The security features introduce how private information remains private, and how the user knows when they are trying to access privileged information. You can use a repository and cryptographic operations to manage keys, certificates, and sensitive user data. When the user tries to access privileged information, you can display information about the data.
You can use the following security features in your native applications:
You can provide a secure repository for keys, certificates, and sensitive data related to users and their password-protected applications. You can also use secure cryptographic operations for non-exportable keys without revealing the key values to clients.
You can retrieve information about existing permissions granted by a privilege. The information can be delivered to the user as a notification.
You can check current permissions for privacy-related privileges and request user permission to use specific privileges.
You can encrypt and decrypt data with symmetric or asymmetric encryption, and manage keys with YACA (Yet Another Crypto API). You can also digest messages and create digital signatures.
You can create security-aware applications to manage device policies. In enterprise settings, you can provide rich control for IT administrators over employee devices.
You can scan data, files, and directories to detect malware. You can also check the URL reputation before accessing a specific URL.
You can use cryptography services (digital certificates and keys) for authentication and secure communication with another system.
For information on how to minimize any accidental introduction of security vulnerabilities in your application, see Security Tips (in mobile applications only).
- Tizen 2.4 and Higher for Mobile
- Tizen 2.3.1 and Higher for Wearable