Bakir et al., 2016 - Google Patents
Using Keychain Services to Secure DataBakir et al., 2016
- Document ID
- 4146039469169040283
- Author
- Bakir A
- Chesler G
- de la Torriente M
- Bakir A
- Chesler G
- de la Torriente M
- Publication year
- Publication venue
- Program the Internet of Things with Swift for iOS
External Links
Snippet
Although the iPhone boasts the lowest rate of security issues for a major computing platform, many developers only take advantage of a handful of these features. In this chapter, we will introduce Keychain Services, Apple's security framework for encrypting notes, passwords …
- 230000004044 response 0 description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4018—Transaction verification using the card verification value [CVV] associated with the card
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4012—Verifying personal identification number [PIN]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liu et al. | Nonlinear order preserving index for encrypted database query in service cloud environments | |
US9122888B2 (en) | System and method to create resilient site master-key for automated access | |
KR101712784B1 (en) | System and method for key management for issuer security domain using global platform specifications | |
Salam et al. | Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage | |
US10733317B2 (en) | Searchable encryption processing system | |
Dowsley et al. | A survey on design and implementation of protected searchable data in the cloud | |
US20200265158A1 (en) | Secrets as a service | |
US11075753B2 (en) | System and method for cryptographic key fragments management | |
CN108574567A (en) | Private file protection and cryptographic-key management system and method, the information processing terminal | |
Riad et al. | Secure storage and retrieval of IoT data based on private information retrieval | |
Yuan et al. | An ORAM-based privacy preserving data sharing scheme for cloud storage | |
Wale Amol et al. | Data integrity auditing of cloud storage | |
Pavan Kumar et al. | Server security in cloud computing using block-chaining technique | |
CN113468545A (en) | File encryption and decryption method, device and system | |
Mandhare et al. | A Proposal on Protecting Data Leakages In Cloud Computing | |
US11997191B2 (en) | System and method for protecting secret data items using multiple tiers of encryption and secure element | |
Bakir et al. | Using Keychain Services to Secure Data | |
Beer et al. | Encrypting data at rest | |
Amini | Secure Storage in Cloud Computing | |
Raja et al. | An enhanced study on cloud data services using security technologies | |
Yu et al. | Efficient Protocol for Searchable encryption and secure deletion on cloud storages | |
Asad et al. | Working with cryptography | |
Rawat et al. | Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing | |
Adjei et al. | Enhancing security in the cloud using encryption in a client centric access control mechanism | |
Nayudu et al. | Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment. |