X hits on this document





1 / 6


Jerome Azema Distinquished Member of echnical Staff WTBU Chief echnology Office - Security

exas Instruments

Gilles Fayad Worldwide Strategic Marketing Manage , Mobile Platform Security and Emerging Applications, Wireless erminal Business Unit exas Instruments


As mobile handsets become increasingly complex, connected and ubiquitous, the need for security on the handset has become essential. Furthe , the convergence between the mobile device and Internet through 3G and Wi-Fi dramatically increases the potential security threats on handsets.

The vast majority of current phone security solutions are software-based, which are inherent- ly more vulnerable to hacking, viruses and other malicious attacks than hardware solutions.

Operators have traditionally wanted to protect their phone assets and make sure that the handset performs only in the ways expected on their network. This demand has led to protection mechanisms that OEMs have integrated into their handsets, complemented by other OEM-implemented secure mechanisms to further protect handsets from cloning and unwanted modifications.

OEMs have now extended this hardware-based security foundation to begin addressing secu- rity requirements of applications and services running on their platforms, such as content DRM and service access protection.

Content providers such as film, music and game publishers – who feed these applica- tions with content – are largely concerned with protecting their creative assets, which end users are downloading. Service providers such as music portals, television broadcasters and financial institutions also want to protect and control access to the services that they provide.

M-ShieldMobile Security echnology: making wireless secure

Texas Instruments’ M-Shield™ mobile security technology is a system-level security solution, tightly interleaving hardware and software components, that delivers the highest level of security available today while meeting the varied needs of all stakeholders in this value chain including operators, OEMs, content providers and end users.

End users are increasingly accessing advanced services and applications on their handsets, resulting in an increase in transactions and greater storage of valuable financial, personal and sensitive information on the handset. The whole value chain relies on the confidence and trust that the end user has in the handset, application and services provided.

The case for security on mobile handsets To support the widespread adoption of new services and to address the convergence between the mobile world and the Internet increased levels of security in handsets are essential.

Theft and fraud are a constant problem in the mobile market today. Currently, IMEI/SIMLock features on handsets have been circumvented.

Handsets today are a long way from the basic communication devices of the past; they have become “lifestyle” devices that include multimedia players, cameras, location devices, portable office capabilities and e-Wallet functionality. They help us perform our daily working tasks, entertain us, capture the memories we cherish and facilitate routine transactions. As a result, a wealth of valuable data and information accumulates in our phone’s memories and needs to be protected.

Multimedia-feature phones today often carry MP3 audio players, video players and mobile TV applications. Some also boast console-quality 3-D gaming platforms. All of this functionality requires digital rights management (DRM) or control access (CA) services to protect high-value content. The DRM and CA schemes are often associated with content management and protection models, such as Content Management License Administrator (CMLA) or Content Protection for Recordable Media (CPRM), that favor secure, hardware- strengthened content protection. They are also often associated with penalty clauses to further motivate OEMs to adopt strong protection schemes.

Connectivity-enabled phones feature access to the Internet and networking through multiple access technologies such as 3G or Wi-Fi, as well as personal communication means s u c h a s B l u e t o o t h ® a n d N e a r F i e l d C o m m u n i c a t i o n ( N F C ) . A m o n g t h e s e , e n t e r p r i s e - t y p e

Document info
Document views8
Page views8
Page last viewedFri Oct 28 01:05:43 UTC 2016