Tag

Signature

1 views collected around this technical thread.

Top Architect
Top Architect
Apr 17, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention

This article presents a comprehensive design for securing third‑party APIs by using Access Key/Secret Key pairs, timestamp and nonce validation, signature generation, token handling, HTTPS, rate limiting, logging, idempotency, versioning, standardized response formats and practical Java code examples to prevent tampering and replay attacks.

API securityAuthenticationReplay Attack
0 likes · 32 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Replay‑Attack Prevention
Architect's Guide
Architect's Guide
Mar 31, 2025 · Information Security

Design and Security Practices for Third‑Party API Authentication and Signing

This article presents a comprehensive design scheme for third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, secure API endpoint design, anti‑replay mechanisms, token handling, TLS encryption, database schema, and implementation examples in Java.

API securityAuthenticationJava
0 likes · 30 min read
Design and Security Practices for Third‑Party API Authentication and Signing
Top Architecture Tech Stack
Top Architecture Tech Stack
Mar 25, 2025 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices

This guide details a secure third‑party API design, covering API key generation, request signing with timestamps and nonces, permission division, CRUD endpoint definitions, unified response structures, and best‑practice security measures such as HTTPS, IP whitelisting, rate limiting, logging, and idempotency handling.

API securityAuthenticationJava
0 likes · 29 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, and Best Practices
Top Architect
Top Architect
Feb 15, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Mechanisms

The article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission scopes, implementing signature generation and verification, employing timestamps and nonces to prevent replay attacks, and outlining practical API endpoint specifications and response standards.

API securityAuthenticationJava
0 likes · 33 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Mechanisms
Top Architect
Top Architect
Jan 22, 2025 · Information Security

Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, defining permission granularity, implementing signature generation with timestamps and nonces, handling token lifecycle, and providing concrete Java and SQL code examples for practical deployment.

AK/SKAPI securityAuthentication
0 likes · 31 min read
Designing Secure Third‑Party API Authentication with AK/SK, Signatures and Token Management
Tencent Cloud Developer
Tencent Cloud Developer
Jan 14, 2025 · Information Security

Can Database Signatures Prevent Tampering? An Analysis of Financial Risk Controls

The article revisits the debate on tampering with WeChat balances, explaining that joint database signatures can detect but not stop alterations, that risk‑control checks and code safeguards block unauthorized withdrawals, that identity verification prevents cross‑account transfers, and that a layered, real‑time monitoring system is essential for robust fund protection.

SignatureWeChatdatabase security
0 likes · 6 min read
Can Database Signatures Prevent Tampering? An Analysis of Financial Risk Controls
Top Architect
Top Architect
Dec 17, 2024 · Information Security

Design and Security Practices for Third‑Party API Authentication and Authorization

This article presents a comprehensive design scheme for third‑party API interfaces, covering access‑key/secret‑key generation, permission segmentation, signature flow and rules, anti‑replay mechanisms, token handling, and concrete Java code examples for secure request validation.

API securitySignatureaccess key
0 likes · 29 min read
Design and Security Practices for Third‑Party API Authentication and Authorization
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Dec 13, 2024 · Frontend Development

Creating an Animated SVG Signature with Stroke‑Dasharray and CSS

This article explains how to design an artistic SVG signature, export it from Figma, and animate it using stroke‑dasharray, stroke‑dashoffset, and CSS keyframe animations to achieve a drawing effect on web pages.

CSSSignatureWeb Development
0 likes · 4 min read
Creating an Animated SVG Signature with Stroke‑Dasharray and CSS
Top Architect
Top Architect
Dec 6, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party APIs, covering permission segmentation, AK/SK generation, signature workflow and rules, anti‑replay mechanisms, token handling, detailed API endpoint specifications, and best‑practice security measures with illustrative Java code examples.

AK/SKAPI securityAuthentication
0 likes · 32 min read
Design and Implementation of Secure Third‑Party API Authentication Using AK/SK, Signatures, and Tokens
Architect
Architect
Jul 15, 2024 · Information Security

Secure OpenAPI Design: AppId/AppSecret, RSA Signatures, Timestamp & Nonce Best Practices

This article explains how to secure OpenAPI interfaces by using globally unique AppId/AppSecret pairs, SHA‑256 and RSA signatures, timestamp and nonce validation, caching, rate‑limiting, parameter validation, and encryption algorithms, providing complete client‑server implementation examples in Java.

