Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Network Security.
310KM M-Commerce Application Selection of Mobile Platform Group 4 Choy Chun Lung, Lawrence Hui Yiu Ting, Eddy Chan Ki Yin, CKY Liu Tsz Ping, Scott.
What is an operating system? Is it software?
Presentation by Amal Babu New OS of Google, initially designed for netbooks Released in second half of 2010 Google chrome browser on Linux kernel Inbuilt.
SPEKE S imple Password-authenticated Exponential Key Exchange Robert Mol Phoenix Technologies.
 Android is a software platform and operating system for mobile devices, based on the Linux kernel, developed by Google. It allows developers to write.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
Impact of the Recent UC Denver Remote Computing Audit May, 2010.
310km Lab4 Presentation. Comparison between mobile OS Palm OS Blackberry Os Windows Mobile Symbian i OS Android.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Fortune Infocomm Pvt. Ltd. Mobile Application Development Group.
Lab4 Part2 Lau Ting Nga Virginia Tsang Pui Yu Wong Sin Man.
310KM Lab 4 Part 3 Tutorial Group:2 Student Name:Chan Nga Lok Fan Ka Yan Lo Yuen Ki Tsui Sui Wa.
Principles of Information Security, 2nd edition1 Cryptography.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
310KM Mobile Commerce Applications Lab/Tutorial 4 Part 3 Team members: Li Chun Yin Pun Hoi Lam Shek Hin Shing.
Ho Ting Chung, Zeturl ( ) 1.  Authentication  Encryption 2.
Student Name: Group.  Developed by Microsoft  Alliance with Nokia in 2011  4 main functions:  Outlook Mobile  Windows Media Player for Windows Mobile.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet April 2015.
Research of difference OS for authentication and encryption Group member:Li Man Yiu Tsun Yu Hin Wong Nok Wai.
DEPARTMENT OF COMPUTER ENGINEERING
310KM – Team Assignment: OS Platform of Mobile workforce for Logistics Company Window Mobile OS: Chan Wai Kai Android Operation Systems: Chan Kwok.
Wireless Encryption By: Kara Dolansky Network Management Spring 2009.
Android is a mobile operating system developed by Google and is based upon the Linux kernel and GNU software. It was initially developed by Android.
Suggested platform for development and support of a mobile workforce Lab/Tutorial 4 CHAN Chi Yin Lam Tak Faat LAU Hiu Tung SO Ho Ka, Rambo.
Hands-On Microsoft Windows Server 2003 Networking Chapter 1 Windows Server 2003 Networking Overview.
IOS 8 for MDM/EMM Greg Elliott Shiv Chandra Kumar.
SMARTPHONE OPERATION SYSTEM MARKET IN U.S. Ryan (Jang-Hoon) Doo ISM 158.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
 An electrical device that sends or receives radio or television signals through electromagnetic waves.
Symbian os with smart phones Guided by: Hetal A Josiyara
Sales Card Dell Confidential – Internal Use Only Microsoft Windows 10 OVERALL DELL MESSAGE: Let Dell help you migrate to take advantage of new Windows.
Identity and Access IDGo Secure (ISE) for Android Didier Bonnet November 2014.
Computer Networks NYUS FCSIT Spring 2008 Milos STOLIC, Bs.C. Teaching Assistant
1 Remote Management of Wireless Gateway Student Name: Dinesh D N (BITS ID: 2004HZ12158) MphasiS Technologies Ltd, Bangalore March 2006.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Excellence Publication Co. Ltd. Volume Volume 1.
ECE 424 Embedded Systems Design Networking Connectivity Chapter 12 Ning Weng.
Survey of PC and Network Operating Systems
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
ANDROID Presented By Mastan Vali.SK. © artesis 2008 | 2 1. Introduction 2. Platform 3. Software development 4. Advantages Main topics.
Mobile Device Security
Martin Schmidt / The Silent Revolution Mobile Java.
Android Husam Abdel Rahman. Introduction Android Operating system is most popular operating system these days with the advance in voice communications.
Visualizing Technology© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation To Accompany Chapter 6 System Software.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ARM offers a broad range of processor cores to address a wide variety of applications while delivering optimum performance, power consumption and system.
Wireless and Mobile Security
WAP vs. WEP Prof. Carlos Rodríguez Sánchez. WAP WAP Wireless Application Protocol a secure specification that allows users to access information instantly.
NETWORKING & SYSTEM UPDATES
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
The Whole new Experience - By Mahesh Chauhan. Its sounds strange but the fact is that :-  More than 90% of the CPUs in the world are not in desktops.
Analysis And Research Of System Security Based On.
By : Abhishek Verma Main Topics : 1. Introduction 2. Platform 3. Software Development 4. Overall Evaluation.
By Adam Reimel. Outline Introduction Platform Architecture Future Conclusion.
History of Windows Operating System. Windows 1.0 Debuted in 1985 First version of Windows that was set up to use bitmap displays and mouse pointing devices.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
3 main operating system! BY Charlotte Oates. Microsoft windows! A family of operating systems for personal computers. Windows dominates the personal computer.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Contents: Introduction Different Mobile Operating Systems
PREPARED BY: RUMMY MIRANDA
OPERATING SYSTEMS.
Korea Software HRD Center
Presentation transcript:

