message really Group queueing discipline, so can not automatic identification identifying code, it is therefore desirable to the identifying code for notifying user to check that mobile device receives, and Identifying code is manually entered to transfer interface.
Optionally, although the method for foregoing embodiments introduction may not be suitable for the phrase row of current interface identifying code short message Row rule, but the method for identifying code in other automatic identification interface identifying code short messages can be automatically switched.For example, obstructed reach a standard Keyword, but Direct Recognition goes out the number in short message as identifying code.
In embodiments of the present invention, by judging that interface is verified with the presence or absence of keyword is left in short message, respectively to 3 kinds of feelings Condition carries out different processing methods, improves the ability of reply distinct interface verification short message.
S103 determines Encryption Algorithm according to the device identification, and by the Encryption Algorithm to the interface parameters into Row encryption, generates interface ciphering field.
In embodiments of the present invention, in order to ensure in interface calling procedure, other people can not usurp interface parameters, need pair Interface parameters is encrypted.
Notably, in embodiments of the present invention, the device identification of different mobile devices may correspond to different add Close algorithm so that other people can not know the encryption carried out to interface parameters with which kind of algorithm, thus can not be according to known corresponding Algorithm interface encrypted fields are decrypted.
S104 calculates the abstract of the interface identifying code, makes a summary as identifying code.
In embodiments of the present invention, if identifying code is usurped during interface calls by other people, other people are possible can Relevant interface is called to be based on the identifying code, to make identifying code lose meaning existing for script, in order to ensure identifying code Safety in the transmission process that interface calls, the embodiment of the present invention are encrypted identifying code by signature algorithm.In order to Identifying code is encrypted by signature algorithm, needs the abstract for calculating identifying code first.
It is alternatively possible to calculate the abstract of identifying code by existing MD5 algorithms.
S105 determines signature key according to the device identification, and is made a summary to the identifying code by the signature key Signature operation is carried out, identifying code signature field is generated.
In embodiments of the present invention, different mobile device marks correspond to different signature keys, with prevent other people Identifying code signature field is decoded after intercepting and capturing signature key, is verified code.
Specifically, in the embodiment of the present invention, a signature key includes two parameters, it is assumed that according to preset device identification With signature key mapping table, the parameter that the corresponding signature key of a device identification includes is respectively d and n.Then pass through formula: S=(h (m) ^d) mod n calculate the identifying code signature field, and wherein S is the identifying code signature field, h (m) is verification Code abstract, symbol ^ are that power calculates symbol and symbol mod to take the remainder calculating symbol.
In embodiments of the present invention, interface parameters and identifying code are encrypted respectively by different algorithms, and The algorithm of selection is related to device identification, and different device identifications may correspond to different algorithms, greatly improves interface tune With the data safety degree of some significant datas in the process.
The device identification, the interface ciphering field and the identifying code signature field are assembled into interface by S106 Call request, and the interface call request is sent to server.
In embodiments of the present invention, short message is verified by receiving device identification, interface parameters and the interface of mobile device, It is verified from interface and extracts interface identifying code in short message, and be based on the corresponding algorithm of device identification, interface identifying code is plucked respectively Signature operation is carried out, and interface parameters is encrypted, obtains interface ciphering field and identifying code signature field, and will set Standby mark, interface ciphering field and identifying code signature field are assembled into interface call request, and interface call request is sent To server, to improve automatization level and the safety when interface calls.
Fig. 4 shows the implementation process for the response method that interface provided in an embodiment of the present invention calls, this method flow packet Include step S401 to S407.The specific implementation principle of each step is as follows.
S401, the interface call request that receiving terminal apparatus is sent.
In embodiments of the present invention, there are terminal device, mobile device and servers, and wherein terminal device is for calling The interface of server is to realize that user needs the function of calling, the interface verification that mobile device is used to receive server transmission short Letter, server are used to respond the interface call request of terminal device, corresponding service are provided for terminal device.
In embodiments of the present invention, interface call request is sent by terminal device, and server needs to verify interface tune With the related data in request, judge whether using relevant interface logic to be that terminal device handles data.
S402 parses the device identification of mobile device, interface ciphering field and is tested from the interface call request Demonstrate,prove code signature field.
Due in terminal device side, terminal device is by device identification, interface ciphering field and identifying code signature field It is assembled into interface call request, so isolating this 3 class data from interface call request in server side needs.