API securityAuthenticationJava
0 likes · 26 min read
Secure OpenAPI Design: AppId/AppSecret, RSA Signatures, Timestamp & Nonce Best Practices
Architect
Architect
May 25, 2024 · Information Security

Design and Implementation of Secure Third‑Party API Authentication Using Access Key/Secret Key, Signatures, and Tokens

This article presents a comprehensive design for securing third‑party API calls by generating unique Access Key/Secret Key pairs, implementing request signing with timestamps and nonces, managing token‑based authentication, defining permission granularity, and providing concrete Java and SQL code examples along with best‑practice recommendations for HTTPS, rate limiting, logging, and idempotency.

API securitySignatureaccess key
0 likes · 31 min read
Design and Implementation of Secure Third‑Party API Authentication Using Access Key/Secret Key, Signatures, and Tokens
Selected Java Interview Questions
Selected Java Interview Questions
May 22, 2024 · Information Security

Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles

This article presents a comprehensive design and implementation guide for securing API interfaces by combining HTTPS fundamentals with WeChat Pay encryption techniques, detailing symmetric and asymmetric encryption, hashing, signature verification, key exchange, parameter handling, and backend processing to protect against tampering, replay attacks, and data leakage.

API securityHTTPSSignature
0 likes · 15 min read
Design and Implementation of API Encryption Using HTTPS and WeChat Pay Principles
Top Architect
Top Architect
May 6, 2024 · Information Security

Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management

This article presents a comprehensive design for secure third‑party API interfaces, covering API key generation (Access Key/Secret Key), request signing with timestamps and nonces, token handling, permission granularity, anti‑replay measures, HTTPS encryption, and practical RESTful endpoint examples with code snippets.

API securityAuthenticationSignature
0 likes · 30 min read
Designing Secure Third‑Party API Interfaces: Authentication, Signature, Token and Permission Management
Architecture Digest
Architecture Digest
Apr 24, 2024 · Information Security

Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce

The article presents a comprehensive guide to designing secure third‑party APIs, covering access‑key/secret‑key generation, token management, signature algorithms, timestamp and nonce anti‑replay mechanisms, permission granularity, request logging, rate limiting, and example Java and SQL implementations.

API securityAuthenticationSignature
0 likes · 28 min read
Secure Third‑Party API Design: AK/SK, Token, Signature, Timestamp & Nonce
Code Ape Tech Column
Code Ape Tech Column
Dec 15, 2023 · Information Security

Secure API Design for Microservices: Anti‑Tampering, Anti‑Replay, and Authentication Strategies

This article explains how to protect microservice APIs from tampering and replay attacks by using HTTPS, request signing, nonce‑timestamp mechanisms, and AppId/AppSecret authentication, and demonstrates a complete Java/Spring implementation with a responsibility‑chain based verification filter.

API securityMicroservicesSignature
0 likes · 14 min read
Secure API Design for Microservices: Anti‑Tampering, Anti‑Replay, and Authentication Strategies
Selected Java Interview Questions
Selected Java Interview Questions
Nov 23, 2023 · Backend Development

Common Issues and Solutions When Integrating Third‑Party APIs

This article outlines typical problems such as unreachable domains, signature errors, token expiration, timeouts, HTTP 500/404 responses, pagination inconsistencies, undocumented field changes, and billing issues, and provides practical troubleshooting and mitigation strategies for backend developers working with third‑party APIs.

API IntegrationSignatureToken Management
0 likes · 15 min read
Common Issues and Solutions When Integrating Third‑Party APIs
Laravel Tech Community
Laravel Tech Community
Oct 23, 2023 · Information Security

Implementing Signature and Rate‑Limiting Mechanisms for Secure PHP APIs

This article explains how to secure PHP APIs by implementing a signature mechanism and rate‑limiting using Redis, and also outlines additional protections such as HTTPS, access control, input validation, logging, and security audits.

API securityHTTPSPHP
0 likes · 6 min read
Implementing Signature and Rate‑Limiting Mechanisms for Secure PHP APIs
macrozheng
macrozheng
Sep 14, 2023 · Information Security

How to Secure API Endpoints: Prevent Tampering and Replay Attacks with SpringBoot

This article explains why public APIs need protection, outlines anti‑tampering and anti‑replay strategies using timestamps and nonces, and provides complete SpringBoot code—including request signing, filter implementation, and Redis utilities—to safeguard API calls from manipulation and replay attacks.

API securityRedisSignature
0 likes · 15 min read
How to Secure API Endpoints: Prevent Tampering and Replay Attacks with SpringBoot