Please enable JavaScript.
Coggle requires JavaScript to display documents.
iOS Security Model - Coggle Diagram
iOS Security Model
System Security
Apple root certificate with public key and uses it to verify that the low-level boot loader is properly signed and has not been tampered before loading. LLB verifies the iBoot and iBoot verifies iOS kernel before starting it.
This process ensures lowest levels of software are not tampered and iOS running only on valid Apple devices.
-
-
-
Face ID
Uses True Depth camera system to accurately map the geometry of the face, use neural networks for determining attention, matching, and anti-spoofing. Data are digitally signed and sent to the SEP.
App Security
App code signing
App code signing ensures that code is coming from a specific legitimate source/ developer (ensures authenticity) and code has not been altered since it was signed.
-
-
Data Security
Device ID and Group ID
Each device has its unique ID(UID) and a device group ID(GID) which are AES 256-bit keys compiled in to the application processor and SEP during manufacturing.
File Level Protection
iOS protects the file data by constructing and managing a hierarchy of keys in conjunction with hardware encryption engine. All keys are stored in SEP.
-