S403 determines signature key according to the device identification, and is signed to the identifying code by the signature key Field is decoded operation, is verified code abstract.
Illustratively, it is assumed that in terminal equipment side, the parameter that the corresponding signature key of a device identification includes is respectively d And n.And it is to pass through formula:S=(h (m) ^d) mod n calculate the identifying code signature field, and wherein S is the verification Code signature field, h (m) are identifying code abstract, symbol ^ is that power calculates symbol and symbol mod to take the remainder calculating symbol.
Then in server side, signature key is determined again by device identification, and calculate by the inverse process of signature calculation Go out identifying code abstract fields, such as in this example, by the inverse process of formula S=(h (m) ^d) mod n, in known validation codes Signature field S, signature key parameter d and n under the premise of, calculate identifying code signature field S.
S404 makes a summary according to the identifying code and restores outgoing interface identifying code.
It is to be appreciated that according to the inverse process of the digest algorithm of terminal equipment side, identifying code, which can make a summary to be reduced into, connects Mouth identifying code,
Notably, calculating the calculation of the algorithm or reduction identifying code of making a summary from identifying code of the identifying code abstract of identifying code Method does not need to be distinguished according to different mobile device or terminal device.Due in inventive embodiments described above It can unify to calculate the identifying code that each mobile device receives using MD5 algorithms or other algorithms for calculating abstract, so at this It in inventive embodiments, can also equally unify that identifying code is made a summary and is restored using MD5 algorithms or other algorithms for calculating abstract.
S405 judges that the interface identifying code restored in making a summary from the identifying code is sent to the movement with server and sets Whether standby interface identifying code is identical.
In embodiments of the present invention, server storage has the verification that each mobile device is sent in default unit interval Code, by the device identification of mobile device, server can find the interface identifying code for being sent to the mobile device, so as to To judge that the interface identifying code parsed from the call request of port and server are sent to the interface verification of the mobile device Code is identical.
S406, if the interface identifying code restored from identifying code abstract is sent to the mobile device with server Interface identifying code differ, then to the mobile device send out identifying code mismatch notice.
In embodiments of the present invention, server sends out identifying code to mobile device and mismatches notice, is conducive to prompt user With requests verification code again, or remind its related data of user that may just be usurped by other people.
S407, if the interface identifying code restored from identifying code abstract is sent to the mobile device with server Interface identifying code it is identical, then decipherment algorithm is determined according to the device identification, and by the decipherment algorithm to the interface Calculating is decrypted in encrypted fields, generates interface parameters.
It is to be appreciated that due in terminal equipment side, interface parameters is carried out according to the Encryption Algorithm that device identification determines Encryption, so in embodiments of the present invention, server can determine corresponding decipherment algorithm also according to device identification, and Calculating is decrypted to the interface ciphering field by decipherment algorithm, generates interface parameters.
S408, if there is the parameter consistent with the interface parameters in the server, according to the interface parameters pair The pending data that the interface logic answered sends the terminal is handled.
It is to be appreciated that user's purpose of input interface parameter in terminal device is the relevant interface of invoking server, So in embodiments of the present invention, server needs to judge that book server is set with the presence or absence of the interface parameters of an interface with terminal Interface parameters in the interface call request that preparation is sent is consistent, if unanimously, patrolled according to the corresponding interface of the interface parameters The pending data for sending the terminal is collected to handle.
In embodiments of the present invention, the interface call request sent by receiving terminal apparatus;From interface call request Parse device identification, interface ciphering field and the identifying code signature field of mobile device;It is determined and is signed according to device identification Key, and operation is decoded to identifying code signature field by signature key, it is verified code abstract;It is made a summary according to identifying code Restore outgoing interface identifying code;If interface identifying code is sent to server, the interface identifying code of mobile device is identical, and basis is set Standby mark determines decipherment algorithm, and calculating is decrypted to interface encrypted fields by decipherment algorithm, generates interface parameters;If clothes It is engaged in the presence of the parameter consistent with interface parameters in device, then terminal is sent according to interface parameters corresponding interface logic pending Data are handled, and to verify the interface call request of terminal device transmission automatically, promote the degree of automation of whole system.
It should be understood that the size of the serial number of each step is not meant that the order of the execution order in above-described embodiment, each process Execution sequence should be determined by its function and internal logic, the implementation process without coping with the embodiment of the present invention constitutes any limit It is fixed.
