Return to Article Details Developing the algorithm and software for access token protection using request signing with temporary secret Download Download PDF