Mobile Mobile OS and Application Team: Kwok Tak Chi Law Tsz Hin So Ting Wai

Windows Mobile  Based on Win32 API (Microsoft)  similarly in the window desktop edition  Run on portable devices  Pocket PCs  Smart phones  Portable Media Centers  On-board computers for automobiles

Windows Mobile (Authentication and Encryption)  Data Encryption Standard (DES)  Data encryption using a private (secret) key that offers 56-bit encryption for each 64-bit block of data  Advanced Encryption Standard (AES)  The current algorithm recommended by the US National Institute of Standards and Technology (NIST) for use in U.S. Government  Windows Mobile 5.0 supports both 128-bit and 256-bit AES encryption.

Windows Mobile (Authentication and Encryption)  RSA  An Internet encryption and authentication system  Provides encryption algorithms developed for Web browsers  Owned by RSA Security

Windows Mobile (Authentication and Encryption)  Strong password technology for Windows Mobile- powered Pocket PCs, SIM lock support  802.1x Extensible Authentication Protocol / Transport Layer Security for wireless connections  Wireless Security can support WEP Wireless Encryption and Wi-Fi Protected Access (WPA)  Secure Sockets Layer (SSL) connections  Microsoft Pocket Internet Explorer

Windows Mobile Strength  Interaction with Microsoft's products  Smooth  User friendly

Windows Mobile Weaknesses  No Multi-tasking  Less Apps  New product

Android  Developed by Google  Based on Linux kernel  Open source  The network and telephony configuration

Android  Allow the developer to write the managed code in Java language  Controlling the device via Java library  Highly secure operation system with heavy encryption

Android (Encryption and Authentication)  RFC 4615: The Advanced Encryption Standard- Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE)

Android Strengths  Easy to accessible  Open resources  Million apps provided  Customization  Smooth  User friendly

Android Weaknesses  Virus at android market  Many different version, not Unity

iPhone OS  Developed by Apple Inc.  Four abstraction layers  Core OS layer  Core Services layer  Media layer  Cocoa Touch layer  Provide software development kit (SDK)  Based on a variant of the same XNU kernel  iPhone is also based on XcodeXcode

iPhone OS (Encryption)  iPhone 3GS offers hardware-based encryption. iPhone 3GS hardware encryption uses AES 256 bit encoding to protect all data on the device. Encryption is always enabled, and cannot be disabled by users.

iPhone OS (Authentication)  In addition to enabling secure access to existing VPN environments, iPhone offers proven methods for user authentication.  Authentication via standard x.509 digital certificates provides users with streamlined access to company resources and a viable alternative to using hardware-based tokens.

iPhone OS (Authentication)  WPA/WPA2  iPhone supports WPA2 Enterprise to provide authenticated access to your enterprise wireless network. WPA2 Enterprise uses 128-bit AES encryption, giving users the highest level of assurance that their data will remain protected when they send and receive communications over a Wi-Fi network connection. And with support for 802.1x, iPhone can be integrated into a broad range of RADIUS authentication environments.

iPhone OS Strengths  Smooth  Million apps provided  Easy to use  User friendly

iPhone OS Weaknesses  Accessible  Development

Symbian OS  Developed by Symbian Ltd  Contains the related libraries, user interface and reference implementation of the common tools  Open source operating system

Symbian OS  licenses Symbian OS to the world’s leading handset manufacturers  A descendant of Psion's EPOC and runs exclusively on ARM (Advanced RISC Machine) processors

Symbian OS Strengths  More Apps  Widely used at various devices

Symbian OS Weaknesses  Out dated product  Virus  Not smooth