Corresponding to the interface call method described in foregoing embodiments, Fig. 5 shows interface tune provided in an embodiment of the present invention It is illustrated only and the relevant part of the embodiment of the present invention for convenience of description with the structure diagram of device.
With reference to Fig. 5, which includes:
Receiving unit 51, device identification, interface parameters and server for receiving mobile device are sent to the shifting The interface of dynamic equipment verifies short message;
Extraction unit 52 extracts interface identifying code for extracting to verify from the interface in short message;
Generation unit 53, for determining Encryption Algorithm according to the device identification, and by the Encryption Algorithm to described Interface parameters is encrypted, and generates interface ciphering field;
Computing unit 54, the abstract for calculating the interface identifying code are made a summary as identifying code;
Signature unit 55, for determining signature key according to the device identification, and by the signature key to described Identifying code abstract carries out signature operation, generates identifying code signature field;
Module units 56 is used for the device identification, the interface ciphering field and the identifying code signature field It is assembled into interface call request, and the interface call request is sent to server.
Optionally, the signature unit 55 includes:
Parameter determination subelement determines the label for the correspondence according to preset device identification and signature key Name key, the signature key includes parameter d and parameter n;
Digest calculations subelement, for calculating the identifying code signature field by formula S=(h (m) ^d) mod n, Wherein S is the identifying code signature field, h (m) is identifying code abstract, symbol ^ is that power calculates symbol and symbol mod to take the remainder Calculate symbol.
In the embodiment of the present invention, in embodiments of the present invention, by receive the device identification of mobile device, interface parameters with And interface verifies short message, is verified from interface and extracts interface identifying code in short message, and is based on the corresponding algorithm of device identification, it is right respectively The abstract of interface identifying code carries out signature operation, and interface parameters is encrypted, and obtains interface ciphering field and identifying code Signature field, and device identification, interface ciphering field and identifying code signature field are assembled into interface call request, and will connect Mouth call request is sent to server, to improve automatization level and the safety when interface calls.
Corresponding to the response method that the interface described in foregoing embodiments calls, Fig. 6 shows provided in an embodiment of the present invention The structure diagram for the responding device that interface calls illustrates only and the relevant part of the embodiment of the present invention for convenience of description.
Receiving unit 61, the interface call request sent for receiving terminal apparatus.
Resolution unit 62, device identification, interface ciphering for parsing mobile device from the interface call request Field and identifying code signature field.
Decoding unit 63, for determining signature key according to the device identification, and by the signature key to described Identifying code signature field is decoded operation, is verified code abstract.
Reduction unit 64 restores outgoing interface identifying code for making a summary according to the identifying code.
Judging unit 65, for judging that the interface identifying code restored in making a summary from the identifying code is sent to server Whether the interface identifying code of the mobile device is identical.
First execution unit 66, if the interface identifying code for being restored from identifying code abstract is sent with server It is identical to the interface identifying code of the mobile device, then decipherment algorithm is determined according to the device identification, and pass through the decryption Calculating is decrypted to the interface ciphering field in algorithm, generates interface parameters.
Second execution unit 67, if for there is the parameter consistent with the interface parameters, basis in the server The pending data that the corresponding interface logic of the interface parameters sends the terminal is handled.
In embodiments of the present invention, the interface call request sent by receiving terminal apparatus;From interface call request Parse device identification, interface ciphering field and the identifying code signature field of mobile device;It is determined and is signed according to device identification Key, and operation is decoded to identifying code signature field by signature key, it is verified code abstract;It is made a summary according to identifying code Restore outgoing interface identifying code;If interface identifying code is sent to server, the interface identifying code of mobile device is identical, and basis is set Standby mark determines decipherment algorithm, and calculating is decrypted to interface encrypted fields by decipherment algorithm, generates interface parameters;If clothes It is engaged in the presence of the parameter consistent with interface parameters in device, then terminal is sent according to interface parameters corresponding interface logic pending Data are handled, and to verify the interface call request of terminal device transmission automatically, promote the degree of automation of whole system.
Fig. 7 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in fig. 7, the terminal of the embodiment is set Standby 7 include:Processor 70, memory 71 and it is stored in the meter that can be run in the memory 71 and on the processor 70 Calculation machine program 72, such as interface caller.The processor 70 realizes above-mentioned each connect when executing the computer program 72 Step in mouthful call method embodiment, such as step 101 shown in FIG. 1 is to 106.Alternatively, the processor 70 execute it is described The function of each module/unit in above-mentioned each device embodiment, such as unit 51 to 56 shown in Fig. 5 are realized when computer program 72 Function.
