Menu
3GSM: Mobile security demands

3GSM: Mobile security demands

The growing functionality of mobile phones -- which in the future could be used to unlock doors and make credit-card purchases -- is driving demand for new and stronger security products, companies exhibiting at the 3GSM World Congress in Barcelona said.

"It's a matter of devices becoming more and more like mobile computers," said Ofir Zukovsky, sales director, software solutions for Discretix, a developer of security products including authentication key management, cryptography and content protection employed by mobile phone chip makers.

Users may become particularly conscious of security on their phones as they begin to use them for more personal applications. Even currently available applications, such as camera phones, open the door to potentially damaging security problems. Photos of family members stored on a phone in combination with other personal information could enable certain kinds of identity-theft crimes, said Zukovsky.

Future applications that might store a user's fingerprint or passport identification information could also lead to potential problems if a user's phone is stolen or broken into, said George Minassian, vice president of strategic planning and systems engineering for Spansion Inc.'s wireless division.

Spansion's technology resides in the Flash memory of a phone. One of its offerings aims to protect users as they download more and more applications to their phones. The technology would allow users to choose to download a new application or piece of content into a secure area. If the application contains malicious code, it can't damage the rest of the phone and users can easily delete it, Minassian said.

A similar offering would allow users to take photos with their camera phone and opt to store the photo in a secure area. User's might want to use the feature for photos of family members, for example. They'll need to enter a password in order to access the photo in the future.

Spansion is offering the technologies but they so far haven't been deployed by handset makers.

Both Spansion and Discretix promoted security at the hardware level, rather than suggesting that end users rely primarily on antivirus software. While antivirus software is easy to install, the fact that it is software means it can be corrupted by hackers and it can also slow performance of devices, Minassian said. Hardware or firmware-based solutions are harder to corrupt, he said.

However, one downside to the technologies offered by Discretix and Spansion is that they must be adopted by chip makers and then phone manufacturers, a process that could take two years, Minassian said. "We're protecting for when the mobile wallet comes out. We have to predict the applications," he said.


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags 3GSM

Brand Post

What to expect from your IT Distributor

Whether you’re just starting out or you’ve been around since before the dot com rollercoaster, choosing the right distribution partner can be a pivotal factor in your success. This definitive guide outlines the traits that every IT partner needs to look for in their IT Distributor.

Featured

Slideshows

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners

This year’s Reseller News 30 Under 30 Tech Awards were held as an integral part of the first entirely virtual Emerging Leaders​ forum, an annual event dedicated to identifying, educating and showcasing the New Zealand technology market’s rising stars. The 30 Under 30 Tech Awards 2020 recognised the outstanding achievements and business excellence of 30 talented individuals​, across both young leaders and those just starting out. In this slideshow, Reseller News honours this year's winners and captures their thoughts about how their ideas of leadership have changed over time.​

Meet the Reseller News 30 Under 30 Tech Awards 2020 winners
Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security

This exclusive Reseller News Exchange event in Auckland explored the challenges facing the partner community on the cloud security frontier, as well as market trends, customer priorities and how the channel can capitalise on the opportunities available. In association with Arrow, Bitdefender, Exclusive Networks, Fortinet and Palo Alto Networks. Photos by Gino Demeer.

Reseller News Exchange Auckland: Beyond the myths — how partners can master cloud security
Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomes industry figures at 2020 Hall of Fame lunch

Reseller News welcomed 2019 inductees - Leanne Buer, Ross Jenkins and Terry Dunn - to the fourth running of the Reseller News Hall of Fame lunch, held at the French Cafe in Auckland. The inductees discussed the changing face of the IT channel ecosystem in New Zealand and what it means to be a Reseller News Hall of Fame inductee. Photos by Gino Demeer.

Reseller News welcomes industry figures at 2020 Hall of Fame lunch
Show Comments