Your first step is to provide some SSL transport encryption. This should make sure that there are no people in medium attacks and no one is monitoring the data. Secondly, you need to figure out some kind of authentication method. A popular method is to create a login service to which you send the username and password and return some limited life key. Then you send this key along with all requests for submission, and the server checks it before returning any data. If you have different user levels, as well as key verification, check also if this user should have access to this information.
source
share