Illustratively, the computer program 72 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 71, and are executed by the processor 70, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 72 in the terminal device 7 is described.
The terminal device 7 can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set It is standby.The terminal device may include, but be not limited only to, processor 70, memory 71.It will be understood by those skilled in the art that Fig. 7 The only example of terminal device 7 does not constitute the restriction to terminal device 7, may include than illustrating more or fewer portions Part either combines certain components or different components, such as the terminal device can also include input-output equipment, net Network access device, bus etc..
Alleged processor 70 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 71 can be the internal storage unit of the terminal device 7, such as the hard disk of terminal device 7 or interior It deposits.The memory 71 can also be to be equipped on the External memory equipment of the terminal device 7, such as the terminal device 7 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge Deposit card (Flash Card) etc..Further, the memory 71 can also both include the storage inside list of the terminal device 7 Member also includes External memory equipment.The memory 71 is for storing needed for the computer program and the terminal device Other programs and data.The memory 71 can be also used for temporarily storing the data that has exported or will export.
Fig. 8 is the schematic diagram for the server that one embodiment of the invention provides.As shown in figure 8, the server 8 of the embodiment wraps It includes:Processor 80, memory 81 and it is stored in the computer that can be run in the memory 81 and on the processor 80 Program 82, for example, interface call responder.The processor 80 is realized above-mentioned each when executing the computer program 82 Step in the response method embodiment that interface calls, such as step 401 shown in FIG. 1 is to 407.Alternatively, the processor 80 The function of each module/unit in above-mentioned each device embodiment, such as unit shown in Fig. 6 are realized when executing the computer program 82 66 to 67 function.
Illustratively, the computer program 82 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 81, and are executed by the processor 80, to complete the present invention.Described one A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for Implementation procedure of the computer program 82 in the server 8 is described.
The server 8 can be the computing devices such as desktop PC, notebook, palm PC and cloud server. The server may include, but be not limited only to, processor 80, memory 81.It will be understood by those skilled in the art that Fig. 8 is only It is the example of server 8, does not constitute the restriction to server 8, may include than illustrating more or fewer components or group Close certain components or different components, for example, the server can also include input-output equipment, network access equipment, Bus etc..
Alleged processor 80 can be central processing unit (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 81 can be the internal storage unit of the server 8, such as the hard disk or memory of server 8. The memory 81 can also be that the plug-in type that is equipped on the External memory equipment of the server 8, such as the server 8 is hard Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the memory 81 can also both include the internal storage unit of the server 8 or wrap Include External memory equipment.The memory 81 is used to store other programs needed for the computer program and the server And data.The memory 81 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each work( Can unit, module division progress for example, in practical application, can be as needed and by above-mentioned function distribution by different Functional unit, module are completed, i.e., the internal structure of described device are divided into different functional units or module, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used It, can also be above-mentioned integrated during two or more units are integrated in one unit to be that each unit physically exists alone The form that hardware had both may be used in unit is realized, can also be realized in the form of SFU software functional unit.In addition, each function list Member, the specific name of module are also only to facilitate mutually distinguish, the protection domain being not intended to limit this application.Above system The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment The part of load may refer to the associated description of other embodiments.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list The form that hardware had both may be used in member is realized, can also be realized in the form of SFU software functional unit.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or In use, can be stored in a computer read/write memory medium.Based on this understanding, the present invention realizes above-mentioned implementation All or part of flow in example method, can also instruct relevant hardware to complete, the meter by computer program Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on The step of stating each embodiment of the method.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to aforementioned reality Applying example, invention is explained in detail, it will be understood by those of ordinary skill in the art that:It still can be to aforementioned each Technical solution recorded in embodiment is modified or equivalent replacement of some of the technical features;And these are changed Or replace, the spirit and scope for various embodiments of the present invention technical solution that it does not separate the essence of the corresponding technical solution should all It is included within protection scope of the present invention.

