Beruflich Dokumente
Kultur Dokumente
UNIT V
Unit - V
MOBILE PLATFORMS AND APPLICATIONS
Mobile Device Operating Systems Special Constrains &
Requirements Commercial Mobile Operating Systems
Software Development Kit: iOS, Android, BlackBerry,
Windows Phone M- Commerce Structure Pros & Cons
Mobile Payment System Security Issues.
*Prasant Kumar Pattnaik, Rajib Mall, Fundamentals of Mobile Computing, PHI Learning Pvt. Ltd, New Delhi
Synopsis
Mobile Device Operating Systems
Mobile Operating System Structure
JAVA ME Platform
Synopsis
Software Development Kit
M- Commerce
Applications of M- Commerce
Structure of M- Commerce
Pros and cons of M- Commerce
Mobile Payment Systems
Security issues
4
Scheduling
Memory Allocation
File System Interface
Keypad Interface
I/O Interface
Protection and Security
Multimedia features
7
Java ME Platform
J2ME platform is a set of technologies,
specifications and libraries developed for small
devices like mobile phones, pagers, and
personal organizers.
Java ME was designed by Sun Microsystems. It
is licensed under GNU General Public License
Configuration: it defines a minimum platform
including the java language, virtual machine
features and minimum class libraries for a
grouping of devices. E.g. CLDC
8
Java ME Architecture
Profile: it supports higher-level services common to a more specific class of
devices. A profile builds on a configuration but adds more specific APIs to
make a complete environment for building applications. E.g. MIDP
Java ME platforms are composed of the following elements:
Application
Profile
Optional
Packages
Vendor
specific
classes - OEM
Configuration
Java ME Platform
It includes two kinds of platforms:
High-end platform for high-end consumer devices. E.g. TV settop boxes, Internet TVs, auto-mobile navigation systems
Low-end platform for low-end consumer devices. E.g. cell
phones, and pagers
Platforms
Device Characteristics
Windows Mobile OS
Windows Mobile is a compact operating system designed
for mobile devices and based on Microsoft Win32.
It provides ultimate interoperability. Users with various
requirements are able to manipulate their data.
Windows CE (Compact Edtion) - designed specifically for
handheld devices, based on Win32 API.
PDA (personal digital assistant), palmtop computer,
PocketPC were original intended platform for the Windows
Mobile OS.
For devices without mobile phone capabilities, and those
that included mobile phone capabilities
12
Palm OS
Palm OS is an embedded operating system
designed for ease of use with a touch
screen-based graphical user interface.
It has been implemented on a wide variety
of mobile devices such as smart phones,
barcode readers, and GPS devices.
It is run on Arm architecture-based
processors. It is designed as a 32-bit
architecture.
15
Palm OS
The key features of Palm OS
A single-tasking OS:
Palm OS Garnet (5.x) uses a kernel developed at
Palm, but it does not expose tasks or threads to
user applications. In fact, it is built with a set of
threads that can not be changed at runtime.
Palm OS Cobalt (6.0 or higher) does support
multiple threads but does not support creating
additional processes by user applications.
16
Palm OS
Palm OS has a preemptive multitasking kernel
that provides basic tasks but it does not
expose this feature to user applications.
Memory Management: The Memory, RAM
and ROM, for each Palm resides on a memory
module known as card. In other words, each
memory card contains RAM, ROM or both.
Palms can have no card, one card or multiple
cards.
Handwriting recognition input called Graffiti 2
17
Palm OS
Expansion support: This capability not only
augments the memory and I/O , but also it
facilitates data interchanges with other Palm
devices and with other non-Palm devices
such as digital cameras, and digital audio
players.
HotSync technology for synchronization
with PC computers
Sound playback and record capabilities
TCP/IP network access
18
Palm OS
Support of serial port, USB,
Infrared, Bluetooth and WiFi connections
Defined
standard
data
format for PIM (Personal
Information Management)
applications
to
store
calendar, address, task and
note entries, accessible by
third-party applications
19
Symbian OS
Symbian OS is 32 bit, little-endian
operating system, running on
different
flavors
of
ARM
architecture
It is a multitasking operating
system and very less dependence
on peripherals.
