Ericsson’s mobile platforms contain a variety of security mechanisms and an advanced model for issuing and checking the integrity of software. Manufacturers of mobile phones can thus build secure applications and a secure process for issuing platform software. Apart from communication security and basic platform integrity control, mobile phone developers can decide how and when they want to use these mechanisms. Therefore, additional security mechanisms might be needed. The mobile platforms do not use an open software environment that permits end users to install new software modules or applications. This limits the need for further software-protection mechanisms. In the future, however, we might see a more PC-like situation, where new native software, such as non-Java software, can easily be installed and executed. In that case, non-trusted software will have to be isolated from trusted software . Advanced operating systems isolate non-trusted software in such a way that it is never allowed to interfere with the execution of trusted software. In a large and flexible OS, however, isolation is difficult to achieve. Therefore, other means, such as hardware mechanisms or more stringent security requirements (in the OS) will have to be employed.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.