"Reading notes" iOS network-inter-app communication

Source: Internet
Author: User

One, URL scheme

The URL scheme has 3 main uses: Adjust logic based on the presence or absence of other apps on your device, switch to other apps, and respond to other apps that open your app. You can also open an app from a site or at the end of a web-based authentication process through a URL scheme.

1, implement a custom URL scheme.

2, sensing the presence of other applications.

3, advanced communications.

1) base64 encoding, specifically used to represent binary data as an ASCII text string. You can use a standardized conversion table to encode every 6 bits of binary data into one character.

2) to create an image data string, you need to use the 3 steps described earlier. Serialize the picture, encode it using Base64, and then encode it again using the URL.

Two, share keychain

Shared keychain is especially useful for businesses because it creates a common area that can be accessed by all applications that share the same bundle Seed ID. With this shared space, we can easily implement a single sign-on authentication system for a set of related applications. In addition, applications that store data in the keychain detect the installation before themselves, so that the user experience can be improved by reusing previously provided authentication information or by adapting the user interface to the desired user.

The iOS keychain provides a separate area for protected operating system data for secure storage. Third-party apps can also save similar protected data through this store. To ensure security, keychain entries can also be used to store similar protected data. To ensure security, keychain entries should always be saved on disk and in device backup after encryption. Even if you delete an app, the protected data remains in the keychain, so that you can reuse the same information after you install the app again. Multiple apps developed by the same developer can be configured to use the same encryption key, so that each app can access the shared keychain entries.

1, Enterprise SSO.

SSO is often implemented as an end-to-end authentication framework that allows users to authenticate multiple applications with a shared set of authentication information. If the login succeeds, the SSO provider typically generates an authentication token that is stored and used to sign all subsequent requests.

2, detect the installation before the application.

Reference: "iOS network advanced programming-iphone and ipad Enterprise application Development"

  

Reading notes iOS network-Inter-app communication

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.