Tagged articles
67 articles
Page 1 of 1
Architect's Guide
Architect's Guide
Mar 2, 2026 · Information Security

Essential API Security Measures and How to Implement Them

This article outlines key API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist control, and data validation—and provides practical Java code examples and implementation guidelines for each technique.

API SecurityAppIddata validation
0 likes · 10 min read
Essential API Security Measures and How to Implement Them
Test Development Learning Exchange
Test Development Learning Exchange
Jan 28, 2026 · Information Security

One-Line Python Decorator to Auto‑Encrypt, Sign, and Secure API Requests

Learn how to replace repetitive manual signing, encryption, timestamp, and nonce handling in API tests with a single Python @secure_request decorator that automatically encrypts specified fields, adds security parameters, generates signatures, and sends the request, improving maintainability and reducing errors.

API SecurityDecoratorencryption
0 likes · 9 min read
One-Line Python Decorator to Auto‑Encrypt, Sign, and Secure API Requests
Top Architect
Top Architect
Oct 5, 2025 · Information Security

Securing Third‑Party APIs: AK/SK Generation, Signature Rules, and Anti‑Replay Strategies

This guide explains how to secure third‑party APIs by generating unique Access Key/Secret Key pairs, designing signature processes with timestamps and nonces, implementing permission division, creating robust API endpoints, and applying best‑practice security measures such as HTTPS, token handling, rate limiting, and idempotency.

AK/SKAPI SecurityAnti-replay
0 likes · 33 min read
Securing Third‑Party APIs: AK/SK Generation, Signature Rules, and Anti‑Replay Strategies
Architect
Architect
Oct 1, 2025 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures

This article presents a comprehensive guide to designing secure third‑party APIs, covering the generation and management of Access Key/Secret Key pairs, signature creation, timestamp and nonce anti‑replay techniques, token handling, request throttling, IP whitelisting, idempotency, versioning, response standards, and practical code examples in Java and SQL.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, Tokens and Anti‑Replay Measures
Architect's Guide
Architect's Guide
Sep 4, 2025 · Information Security

How to Secure Public APIs: Essential Measures and Java Implementation Guide

This article outlines essential security measures for public APIs—including data encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—explaining why each is needed and providing concrete Java implementation examples such as HTTPS, MD5 signatures, token‑bucket algorithms, and RateLimiter usage.

API SecurityAppIdencryption
0 likes · 10 min read
How to Secure Public APIs: Essential Measures and Java Implementation Guide
Architect's Must-Have
Architect's Must-Have
Jun 6, 2025 · Backend Development

How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot

This article explains practical methods for protecting data exchanged with third‑party systems by using access tokens, timestamps, cryptographic signatures, and anti‑duplicate‑submission techniques, and provides complete Spring Boot code examples for token generation, validation, Redis storage, and request interception.

API SecurityBackend DevelopmentSpring Boot
0 likes · 24 min read
How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot
Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API SecurityAccess KeyAuthentication
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
Architect's Guide
Architect's Guide
Mar 31, 2025 · Information Security

Design and Security Practices for Third‑Party API Authentication and Signing

This article presents a comprehensive design scheme for third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, secure API endpoint design, anti‑replay mechanisms, token handling, TLS encryption, database schema, and implementation examples in Java.

API SecurityAccess KeyAuthentication
0 likes · 30 min read
Design and Security Practices for Third‑Party API Authentication and Signing
Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 25, 2025 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices

This guide details a secure third‑party API design, covering API key generation, request signing with timestamps and nonces, permission division, CRUD endpoint definitions, unified response structures, and best‑practice security measures such as HTTPS, IP whitelisting, rate limiting, logging, and idempotency handling.

API SecurityAuthenticationBackend
0 likes · 29 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices
Top Architect
Top Architect
Jan 22, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission granularity, implementing signature generation with timestamps and nonces, handling token lifecycle, and providing concrete Java and SQL code examples for practical deployment.

AK/SKAPI SecurityAuthentication
0 likes · 31 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management
Tencent Cloud Developer
Tencent Cloud Developer
Jan 14, 2025 · Information Security

Can Database Signatures Prevent Tampering? An Analysis of Financial Risk Controls

The article revisits the debate on tampering with WeChat balances, explaining that joint database signatures can detect but not stop alterations, that risk‑control checks and code safeguards block unauthorized withdrawals, that identity verification prevents cross‑account transfers, and that a layered, real‑time monitoring system is essential for robust fund protection.