Kernel runs in the privileged mode and exports its
service to user applications via user libraries.
20
Symbian OS
User
libraries
include
networking,
communication, I/O interfaces and etc.
Access to these services and resources is
coordinated through a client-server framework.
Clients use the service APIs exposed by the
server to communicate with the server.
The client-server communication is conducted
by the kernel.
21
Symbian OS
The following demonstrates the Symbian OS
architecture
Symbian OS Libraries
KVM
Application Engines
Servers
Symbian OS Base- Kernel
Hardware
22
Symbian OS Features
Real-time: it has a real-time, multithreaded kernel.
Data Caging
it allows applications to have their own private data
partition. This feature allows for applications to guarantee a
secure data store. It can be used for e-commerce
applications, location aware applications and etc.
Platform Security
Symbian provides a security mechanism against malware. It
allows sensitive operations can be accessed by applications
which have been certified by a signing authority. In addition,
it supports full encryption and certificate management,
secure protocols (HTTPS, TLS and SSL) and WIM
framework.
23
Symbian OS Features
Multimedia
it supports audio, video recording, playback and streaming,
and Image conversion.
Internationalization support
it supports Unicode standard.
Symbian OS Features
A Hardware Abstraction Layer (HAL)
This layer provides a consistent interface to
hardware and supports device-independency
Kernel offers hard real-time guarantees to kernel
and user mode threads.
25
iPhone OS
BSD
File Systems
I/O systems
Networking
components
Based on Mach
kernel and Darwin
Core as Mac OS X
26
iOS
About Apples Proprietary Mobile OS iOS
iOS
Apples Proprietary Mobile OS
The user interface of iOS is based on the
concept of usage of multi touch gestures.
iOS is a Unix based OS.
iOS uses four abstraction layers, namely: the
Core OS layer, the Core Services layer, the
Media layer, and the Cocoa Touch layer.
Apples App store contains close to 550,000
applications as of March 2012.
28
iOS
Apples Proprietary Mobile OS
It is estimated that the APPs are downloaded
25B times till now.
First version of iOS is released in 2007 with the
mane OS X and then in 2008 the first beta
version of iPhone OS is released.
In 2007 September Apple released first iPod
Touch that also used this OS.
In 2010 iPad is released that has a bigger screen
than the iPod and iPhone.
29
iOS
Cisco owns the trademark for IOS;
Apple licenses the usage of iOS from
Cisco.
30
Mac OS X Architecture
Multitasking
Real-time
Strong memory
protection
31
Android
Google owns a trademark for Android Googles
permission is necessary to use Androids
trademark
In 2011, Microsoft announced it has made an
agreement with Android device manufacturers
(including Samsung and HTC) to collect fees
from them.
Androids source code is available under Apache
License version 2.0. The Linux kernel changes are
available under the GNU General Public
License version 2.
32
Android OS
Android is Linux based mobile OS for mobile
devices such as Tablets and Smartphones.
In 2005 Google acquired the initial developer of
the OS, Android Inc.
Then in 2007 Google formed an Open Handset
Alliance with 86 hardware, software and telecom
companies.
This alliance developed and announced Android
as an open source mobile OS under the Apache
License.
33
Android
Now, this OS is being used by multiple device
manufacturers (Samsung, Motorola, HTC, LG,
Sony etc) in their handsets
Android developer community has large
number of developers preparing APPs in Java
environment and the APP store Google Play
now has close to 450,000 APPs, among which
few are free and others are paid.
It is estimated that, as of December 2011,
almost 10B APPs were downloaded.
34
Android
It is estimated that as of February 2012 there
are over 300M Android devices and
approximately 850,000 Android devices are
activated every day.
The earliest recognizable Android version is
2.3 Gingerbread, which supports SIP and NFC.
In 2011 Android Honeycomb version (3.1 and
3.2) are released with focus on Tablets. This is
mainly focused on large screen devices.