Claims (10)

1. a kind of interface call method, which is characterized in that including:
The interface verification that device identification, interface parameters and the server of reception mobile device are sent to the mobile device is short Letter;
It is verified from the interface and extracts interface identifying code in short message;
Encryption Algorithm is determined according to the device identification, and the interface parameters is encrypted by the Encryption Algorithm, it is raw At interface ciphering field;
The abstract for calculating the interface identifying code is made a summary as identifying code;
Signature key is determined according to the device identification, and signature fortune is carried out to identifying code abstract by the signature key It calculates, generates identifying code signature field;
The device identification, the interface ciphering field and the identifying code signature field are assembled into interface call request, And the interface call request is sent to server.
2. interface call method as described in claim 1, which is characterized in that extract and connect in the verification short message from the interface Mouth identifying code, including:
According to preset keyword database, the keyword for including in the interface verification short message and the keyword pair are identified The criticality answered, the keyword database include the correspondence of keyword and criticality;
If only including a keyword in the interface verification short message, by the default partition mark before the keyword Existing number is used as the interface identifying code between the default partition mark after the keyword;
If including multiple keywords in the interface verification short message, it is determined that special key word, the special key word are Position is near a preceding highest keyword of criticality in the interface verifies the multiple keywords for including in short message, and incites somebody to action The default partition mark before the special key word and the default partition mark after the special key word Between it is existing number be used as the interface identifying code.
3. interface call method as described in claim 1, which is characterized in that described to determine that signature is close according to the device identification Key, and signature operation is carried out to identifying code abstract by the signature key, identifying code signature field is generated, including:
According to the correspondence of preset device identification and signature key, determine that the signature key, the signature key include Parameter d and parameter n;
The identifying code signature field is calculated by formula S=(h (m) ^d) mod n, wherein S is identifying code signature word Section, h (m) are identifying code abstract, symbol ^ is that power calculates symbol and symbol mod to take the remainder calculating symbol.
4. interface call method as described in claim 1, which is characterized in that further include:
If the identifying code for receiving server feedback mismatches response, according to preset keyword database, connect described in judgement With the presence or absence of keyword is left in mouth verification short message, the keyword of leaving is the pass that not be used to extract the interface identifying code Keyword, the keyword database include the correspondence of keyword and criticality;
If existing in interface verification short message and leaving keyword described in one, by it is described leave keyword before preset every Existing number is as the interface identifying code between disconnected mark and the default partition mark left after keyword;
If described leaving keyword comprising multiple in interface verification short message, it is determined that special key word, the special key Word be include during the interface verifies short message it is multiple it is described leave keyword in position near a preceding criticality highest It is described leave keyword, and by before the special key word the default partition mark and the special key word after The default partition mark between existing number be used as the interface identifying code;
If leaving keyword there is no described in the interface verification short message, user is notified to check the verification short message or notice Server retransmits new verification short message.
5. the response method that a kind of interface calls, which is characterized in that including:
The interface call request that receiving terminal apparatus is sent;
Device identification, interface ciphering field and the identifying code signature word of mobile device are parsed from the interface call request Section;
Signature key is determined according to the device identification, and the identifying code signature field is solved by the signature key Code operation is verified code abstract;
It is made a summary according to the identifying code and restores outgoing interface identifying code;