Database SecurityWeChatfinancial fraud
0 likes · 6 min read
Can Database Signatures Prevent Tampering? An Analysis of Financial Risk Controls
Top Architect
Top Architect
Dec 6, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, anti‑replay mechanisms, token handling, detailed API endpoint specifications, and best‑practice security measures with illustrative Java code examples.

AK/SKAPI SecurityAuthentication
0 likes · 32 min read
Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens
Architect
Architect
Dec 3, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Signatures, and Token Strategies

This guide presents a comprehensive design for securing third‑party API calls, covering Access Key/Secret Key generation, permission granularity, timestamp and nonce based replay protection, signature creation and verification, token handling, TLS encryption, rate limiting, logging, and practical Java code examples.

API SecurityAccess KeyJava
0 likes · 28 min read
How to Secure Third‑Party APIs with AK/SK, Signatures, and Token Strategies
Architect
Architect
Jul 15, 2024 · Information Security

Secure OpenAPI Design: AppId/AppSecret, RSA Signatures, Timestamp & Nonce Best Practices

This article explains how to secure OpenAPI interfaces by using globally unique AppId/AppSecret pairs, SHA‑256 and RSA signatures, timestamp and nonce validation, caching, rate‑limiting, parameter validation, and encryption algorithms, providing complete client‑server implementation examples in Java.

API SecurityJavaOpenAPI
0 likes · 26 min read
Secure OpenAPI Design: AppId/AppSecret, RSA Signatures, Timestamp & Nonce Best Practices
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API SecurityHTTPSWeChat Pay
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Top Architect
Top Architect
May 6, 2024 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management

This article presents a comprehensive design for secure third‑party API interfaces, covering API key generation (Access Key/Secret Key), request signing with timestamps and nonces, token handling, permission granularity, anti‑replay measures, HTTPS encryption, and practical RESTful endpoint examples with code snippets.

Access KeyBackendsignature
0 likes · 30 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management
Architect
Architect
May 4, 2024 · Information Security

How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies

This article walks through a complete security design for third‑party APIs, covering API‑key generation, request signing with timestamps and nonces, token handling, permission granularity, database schema, and practical implementation details such as rate limiting, idempotency, and TLS encryption.

API SecurityAuthenticationBackend
0 likes · 34 min read
How to Secure Third‑Party APIs with AK/SK, Tokens, and Signature Strategies
Architecture Digest
Architecture Digest
Apr 24, 2024 · Information Security

Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce

The article presents a comprehensive guide to designing secure third‑party APIs, covering access‑key/secret‑key generation, token management, signature algorithms, timestamp and nonce anti‑replay mechanisms, permission granularity, request logging, rate limiting, and example Java and SQL implementations.

Access KeySecret KeyToken
0 likes · 28 min read
Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce
Goodme Frontend Team
Goodme Frontend Team
Jan 30, 2024 · Frontend Development

How to Build a Signature Pad in DingTalk Mini Programs with Taro & React

Learn step‑by‑step how to create a signature board for DingTalk mini‑programs using Taro and React, covering canvas creation, drawing logic, size adjustments, image export, undo functionality, landscape mode handling, and common pitfalls, so you can add reliable boss‑signed reports to your app.

Canvasfrontendmini-program
0 likes · 11 min read
How to Build a Signature Pad in DingTalk Mini Programs with Taro & React
Selected Java Interview Questions
Selected Java Interview Questions
Nov 23, 2023 · Backend Development

Common Issues and Solutions When Integrating Third‑Party APIs

This article outlines typical problems such as unreachable domains, signature errors, token expiration, timeouts, HTTP 500/404 responses, pagination inconsistencies, undocumented field changes, and billing issues, and provides practical troubleshooting and mitigation strategies for backend developers working with third‑party APIs.

