IOS - Professional terminology for secure transmission programming
1.access Control List (ACL): access Control list, a data structure, if you want to access a keychain of an entry, it will provide some access requirements, such as Display confirmation dialog box, ask password and so on a series of operations, when you complete these requirements, you can access keys in the keychain, It also contains a list of operations applications that have been trusted by the table, with one or more ACLs in each keychain , and each ACLs applied to an operation on an entry. such as encryption and decryption.
2.access object: an opaque data structure that corresponds to a ACL , it contains a ACL data abstraction, each keychain entry has a Access Object .
3.anchor Certificate: a trusted digital certificate that can be used to authenticate other certificates that contain the root certificate.
4.application Programming Interface (API): A series of daily use data structure constants and the elements required for programming, developers can use it in secure programming.
5.asymmetric Keys: Asymmetric encryption key, a pair of associated but not identical keys, one for encryption, one for decryption.
6.attribute : A property in the keychain item, such as name, type, time, user number.
7.authentication : Verify the data provided by the user, for example, a user provides a name and password information, if the password and user information matching, it means that the detection is successful, or failure, the success of the following operations can be done, failed to do the following operations.
8.authorization : After validation, the user is authorized to do the specified action.
9.certificate : Digital certificate
10.certification Chain : The certificate string, a series of associated certificates are often used to verify the validity of the certificate, each certificate must be issued by a digital certification authority, just like your identity card must be issued by the public security organs, otherwise people do not believe the same.
11.certificate Extension : Certificate extensions, extended information for a digital certificate, such as user information that can be used by the certificate
12.certificate Authority : The issuing authority of a certificate, such as a public security organ, is a certificate issued through a digital certificate, and the issuing authority must be an institution that is generally trusted, and a certificate issued by an institution that is not generally trusted is not trusted.
13.CDSA : The abbreviation of the Security Service Management engineering, is an open network security transmission standard developed by the establishment of the standard engineering, its main role is to define a secure transport standard interface, each platform through the standard to achieve secure transmission.
14.CSSM : The abbreviation of Security Service Management, is an open network security transmission standard Development Organization, its main function is to define the safe transmission standard, each platform through this standard to achieve the safe transmission.
15.default Keychain: default keychain, the newly created key item will be placed in the keychain if no specific keychain is specified.
16.default Keychain Search list: The default Keychain search list;
17.digital Certificate: A digital certificate is a collection of data that contains general information about the user, the valid date of the certificate, the identity of the issuing agency, the identity of the holder, and the public key, and the digital certificate must follow some criteria in order to be able to parse the information OS X the supported standards are the Certificate standards.
18.digital Signature: digital Signature, a information related to a document or other user information, the user or the organization can be a digital signature to determine whether the received data is complete and string changes, so as to ensure the integrity of the transmission of data.
19.encrypt: encryption operation, the readable data through the encryption key and encryption algorithm into unreadable data, no authorized users can not read the information inside, the authorized user through the matching encryption key and the corresponding algorithm to decrypt unreadable encrypted data into the corresponding readable data.
20.decrypt: decryption operation, the process of turning unreadable data into readable data through matching cryptographic keys and corresponding decryption algorithms.
21.generic Password: General password instead of network password
22.identity: identity, and the private key associated with the digital certificate
23.internet Password: a password to use on the server.
24.key: A string that is used to encrypt the decryption using an encryption algorithm.
25.keychain: keychain, used to store encrypted passwords, private keys and other confidential information, which is also used to store certificates and other non-confidential information, keychain management and keychain services are public API , you can programmatically implement the operation of the keychain.
26.keychain Access application: Keychain Access to the application, you can add to the keychain entries, modify, delete, extract information and other operations.
26.keychain Item: keychain items, confidential information protected by keychain, each of which corresponds to a number of features and Access objects.
27.level of trust: trust level, is through the information read the certificate, through the trust policy to determine whether to trust the user.
28.MIME: The multi-function Internet postal Expansion program initials, the standard transmission format has text, hypertext, image, audio via e-mail network transmission.
29.password: typically a string that is used to authorize authentication
30.permissions: authorization allows you to manipulate the data.
31.private Key: the key to encrypt and the user to keep it open.
32.privileged Operation: enjoy the Operation
33.public Key: encryption keys that can be shared.
34.public Key cryptography: Asymmetric encryption method, encrypted by public key, can only be decrypted by the corresponding private key
35.public Key Infrastructure: A series of public key cryptography standard engineering, it is to the hardware software person, the policy process creates the Analytic Certificate authentication certificate The series of Systems engineering.
36.root Certificate: The root certificate can be used to authenticate resources without requiring additional certificates, and certificates issued by the certificate Authority
37.secret: secrets, keys in a keychain, such as passwords, can only be used by trusted applications.
38.secure Sockets Layer (SSL): Secure transport protocol, which uses digital certificates to authorize the integrity of the data through digital signatures, and to encrypt the confidentiality of the data through the public key.
39.secure Transport: Implement SSL The secure transfer
40.s-mime: Secure multi-function mail Transfer expansion program acronym, a network transmission that specifies digital signature authorization and encryption of electronic information.
41.transport Layer Security (TLS): through TCP / IP Establish a secure link protocol, TLS is a SSL upgrade, if the platform does not support TLS just use SSL .
42.trusted Application: An application that validates access to a key item.
43.trust Policy: trust policy, a series of rules that trust a digital certificate to determine the trust level of a certificate, such as whether the certificate expires or not.
44.x.509: The National Telecommunication Union issued the standard of digital certification, the scope of application for international
IOS-Professional terminology for secure transport programming