If the interface that the interface identifying code restored from identifying code abstract is sent to mobile device with server is tested It is identical to demonstrate,prove code, then decipherment algorithm is determined according to the device identification, and by the decipherment algorithm to the interface ciphering field Calculating is decrypted, generates interface parameters;
If there is the parameter consistent with the interface parameters in the server, patrolled according to the corresponding interface of the interface parameters The pending data for sending the terminal is collected to handle.
6. a kind of terminal device, including memory and processor, it is stored with and can transports on the processor in the memory Capable computer program, which is characterized in that when the processor executes the computer program, realize following steps:
The interface verification that device identification, interface parameters and the server of reception mobile device are sent to the mobile device is short Letter;
It is verified from the interface and extracts interface identifying code in short message;
Encryption Algorithm is determined according to the device identification, and the interface parameters is encrypted by the Encryption Algorithm, it is raw At interface ciphering field;
The abstract for calculating the interface identifying code is made a summary as identifying code;
Signature key is determined according to the device identification, and signature fortune is carried out to identifying code abstract by the signature key It calculates, generates identifying code signature field;
The device identification, the interface ciphering field and the identifying code signature field are assembled into interface call request, And the interface call request is sent to server.
7. terminal device as claimed in claim 6, which is characterized in that extraction interface is tested in the verification short message from the interface The step of demonstrate,proving code, specifically includes:
According to preset keyword database, the keyword for including in the interface verification short message and the keyword pair are identified The criticality answered, the keyword database include the correspondence of keyword and criticality;
If only including a keyword in the interface verification short message, by the default partition mark before the keyword Existing number is used as the interface identifying code between the default partition mark after the keyword;
If including multiple keywords in the interface verification short message, it is determined that special key word, the special key word are Position is near a preceding highest keyword of criticality in the interface verifies the multiple keywords for including in short message, and incites somebody to action The default partition mark before the special key word and the default partition mark after the special key word Between it is existing number be used as the interface identifying code.
8. a kind of server, including memory and processor, it is stored with and can runs on the processor in the memory Computer program, which is characterized in that when the processor executes the computer program, realize following steps:
Receive the interface call request that terminal is sent;
Device identification, interface ciphering field and the identifying code signature word of mobile device are parsed from the interface call request Section;
Signature key is determined according to the device identification, and the identifying code signature field is solved by the signature key Code operation is verified code abstract;
It is made a summary according to the identifying code and restores outgoing interface identifying code;
If the interface identifying code restored from identifying code abstract is sent to connecing for the mobile device with server Mouth identifying code is identical, then determines decipherment algorithm according to the device identification, and by the decipherment algorithm to the interface ciphering Calculating is decrypted in field, generates interface parameters;
If there is the parameter consistent with the interface parameters in the server, patrolled according to the corresponding interface of the interface parameters The pending data for sending the terminal is collected to handle.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In when the computer program is executed by processor the step of any one of such as Claims 1-4 of realization the method.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, feature to exist In the step of computer program realizes method as claimed in claim 5 when being executed by processor.
CN201810001742.4A 2018-01-02 2018-01-02 The response method and server that interface call method and terminal device, interface call Active CN108365961B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810001742.4A CN108365961B (en) 2018-01-02 2018-01-02 The response method and server that interface call method and terminal device, interface call
PCT/CN2018/097311 WO2019134361A1 (en) 2018-01-02 2018-07-27 Method and device for calling an interface and responding to an interface call, electronic device, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810001742.4A CN108365961B (en) 2018-01-02 2018-01-02 The response method and server that interface call method and terminal device, interface call