Error Handlingapi-integrationretry mechanism
0 likes · 15 min read
Common Issues and Solutions When Integrating Third‑Party APIs
macrozheng
macrozheng
Sep 14, 2023 · Information Security

How to Secure API Endpoints: Prevent Tampering and Replay Attacks with SpringBoot

This article explains why public APIs need protection, outlines anti‑tampering and anti‑replay strategies using timestamps and nonces, and provides complete SpringBoot code—including request signing, filter implementation, and Redis utilities—to safeguard API calls from manipulation and replay attacks.

API SecurityAnti-replayBackend
0 likes · 15 min read
How to Secure API Endpoints: Prevent Tampering and Replay Attacks with SpringBoot
Su San Talks Tech
Su San Talks Tech
Jun 10, 2023 · Information Security

How to Secure Your Public APIs: Anti‑Tampering and Anti‑Replay Strategies in Spring Boot

This article explains why publicly exposed APIs are vulnerable, describes the concepts of anti‑tampering and anti‑replay protection, and provides a complete Spring Boot implementation—including request signing, timestamp and nonce validation, and Redis‑based replay detection—to safeguard API endpoints.

API SecurityAnti-replayJava
0 likes · 15 min read
How to Secure Your Public APIs: Anti‑Tampering and Anti‑Replay Strategies in Spring Boot
IT Services Circle
IT Services Circle
May 9, 2023 · Backend Development

Common Issues and Solutions When Integrating Third-Party APIs

This article outlines typical problems such as domain inaccessibility, signature errors, token expiration, timeouts, HTTP 500/404 responses, inconsistent documentation, and provides practical debugging and mitigation strategies for developers working with third‑party API integrations.

BackendError Handlingapi-integration
0 likes · 15 min read
Common Issues and Solutions When Integrating Third-Party APIs
Architect's Guide
Architect's Guide
Apr 22, 2023 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamp validation, AppId authentication, rate limiting, blacklist handling, and data validation—and provides practical Java implementation examples for each technique.

API SecurityJavaencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
Java Backend Technology
Java Backend Technology
Apr 17, 2023 · Backend Development

12 Common Pitfalls When Integrating Third‑Party APIs and How to Fix Them

This article outlines the most frequent problems encountered when calling third‑party APIs—such as domain inaccessibility, signature errors, token expiration, missing data, timeouts, and undocumented changes—and provides practical solutions and best‑practice recommendations for backend developers.

Error Handlingapi-integrationretry logic
0 likes · 15 min read
12 Common Pitfalls When Integrating Third‑Party APIs and How to Fix Them
Su San Talks Tech
Su San Talks Tech
Dec 12, 2022 · Backend Development

Designing Secure and Robust APIs: Signatures, Encryption, Rate Limiting, and More

This article outlines essential practices for building secure, reliable API interfaces—including request signing, data encryption, IP whitelisting, rate limiting, parameter validation, unified responses, exception handling, logging, idempotency, payload limits, performance testing, asynchronous processing, data masking, and comprehensive documentation—to help developers meet safety, stability, and maintainability requirements.

IdempotencySecurityapi-design
0 likes · 15 min read
Designing Secure and Robust APIs: Signatures, Encryption, Rate Limiting, and More
Architecture Digest
Architecture Digest
Oct 7, 2021 · Backend Development

Designing Open Platform APIs: Application Registration, OAuth2 Authorization, Request Parameters, and Signature Verification

This article outlines a practical approach to designing open‑platform APIs, covering service‑provider application registration, usability, security, OAuth2‑based authorization, systematic and business request parameters, signature generation, verification, and best‑practice code examples.

BackendOAuth2Open Platform
0 likes · 9 min read
Designing Open Platform APIs: Application Registration, OAuth2 Authorization, Request Parameters, and Signature Verification
macrozheng
macrozheng
Jun 9, 2021 · Information Security

Secure API Authentication: Token vs Signature with Java Code

This article compares token-based and signature-based API authentication methods, discusses their advantages and drawbacks, and provides complete Java code examples—including JWT token utilities, authentication interceptors, and signature verification—to help developers implement robust API security in real-world projects.

API SecurityHTTPSJWT
0 likes · 13 min read
Secure API Authentication: Token vs Signature with Java Code
php Courses
php Courses
May 12, 2021 · Backend Development

Implementing Direct OSS Upload Signature in PHP

This tutorial explains how to create a lightweight PHP class for generating OSS direct‑upload signatures, describes the advantages of client‑side uploads without server bandwidth, provides the full source code, and highlights common pitfalls such as bucketHost configuration and policy newline handling.