35
Android
Handset layouts compatible with different
handset designs such as
larger, VGA, 2D
graphics library, 3D graphics library based.
Storage a lightweight relational database, is
used for data storage
Connectivit: GSM/EDGE, IDEN, CDMA, EVDO,UMTS,Bluetooth,WiFi, LTE, NFC &WiMAX
Messaging SMS, MMS, threaded text
messaging and Android Cloud To Device
Messaging (C2DM)
36
Android
Google faced many patent lawsuits against
Android such as by Oracle in 2006 that included
patents US5966702 and US6910205.
Distributed under
Apache License
Created by Android
Inc., as part of Google
in 2005
Development is Open
Source; source code is
publicly available
Programmers are
welcome to contribute
via Software
Development Kit (SDK)
Linux Kernel
Java-based
application
framework
37
Blackberry OS
The first operating system launched by
Research in Motion(RIM -the company
behind BlackBerry)
Operating system structure mainly
consists of following: GUI (Graphic User Interface).
Command processor.
Kernel.
38
Blackberry OS Architecture
39
Blackberry OS Features
Gestures
Multi-tasking
Blackberry Hub
Blackberry Balance
Keyboard
Voice Control
40
41
Advantages of Blackberry OS
It provides good security for data.
It avoids collusion of personal and business data.
Content promotion: Dedicated content channels
and feature banners that provide prime real estate to
help distribute your app to the right users.
App discovery: Universal search, top lists, social
sharing, reviews, and ratings help users find the
right app.
The Games app (in combination with Score loop):
A specialized portal for gaming allowing
multiplayer, social connections.
42
Disadvantages of Blackberry OS
New operating system was introduced too late
into the ever-growing market.
Yet to have as many apps available for
purchase or download compared to other phone
in the market.
Consumers have switched over to other
devices made by Apple or Android.
Swipe vs. home button. Once an application is
opened, you have to swipe up to return to the
main display.
43
Description
Activities
Services
Broadcast
Receivers
Content
Providers
Description
Fragments
Views
Layouts
Intents
Resources
Manifest
50
Advantages of Android
Android is open
Multitasking
Easy access to the Android App Market
Can install a modified ROM
Phone options are diverse
Ease of notification
Widget
51
M- Commerce
M-commerce (mobile commerce) is the buying and
selling of goods and services through wireless
handheld devices such as cellular telephone and
personal digital assistants (PDAs). Known as nextgeneration e-commerce, m-commerce enables users to
access the Internet without needing to find a place to
plug in.
The emerging technology behind m-commerce, which
is based on the Wireless Application Protocol (WAP),
has made far greater strides in Europe, where mobile
devices equipped with Web-ready micro-browsers are
much more common than in the United States.
52
M- Commerce
M-commerce can be seen as means of selling and
purchasing of goods and services using mobile
communication devices such as cellular phones,
PDA s etc, which are able to connect to the Internet
through wireless channels and interact with ecommerce systems
M-commerce can be referred to as an act of carryingout transactions using a wireless device
It is understood as a data connection that results in
the transfer of value in exchange for information,
services or goods
53
M- Commerce
It can also bye seen as a natural extension of e-commerce that
allows users to interact with other users or businesses in a
wireless mode, anytime/anywhere.
It can be perceived to be
any electronic transaction or
information interaction conducted using a mobile device and
mobile network thereby guaranteeing customers virtual and
physical mobility, which leads to the transfer of real or
perceived value in exchange for personalized, location-based
information, services, or goods.
M-commerce can also be seen and referred to as wireless
commerce.
It is any transaction with a monetary value that is conducted
via a mobile telecommunications network.
54
M- Commerce
M-commerce can also be seen and referred to
as wireless commerce.
It is any transaction with a monetary value
that
is
conducted
via
a
mobile
telecommunications network .
