IOS-terminology for secure transmission programming

Source: Internet
Author: User
Tags key string asymmetric encryption

IOS-terminology for secure transmission programming

IOS-terminology for secure transmission programming

 

1. access control list (ACL): access control list, a data structure. If you want to access an entry in a key string, it will provide some access requirements, such as a confirmation dialog box, when you have completed these requirements, you can access the items in the key string. It also contains a list of trusted operation applications, each key string contains one or more ACLs, and each ACLs is applied to an operation of one entry, such as encryption and decryption.

 

2. access object: an opaque data structure corresponds to an ACL, which contains the ACL data abstraction. Each key string entry has an access object.

 

3. anchor certificate: a trusted digital certificate that can be used to verify other certificates. This certificate contains the root certificate.

 

4. application programming interface (api): A series of Data Structure Constants and elements required for programming that can be used by developers in security programming.

 

5. asypolicric keys: asymmetric encryption key, a pair of associated but different keys, one for encryption and the other for decryption.

 

6. attribute: an attribute in a key string, such as name, type, time, and user number.

 

7. authentication: Checks user data. For example, if a user provides the name and password information, if the Password Matches the user information, the detection is successful. Otherwise, the detection fails, if the operation is successful, you can perform the following operations. If the operation fails, you cannot perform the following operations.

 

8. authorization: after authentication, the user is authorized to perform the specified operations.

 

9. certificate: Digital certificate

 

10. certification chain: Certificate string. A series of associated certificates are often used to verify the validity of the certificate. Each certificate must be issued by a digital certificate authority, just as your ID card must be issued by another public security organ, otherwise, others do not believe the same.

 

11. certificate extension: certificate extension. extension Information of a digital certificate, such as user information of this certificate.

 

12. certificate authority: the issuing authority of a certificate. For example, a certificate issued through a digital certificate is a trusted certificate. The issuing authority must be a recognized and trusted institution, certificates issued by organizations that are not recognized as trusted are also untrusted.

 

13. CDSA: Short for the Security Service Management project, it is an open standard set by the establishment of the network security transmission standard. Its main role is to define the secure transmission standard interface, each platform uses this standard for secure transmission.

 

14. CSSM: the abbreviation of security service management. It is an open network security transmission standard setting mechanism. Its main function is to define secure transmission standards. Each platform uses this standard to implement secure transmission.

 

15. default keychain: the default key string. If no specific key string is specified for the newly created key item, it will be put in the key string by default.

 

16. default keychain search list: default key string search list;

 

17. digital certificate: a digital certificate is a collection of data that contains the user's general information, the validity date of the certificate, the identity of the issuing authority, the identity of the holder, and the public key, the digital certificate must comply with certain standards so that information can be parsed. OS X supports the X.509 certificate standard.

 

18. digital signature: a digital signature that associates the information of a document or other user information. The user or organization can use the digital signature to determine whether the received data is complete and changed, this ensures the integrity of the transmitted data.

 

19. encrypt: the encryption operation converts readable data into unreadable data through the encryption key and encryption algorithm. Unauthorized users cannot read the information, authorized users can use matching encryption keys and algorithms to decrypt unreadable encrypted data into readable data.

 

20. decrypt: The process of decrypting unreadable data into readable data through matching encryption keys and corresponding decryption algorithms.

 

21. generic password: General password instead of network password

 

22. identity: identity, private key associated with the digital certificate

 

23. internet password: A password used on the server.

 

24. key: A string used for encryption and decryption through an encryption algorithm.

 

25. keychain: A key string used to store encrypted passwords, private keys, and other confidential information. It is also used to store certificates and other non-confidential information. The key string management and key string service are open APIs, you can program the key string operation.

 

26. keychain access application: access the application with a key string. You can add, modify, delete, and extract information from the key string.

 

26. keychain item: key string, the confidential information protected by the key string. Each key string corresponds to some features and access objects.

 

 

27. level of trust: The trust level is to read the certificate information and determine whether to trust the user through the trust policy.

 

28. MIME: the abbreviation of the multi-function Internet postal expansion program. The standard transmission formats include text, hypertext, images, and audio transmitted through the email network.

 

29. password: A string used for authentication.

 

30. permissions: authorized to operate data.

 

31. private key: The key used for encryption and reserved by the user cannot be disclosed.

 

32. privileged operation: operation

 

33. public key: an encrypted key that can be shared.

 

34. public key cryptography: asymmetric encryption method, which can only be decrypted through the corresponding private key.

 

35. public key infrastructure: a series of standard projects for public key encryption. It is a series of system projects for creating resolution certificate verification certificates for hardware software personnel and policy processes.

 

36. root certificate: the root certificate can be used to verify resources without the need for other certificates, and the certificate issued by the certificate issuing authority

 

37. secret: secret, key string items, such as passwords. Only trusted applications can use key string items.

 

38. secure sockets layer (SSL): secure transmission protocol, which uses digital certificates for authorization, digital signatures for data integrity, and public key encryption for data confidentiality.

 

39. secure transport: secure SSL Transmission

 

40. S-MIME: Secure Multi-Function Mail Extension short for a network that specifies digital signature authorization and encryption of electronic information.

 

41. transport layer security (TLS): establishes a secure link protocol through TCP/IP. TLS is an upgraded version of SSL. If the platform does not support TLS, use SSL.

 

42. trusted application: applications that can access key entries through verification.

 

43. trust policy: trust policy, a series of rules for Digital Certificate trust, to determine the trust level of the certificate, such as whether the certificate has expired.

 

44. X.509: digital certificate standard issued by the National Telecommunication Union, applicable to international

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.