Publications (2)

Publication Number Publication Date
CN108365961A true CN108365961A (en) 2018-08-03
CN108365961B CN108365961B (en) 2019-07-19

Family

ID=63010948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810001742.4A Active CN108365961B (en) 2018-01-02 2018-01-02 The response method and server that interface call method and terminal device, interface call

Country Status (2)

Country Link
CN (1) CN108365961B (en)
WO (1) WO2019134361A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189509A (en) * 2018-09-03 2019-01-11 中国平安人寿保险股份有限公司 The response method and server that call method, the interface of interface call
CN109347843A (en) * 2018-10-26 2019-02-15 深圳点猫科技有限公司 A kind of parameter confidentiality agreement and electronic equipment based on educational system
CN109376021A (en) * 2018-09-26 2019-02-22 深圳壹账通智能科技有限公司 The response method and server that interface calls
CN109446052A (en) * 2018-09-03 2019-03-08 平安普惠企业管理有限公司 A kind of method of calibration and equipment of application program
CN109492358A (en) * 2018-09-25 2019-03-19 国网浙江省电力有限公司信息通信分公司 A kind of open interface uniform authentication method
CN109818746A (en) * 2018-12-28 2019-05-28 深圳竹云科技有限公司 A kind of method of safe offer restful interface
CN109993759A (en) * 2019-02-27 2019-07-09 深圳点猫科技有限公司 A kind of data calling method and device for education resource platform
CN110381114A (en) * 2019-06-14 2019-10-25 平安科技(深圳)有限公司 Processing method, device, terminal device and the medium of interface requests parameter
CN110457564A (en) * 2019-07-31 2019-11-15 深圳市钱海网络技术有限公司 A kind of plaintext parameter transmission method and device for browser
CN110851210A (en) * 2019-11-12 2020-02-28 北京字节跳动网络技术有限公司 Interface program calling method, device, equipment and storage medium
CN110891249A (en) * 2019-12-31 2020-03-17 合肥美的智能科技有限公司 Short message interface allocation method, server, client and system
CN111182025A (en) * 2019-11-26 2020-05-19 腾讯科技(深圳)有限公司 Message processing method, device, server and storage medium
CN111756544A (en) * 2020-05-11 2020-10-09 北京明略软件系统有限公司 Interface calling validity checking method and device
CN114996040A (en) * 2022-08-04 2022-09-02 飞天诚信科技股份有限公司 Service interface calling method and device
CN117834312A (en) * 2024-03-06 2024-04-05 鼎铉商用密码测评技术(深圳)有限公司 Network access method, network access device, and computer-readable storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499904A (en) * 2008-02-01 2009-08-05 华为技术有限公司 Method, apparatus and system for safe interface call
CN102238193A (en) * 2011-08-09 2011-11-09 深圳市德卡科技有限公司 Data authentication method and system using same
US20110314271A1 (en) * 2010-06-18 2011-12-22 Intertrust Technologies Corporation Secure Processing Systems and Methods
US20120089519A1 (en) * 2010-10-06 2012-04-12 Prasad Peddada System and method for single use transaction signatures
CN103067402A (en) * 2013-01-10 2013-04-24 天地融科技股份有限公司 Method and system for digital certificate generation
CN104618120A (en) * 2015-03-04 2015-05-13 青岛微智慧信息有限公司 Digital signature method for escrowing private key of mobile terminal
CN105159533A (en) * 2015-08-31 2015-12-16 努比亚技术有限公司 Mobile terminal and automatic verification code input method thereof
CN106656953A (en) * 2016-09-23 2017-05-10 焦点科技股份有限公司 Method for realizing safe interface calling between systems based on Internet

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7987451B1 (en) * 2006-11-20 2011-07-26 Mcafee, Inc. System, method and computer program product for verifying invocations of interfaces
US20140279455A1 (en) * 2013-03-18 2014-09-18 Boku, Inc. Merchant managed subscriptions at a billing server
CN106101258B (en) * 2016-07-08 2021-05-25 腾讯科技(深圳)有限公司 Interface calling method, device and system of hybrid cloud

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499904A (en) * 2008-02-01 2009-08-05 华为技术有限公司 Method, apparatus and system for safe interface call
US20110314271A1 (en) * 2010-06-18 2011-12-22 Intertrust Technologies Corporation Secure Processing Systems and Methods
US20120089519A1 (en) * 2010-10-06 2012-04-12 Prasad Peddada System and method for single use transaction signatures
CN102238193A (en) * 2011-08-09 2011-11-09 深圳市德卡科技有限公司 Data authentication method and system using same
CN103067402A (en) * 2013-01-10 2013-04-24 天地融科技股份有限公司 Method and system for digital certificate generation
CN104618120A (en) * 2015-03-04 2015-05-13 青岛微智慧信息有限公司 Digital signature method for escrowing private key of mobile terminal
CN105159533A (en) * 2015-08-31 2015-12-16 努比亚技术有限公司 Mobile terminal and automatic verification code input method thereof
CN106656953A (en) * 2016-09-23 2017-05-10 焦点科技股份有限公司 Method for realizing safe interface calling between systems based on Internet

