The interface authentication process is described in the following figure:

Front-end process for obtaining temporary secret keys:

  1. The app prefixes a 16-bit key and passes it to the server when it acquires the temporary secret key
  2. Request the interface to obtain the encrypted temporary secret key
  3. Use EAS, decrypt, method has been written, just call, decrypt, its format for processing, processing as an object format
  4. Store the public and private key (object) locally. Note: the local store can only store strings, not objects, so you need to rotate it
  5. The public and private keys are reacquired every hour

The process of generating a signature from a private key when making a data interface request

  1. Sort parameters. Public and private keys are not involved
  2. When the sorting is complete, the private key is spelled and the signature is generated
  3. Each time you send the public key through headers to the background

How do I simulate generating a UDID without user information?