Brew essential security

Source: Internet
Author: User

Mobile communication networks are implementing technical changes of bearer networks with IP addresses as the core, and business networks will rely on bearer Networks Based on IP addresses. However, the existing IP bearer network cannot ensure the corresponding security and credibility, and the abuse and out-of-control of encryption technology pose some threats to information security. As a value-added mobile business platform, brew provides unique security.

4.3.4.1 System Security
Due to the wide coverage of security, even the OSI network layered model has different security layers. The security of the upper layer is meaningful only after the security of the lower layer is guaranteed and has a certain degree of transmission. Therefore, before an application system declares that it is a secure system, it must have sufficient security at different layers. System-level security, program resource access control security, functional security, and data domain security are sorted in a descending order of granularity. System-level security concerns of different systems are often very different. Most business systems do not even involve system-level security issues.

1) system-level security: brew's system-level security is determined by the bearer wireless network. Taking the CDMA network as an example, it can implement access IP segment restrictions, logon time period restrictions, connection connections restrictions, and the number of logins within a specific period of time. This is the first protection door of the application system.

2) Resource Access Control Security: On the brew client, the application is provided with settings related to its permissions. Only functions with the same permissions can be executed.

3) functional security: functional security will affect the BREW application process. To ensure the security of brew applications, all brew commercial applications are strictly tested. That is to say, the third-party independent test (true brew test) ensures the security of value-added business functions.

4) data domain security: In brew, the primary control of data domains is the execution of Digital Signature control. Programs that log on incorrectly cannot be executed, brew execution environment starts/enforces all other control and defense. Digital signature is a powerful weapon in the security field. The root key is in Verisign vault, and VeriSign also has a security mechanism that includes a password detection key.

In addition, brew-based value-added mobile service distribution channels are unidirectional. Once an application receives a commercial digital signature, it will never be modified, and the application will always be protected by the digital signature. In addition to the OTA and pre-installation authorized by the operator, the developer's applications are generally not accessible or tampered with by others on the BDS download server. Any modification on the phone, even one byte, will be detected and prohibited. Thus, the virus is unlikely to spread. That is to say, the release of applications is not a peering process, so there is no traditional high-speed transmission path for virus propagation. The security of resource access control makes it impossible for a program to change or erode another program. This possibility of almost no spread will make virus lovers almost sigh.

4.3.4.2 terminal security
Brew uses a mechanism named aeesafemode to prevent device crashes caused by faulty brew applications. After a mobile device crashes for the first time, this mechanism places the device in monitoring mode and starts a timer when it is restarted. The timer duration is configured by the mobile phone manufacturer.

If the timer times out, this mechanism switches the running level back to normal mode. If the device crashes again before the timer times out, the device enters safe mode again when it restarts and starts the timer. Disable all BREW application creation activities before the device returns to normal mode. You can restore the application to normal mode by calling or upgrading the problematic application. The following chart shows the Conversion Relationship between normal, monitoring, and security modes.

 

Figure 4-9: aeesafemode mechanism in brew

4.3.4.3 Content Security
For application content, brew provides complete application authentication and Management (Figure 4-10) to ensure that the applications downloaded by a user can only be used by this customer, this effectively prevents illegal copying and piracy of application software, and ensures that the legitimate rights and interests of operators, developers, and users are not infringed.

BDS
 
ADS uses the private key license signature
 
Brew app Digital Signature
 
Client Information
 
Rules
 
+
 
ADS uses Public Key decryption

 
 
Brew app Digital Signature
 
Client Information
 
Client license verification
 
ADS responds to client authentication requests
 
Signature operation
 
Signature Verification
 
Verify client information based on Terminal Information

 
 

Figure 4-10: BREW application authentication management and Digital Signature

A mobile phone is a device that must focus on security performance. applications used on your mobile phone must also be secure. Digital Signatures can play a role in achieving trust. All applications cannot run in brew without the electronic signatures of developers or carriers. For applications whose digital signatures may be replaced, it is determined that the applications may be infected with viruses and thus cannot run in the brew environment. Brew requires two electronic signatures. The first is to download the application, and the second is to confirm the downloaded application. This is to prevent the downloaded application from being tampered with into another program.

This article from the csdn blog, reproduced please indicate the source: http://blog.csdn.net/wireless_com/archive/2009/07/22/4369929.aspx

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.