Intel® App Security API

Enables all developers, even those who are not security experts, to take advantage of the security properties and capabilities supported by the platform.

  • A collection of JavaScript* APIs for Hybrid HTML5 application developers
  • Available as a Cordova* plugin


You can use these API anywhere in the application. Here are several usage examples:

  • A game keeps a score for a player. Suppose players get credits and promotions based on their score. You can maintain the score as secure data while the game is being played and save it as secure storage when the game is closed.
  • A personal note application stores all data on the web. To improve performance, while maintaining confidentiality, you can download the data (requested by the user) from the web and cache it using secure storage on the device. The next time it is used, the application can read it from the device and does not need to access the web.
  • An application uses access and authentication to a cloud backend. To keep the communication alive, it uses a token that was created by the backend. The application can cache the token using secure storage, and send the token securely to the backend using secure transport.

The API are grouped in ‘mega-functions’ (namespace); each mega-function includes a collection of API within the scope of functionality. This version of the Intel App Security API is primarily targeting the introduction of the new API; you can take advantage of capabilities that are on par with the capabilities of the platform and operating system. The API is built in a way that can be extended while maintaining a solid API layer. Future extensions may include:

  • Improved security of the middleware implementation using hardware and advanced software techniques.
  • Additional API scope, such as secure identity, input, and output.

API Scope (Mega Functions)

  • Secure Data
    Collection of API that provide data-in-use protection and data sealing support. Enables creating, managing, and using a data stream object in memory. Access to this object is done via an instance ID. Sensitive object properties and sensitive content are hidden.
  • Secure Storage
    Collection of API that provide data-at-rest protection. Enables storing and retrieving data objects using non-volatile storage.
  • Secure Transport
    Collection of API that provide client-server HTTPS communication enhanced protection. Enables sending secure data elements within regular data to trusted remote servers.

Data Structures