An ability to access an IT-System whilst
moving from one place to the other using a
mobile device and carry out transactions and
transfer information wherever and whenever
needed to.
55
M-Commerce Terminology
Generations
1G: 1979-1992 wireless technology
2G: current wireless technology; mainly
accommodates text
2.5G: interim technology accommodates graphics
3G: 3rd generation technology (2001-2005)
supports rich media (video clips)
4G: will provide faster multimedia display (20062010)
58
M- Commerce Structure
60
Pros of M- Commerce
M-commerce is creating entirely new service
opportunities - such as payment, banking, and
ticketing transactions - using a wireless device .
M-commerce allows one-to-one communication
between the business and the client and also
business-to-business communication .
M-commerce is leading to expectations of
revolutionary changes in business and markets.
M-commerce widens the Internet business
because of the wide coverage by mobile networks.
61
Cons of M- Commerce
Cell phones have small screen displays and that might be
irritating to someone who has the experience of the
desktop environment.
Another issue that can be seen as a disadvantage to mcommerce is the limitation in bandwidth. The GSM
technology has the data rate of 9.3 Kbps and the current
3-G technology offers a data rate goes up to 2 Mbps.
Mobile devices use batteries as their form of power
supply . Normally, power for a cell phone battery lasts
up to 2-3 days depending on how new the battery is. It
then gives the owner the burden of having to remember
to recharge it every now and then.
62
Cons of M- Commerce
Mobile devices do not have enough processing
power and the developer has to be careful about
loading an application that requires too much
processing. Also, mobile devices do not have
enough storage space. The developer has to be
also concerned about the size of his application in
the due process of development.
Mobile appliances are quite vulnerable to theft,
loss and corruptibility. Security solutions for
mobile appliances must, therefore, provide for
security under these challenging scenarios.
63
MeP
User
GSM Security
SSL tunnel
SMSC
IPP
Mobile Wallet
CC/Bank
67
Mobile Commerce
Server
User
GSM Security
Merchant
SSL tunnel
SMSC
ISO8583 Based
VPP IF
CP
CC/Bank
Mobile Wallet
Voice PrePaid
68
Security in M-Commerce
CA
SAT GW
(SIM)
Mobile IP
Service
Provider
Network
Mobile
Network
WAP1.1(+SIM where avail.)
Mobile Bank
WAP1.2(WIM)
Content
Aggregation
Internet
Merchant
WAP GW
Mobile e-Commerce
Server
Bank (FI)
Security and
Payment
WAP Architecture
Web Server
WAP Gateway
WML
WML Encoder
WMLScript
WSP/WTP
WMLScript
Compiler
HTTP
CGI
Scripts
etc.
WTAI
Protocol Adapters
Content
WML Decks
with WML-Script
Client
Etc.
70
HTML
JavaScript
HTTP
Transaction Layer (WTP)
TLS - SSL
TCP/IP
UDP/IP
Bearers:
SMS
USSD
CSD
IS-136
CDMA
CDPD PDC-P
Etc..
71
WAP Risks
WAP Gap
Claim: WTLS protects WAP as SSL
protects HTTP
Problem: In the process of translating one
protocol to another, information is
decrypted and re-encrypted
Recall the WAP Architecture
Solution: Doing decryption/re-encryption
in the same process on the WAP gateway
Wireless gateways as single point of failure
72
Platform Risks
Without a secure OS, achieving security on
mobile devices is almost impossible
Learned lessons:
Memory protection of processes
Protected kernel rings
File access control
Authentication of principles to resources
Differentiated user and process privileges
Sandboxes for untrusted code
Biometric authentication
73
Bluetooth Security
Bluetooth provides security between any two Bluetooth
devices for user protection and secrecy
mutual and unidirectional authentication
encrypts data between two devices
Session key generation
configurable encryption key length
keys can be changed at any time during a connection
Authorization (whether device X is allowed to have
access service Y)
Trusted Device: The device has been previously
authenticated, a link key is stored and the device is
marked as trusted in the Device Database.
75
77
80
Questions ?