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109446052B (en) * 2018-09-03 2023-12-19 中企瑞铭科技(北京)有限公司 Verification method and device for application program
CN109446052A (en) * 2018-09-03 2019-03-08 平安普惠企业管理有限公司 A kind of method of calibration and equipment of application program
CN109189509A (en) * 2018-09-03 2019-01-11 中国平安人寿保险股份有限公司 The response method and server that call method, the interface of interface call
CN109189509B (en) * 2018-09-03 2024-04-26 中国平安人寿保险股份有限公司 Interface calling method, interface calling response method and server
CN109492358A (en) * 2018-09-25 2019-03-19 国网浙江省电力有限公司信息通信分公司 A kind of open interface uniform authentication method
CN109376021A (en) * 2018-09-26 2019-02-22 深圳壹账通智能科技有限公司 The response method and server that interface calls
CN109347843A (en) * 2018-10-26 2019-02-15 深圳点猫科技有限公司 A kind of parameter confidentiality agreement and electronic equipment based on educational system
CN109818746A (en) * 2018-12-28 2019-05-28 深圳竹云科技有限公司 A kind of method of safe offer restful interface
CN109993759A (en) * 2019-02-27 2019-07-09 深圳点猫科技有限公司 A kind of data calling method and device for education resource platform
CN110381114A (en) * 2019-06-14 2019-10-25 平安科技(深圳)有限公司 Processing method, device, terminal device and the medium of interface requests parameter
CN110457564A (en) * 2019-07-31 2019-11-15 深圳市钱海网络技术有限公司 A kind of plaintext parameter transmission method and device for browser
CN110851210A (en) * 2019-11-12 2020-02-28 北京字节跳动网络技术有限公司 Interface program calling method, device, equipment and storage medium
CN111182025A (en) * 2019-11-26 2020-05-19 腾讯科技(深圳)有限公司 Message processing method, device, server and storage medium
CN111182025B (en) * 2019-11-26 2021-04-20 腾讯科技(深圳)有限公司 Message processing method, device, server and storage medium
CN110891249A (en) * 2019-12-31 2020-03-17 合肥美的智能科技有限公司 Short message interface allocation method, server, client and system
CN111756544A (en) * 2020-05-11 2020-10-09 北京明略软件系统有限公司 Interface calling validity checking method and device
CN114996040A (en) * 2022-08-04 2022-09-02 飞天诚信科技股份有限公司 Service interface calling method and device
CN114996040B (en) * 2022-08-04 2022-10-04 飞天诚信科技股份有限公司 Service interface calling method and device
CN117834312A (en) * 2024-03-06 2024-04-05 鼎铉商用密码测评技术(深圳)有限公司 Network access method, network access device, and computer-readable storage medium

Also Published As

Publication number Publication date
CN108365961B (en) 2019-07-19
WO2019134361A1 (en) 2019-07-11

Similar Documents

Publication Publication Date Title
CN108365961B (en) The response method and server that interface call method and terminal device, interface call
CN108551443A (en) A kind of application login method, device, terminal device and storage medium
CN110414567B (en) Data processing method and device and electronic equipment
Sharp Principles of protocol design
CN111241517A (en) Method and device for constructing biological characteristic verification question-answer library
CN108494557A (en) Social security digital certificate management method, computer readable storage medium and terminal device
CN108366052A (en) Verify the processing method and system of short message
CN104767714A (en) Method, terminal and system for associating user resource information
CN105337739B (en) Safe login method, device, server and terminal
CN108322366A (en) Access the methods, devices and systems of network
CN109729303A (en) Meeting provides the connection terminal variation in device and described device
CN108965324A (en) A kind of anti-brush method of short message verification code, terminal, server, equipment and medium
CN102799820B (en) A kind of restoration methods of user cipher
CN112311624B (en) Cloud host testing method and device, storage medium and electronic equipment
CN114003510A (en) Script testing method, device, equipment and medium based on Mock service
CN108540591A (en) Book management method, address book management device and electronic equipment
CN109041049A (en) A kind of addressing method of mobile terminal, device for addressing and terminal device
CN109167751A (en) A kind of addressing method of mobile terminal, server and mobile terminal
CN113158196A (en) Login verification method, device, equipment and medium
CN108156273A (en) A kind of anonymous ID generation methods, device and electronic equipment
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN110381114B (en) Interface request parameter processing method and device, terminal equipment and medium
CN107786308B (en) Data transmission method and terminal device
CN110177096A (en) Client certificate method, apparatus, medium and calculating equipment
CN110602218A (en) Method and related device for assembling cloud service in user-defined manner

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1257524

Country of ref document: HK