[Reading Notes] iOS network-communication between applications, Reading Notes ios
I. URL Scheme
The URL scheme has three main purposes: switch to another application based on the logic of the existence or absence of other applications on the device, and respond to other applications that open your application. You can also use the URL scheme to open an application from a site or after the Web-based authentication process ends.
1. Implement a custom URL scheme.
2. Detect the existence of other applications.
3. advanced communication.
1) base64 encoding, used to represent binary data as ASCII text strings. A standardized conversion table can be used to encode every six digits of binary data into one character.
2) To create an image data string, use the three steps described earlier. Serialize the image, use base64 to encode it, and then use the URL to encode it again.
Ii. Shared Key string
The shared key string is especially useful for enterprises because it creates a public area and can be accessed by all applications sharing the same Bundle Seed ID. With this shared space, we can easily implement a single sign-on Authentication System for a group of related applications. In addition, applications that store data in key strings will detect their previous installations, so that they can improve user experience by reusing the previously provided authentication information or adjusting the user interface for the expected users.
The iOS key string provides separate areas for protected operating system data for secure storage. Third-party applications can also store similar protected data through this storage. To ensure security, key string entries can also be stored to store similar protected data. To ensure security, key string entries should always be encrypted and stored on disks and device backups. Even if the application is deleted, the protected data will remain in the key string, so that the same information can be reused when the application is installed again later. Multiple applications developed by the same developer can use the same encryption key through configuration, so that each application can access the shared key string entries.
1. Enterprise SSO.
SSO is often implemented as an end-to-end authentication framework that allows users to authenticate multiple applications through a set of shared authentication information. If the logon succeeds, the SSO provider usually generates an authentication token, which is stored and used to sign all subsequent requests.
2. Check the installation before the application.
Reference: iOS network advanced programming-enterprise application development for iPhone and iPad