BackendOSSPHP
0 likes · 3 min read
Implementing Direct OSS Upload Signature in PHP
Top Architect
Top Architect
Mar 2, 2021 · Information Security

Designing Secure API Authentication with Token and Signature in Java

This article explains how to secure app open‑API endpoints by using HTTPS, token‑based authentication, timestamp validation, and a URL‑signature algorithm implemented in Java, including detailed steps, interception rules, and sample code for generating and verifying signatures.

API SecurityBackend DevelopmentJava
0 likes · 8 min read
Designing Secure API Authentication with Token and Signature in Java
Architecture Digest
Architecture Digest
Jan 26, 2021 · Information Security

API Request Signature Implementation and Best Practices

This article explains how to protect front‑back separated APIs using a request signature scheme, detailing the required parameters, signature generation algorithm, Java filter implementation, anti‑leech timing checks, nonce usage, and duplicate‑submission prevention with Redis.

API SecurityBackend DevelopmentJava
0 likes · 6 min read
API Request Signature Implementation and Best Practices
Sohu Tech Products
Sohu Tech Products
Jan 20, 2021 · Information Security

Securing Frontend‑Integrated APIs with Token, Timestamp, and Signature Validation in Spring

This article explains how to protect API endpoints that interact with front‑end applications by using token‑based authentication, timestamp checks, and MD5 signatures, detailing the implementation of open and secured controllers, login logic, signature verification, replay‑attack mitigation, and a Spring interceptor.

API SecurityInterceptorReplay attack
0 likes · 9 min read
Securing Frontend‑Integrated APIs with Token, Timestamp, and Signature Validation in Spring
Code Ape Tech Column
Code Ape Tech Column
Jan 14, 2021 · Information Security

Implementing API Signature for Secure Backend Communication

This article explains how to protect front‑end/back‑end separated interfaces by designing an API signature scheme that includes appId, appSecret, timestamp, nonce and signature, detailing the generation process, request validation, anti‑replay measures and implementation using a custom filter in Java.

APIBackendJava
0 likes · 6 min read
Implementing API Signature for Secure Backend Communication
Programmer DD
Programmer DD
Nov 3, 2020 · Information Security

WeChat Pay V3: Parse API Certificates & Generate Secure Signatures in Java

This guide walks you through the essential steps for handling WeChat Pay V3 integration, including obtaining and parsing the API certificate with Java's KeyStore, extracting the key pair, constructing the required signature string, performing SHA256withRSA signing, and assembling the Authorization token for secure payment requests.

API CertificateJavaPayment Integration
0 likes · 12 min read
WeChat Pay V3: Parse API Certificates & Generate Secure Signatures in Java
Top Architect
Top Architect
Oct 2, 2020 · Information Security

Designing Simple API Authentication for Internal Services

The article explores practical approaches for authenticating internal service APIs, comparing plain token usage, IP whitelisting, and salted signature schemes with timestamps, and explains their implementation details, security trade‑offs, and suitability for a B2B cloud‑operated platform.

API authenticationBackend SecurityIP whitelist
0 likes · 7 min read
Designing Simple API Authentication for Internal Services
Architect
Architect
Oct 1, 2020 · Information Security

API Authentication and Request Signing with AccessKey/SecretKey, Token, and AppKey

The article explains how to secure API interfaces by using AccessKey/SecretKey, token, and AppKey for identity verification, parameter signing, and replay‑attack prevention through timestamp‑nonce mechanisms, and provides step‑by‑step client and server implementation examples.

API SecurityAccessKeyReplay attack
0 likes · 7 min read
API Authentication and Request Signing with AccessKey/SecretKey, Token, and AppKey
JD Cloud Developers
JD Cloud Developers
Sep 25, 2020 · Information Security

Master Malware Analysis: Build a Cuckoo Sandbox with SystemTap Monitoring

This guide explains sandbox fundamentals, compares Windows and Adobe Reader sandboxes, and provides step‑by‑step instructions for installing and configuring a Cuckoo Linux sandbox on Ubuntu, including SystemTap syscall monitoring and signature creation illustrated with a Gonnacry ransomware case study.

