[Reading Notes] iOS network-communication between applications, Reading Notes ios

Source: Internet
Author: User
Tags key string

[Reading Notes] iOS network-communication between applications, Reading Notes ios

I. URL Scheme

The URL scheme has three main purposes: switch to another application based on the logic of the existence or absence of other applications on the device, and respond to other applications that open your application. You can also use the URL scheme to open an application from a site or after the Web-based authentication process ends.

1. Implement a custom URL scheme.

2. Detect the existence of other applications.

3. advanced communication.

1) base64 encoding, used to represent binary data as ASCII text strings. A standardized conversion table can be used to encode every six digits of binary data into one character.

2) To create an image data string, use the three steps described earlier. Serialize the image, use base64 to encode it, and then use the URL to encode it again.

Ii. Shared Key string

The shared key string is especially useful for enterprises because it creates a public area and can be accessed by all applications sharing the same Bundle Seed ID. With this shared space, we can easily implement a single sign-on Authentication System for a group of related applications. In addition, applications that store data in key strings will detect their previous installations, so that they can improve user experience by reusing the previously provided authentication information or adjusting the user interface for the expected users.

The iOS key string provides separate areas for protected operating system data for secure storage. Third-party applications can also store similar protected data through this storage. To ensure security, key string entries can also be stored to store similar protected data. To ensure security, key string entries should always be encrypted and stored on disks and device backups. Even if the application is deleted, the protected data will remain in the key string, so that the same information can be reused when the application is installed again later. Multiple applications developed by the same developer can use the same encryption key through configuration, so that each application can access the shared key string entries.

1. Enterprise SSO.

SSO is often implemented as an end-to-end authentication framework that allows users to authenticate multiple applications through a set of shared authentication information. If the logon succeeds, the SSO provider usually generates an authentication token, which is stored and used to sign all subsequent requests.

2. Check the installation before the application.

 

 

Reference: iOS network advanced programming-enterprise application development for iPhone and iPad

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.