[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Bakir et al., 2016 - Google Patents

Using Keychain Services to Secure Data

Bakir et al., 2016

Document ID
4146039469169040283
Author
Bakir A
Chesler G
de la Torriente M
Bakir A
Chesler G
de la Torriente M
Publication year
Publication venue
Program the Internet of Things with Swift for iOS

External Links

Snippet

Although the iPhone boasts the lowest rate of security issues for a major computing platform, many developers only take advantage of a handful of these features. In this chapter, we will introduce Keychain Services, Apple's security framework for encrypting notes, passwords …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4018Transaction verification using the card verification value [CVV] associated with the card
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4012Verifying personal identification number [PIN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Similar Documents

Publication Publication Date Title
Liu et al. Nonlinear order preserving index for encrypted database query in service cloud environments
US9122888B2 (en) System and method to create resilient site master-key for automated access
KR101712784B1 (en) System and method for key management for issuer security domain using global platform specifications
Salam et al. Implementation of searchable symmetric encryption for privacy-preserving keyword search on cloud storage
US10733317B2 (en) Searchable encryption processing system
Dowsley et al. A survey on design and implementation of protected searchable data in the cloud
US20200265158A1 (en) Secrets as a service
US11075753B2 (en) System and method for cryptographic key fragments management
CN108574567A (en) Private file protection and cryptographic-key management system and method, the information processing terminal
Riad et al. Secure storage and retrieval of IoT data based on private information retrieval
Yuan et al. An ORAM-based privacy preserving data sharing scheme for cloud storage
Wale Amol et al. Data integrity auditing of cloud storage
Pavan Kumar et al. Server security in cloud computing using block-chaining technique
CN113468545A (en) File encryption and decryption method, device and system
Mandhare et al. A Proposal on Protecting Data Leakages In Cloud Computing
US11997191B2 (en) System and method for protecting secret data items using multiple tiers of encryption and secure element
Bakir et al. Using Keychain Services to Secure Data
Beer et al. Encrypting data at rest
Amini Secure Storage in Cloud Computing
Raja et al. An enhanced study on cloud data services using security technologies
Yu et al. Efficient Protocol for Searchable encryption and secure deletion on cloud storages
Asad et al. Working with cryptography
Rawat et al. Enhanced Security Mechanism for Cryptographic File Systems Using Trusted Computing
Adjei et al. Enhancing security in the cloud using encryption in a client centric access control mechanism
Nayudu et al. Secured Access Policy in Ciphertext-Policy Attribute-Based Encryption for Cloud Environment.