CuckooLinuxSecurity
0 likes · 11 min read
Master Malware Analysis: Build a Cuckoo Sandbox with SystemTap Monitoring
Programmer DD
Programmer DD
Jul 25, 2020 · Backend Development

Designing Simple Yet Secure API Authentication for Internal Services

This article walks through practical methods for securing internal API calls—starting with simple token checks, then enhancing security with IP whitelisting, salted signatures, and timestamped requests—while weighing trade‑offs like HTTPS overhead and time synchronization.

API authenticationBackend SecurityToken
0 likes · 6 min read
Designing Simple Yet Secure API Authentication for Internal Services
Programmer DD
Programmer DD
Jun 23, 2020 · Information Security

How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot

This article explains practical methods for protecting API data exchange—including token usage, timestamp validation, signature generation, duplicate‑submission prevention, and ThreadLocal context—provides implementation details with Spring Boot, Redis, and Java code examples, and discusses related security considerations such as DoS attacks.

API SecurityJavaSpring Boot
0 likes · 26 min read
How to Secure API Calls with Tokens, Timestamps, and Signatures in Spring Boot
Selected Java Interview Questions
Selected Java Interview Questions
Jun 17, 2020 · Information Security

API Security Practices: Tokens, Timestamps, Signatures, and Anti‑Replay Measures with Java Examples

This article explains common API security mechanisms such as token and user token usage, timestamp validation, signature generation, anti‑replay strategies, DoS attack types, and provides Java Spring Boot code examples for token handling, request interception, custom annotations, and ThreadLocal utilities.

API SecurityDoS protectionJava Spring
0 likes · 22 min read
API Security Practices: Tokens, Timestamps, Signatures, and Anti‑Replay Measures with Java Examples
Java Captain
Java Captain
May 31, 2020 · Information Security

Common API Security Practices: Token, Timestamp, Signature, and Duplicate Submission Prevention in Java

This article explains practical API security techniques for protecting data exchange with third‑party systems, covering token generation and storage, timestamp validation to mitigate DoS attacks, MD5‑based request signing with nonce, preventing duplicate submissions using Redis, and illustrates the concepts with comprehensive Java code examples.

API SecurityBackend DevelopmentJava
0 likes · 23 min read
Common API Security Practices: Token, Timestamp, Signature, and Duplicate Submission Prevention in Java
Java Captain
Java Captain
May 17, 2020 · Information Security

Common API Security Measures and Their Implementation

This article outlines essential API security mechanisms—including encryption, signing, timestamps, AppId authentication, rate limiting, blacklisting, and data validation—and provides practical Java implementation examples and code snippets.

AppIdBlacklistencryption
0 likes · 10 min read
Common API Security Measures and Their Implementation
FunTester
FunTester
Apr 17, 2020 · Information Security

Using Groovy in JMeter to Sign Request Parameters with RSA

This article demonstrates how to use Groovy scripts within JMeter's JSR223 pre‑processor to generate RSA signatures for request parameters, covering key handling, encryption, decryption, signing, verification, map conversion, and how to attach the signature to the HTTP sampler for automated performance testing.

GroovyJMeterPerformance Testing
0 likes · 11 min read
Using Groovy in JMeter to Sign Request Parameters with RSA
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 22, 2020 · Backend Development

API Design Specification Guidelines for Backend Development

This article provides comprehensive API design guidelines covering routing naming conventions, request methods, parameter structures, security measures, response formats, signature design, logging platform setup, and idempotency strategies to help backend developers create consistent and reliable interfaces.

BackendIdempotencySecurity
0 likes · 6 min read
API Design Specification Guidelines for Backend Development
360 Tech Engineering
360 Tech Engineering
Jan 15, 2019 · Backend Development

Implementing MD5 Signature for API Parameters Using JMeter and Postman

This article explains how to dynamically encrypt API request parameters with an MD5 signature by creating a Java utility, integrating it into JMeter via a BeanShell PreProcessor, and alternatively configuring the same logic in Postman's Pre-request Script for testing and load‑testing purposes.

BeanShellJMeterMD5
0 likes · 3 min read
Implementing MD5 Signature for API Parameters Using JMeter and Postman