Ericson's mobile paltforms Security

Conclusion
Ericson's mobile paltforms contain a variety of security mechanisms and an advanced model for issuing and checking the integrity of software.Manufacturers of mobile phones can thus build secure applications and a secure process for issuing platform software. Apart from communication security and basic platform integrity control, mobile phones developers can decide how and when they want to use these mechanisms. Therefoe, additional security mechanisms might be needed.

The mobile platforms do not use an open software environment that permits end users to install new software modules or applications. This limits the need for further software-protection mechanisms. In the future, however, we might see a more PC-like situation, Where new native software, such as non-java Software, can easily be installed adn executed. In that case, non-trusted software will have to be isolated from trusted software. Advanced operating systems isolate non-trusted software in such a way that it is never allowed to interfere with the execution of trusted software. In a large and flexible OS, however, isolation is difficult to achieve. Therefore, others means, such as hardware mechanisms or more stringent security requirements (in the OS) will have to be employed.

(Full article at ericsson review, 2. 2006, Mobile Platform Security, page.59-70)

0 komentar:

 
© 2009 Mysecurity | Powered by Blogger | Built on the Blogger Template Valid X/HTML (Just Home Page) | Design: Choen | PageNav: Abu Farhan