SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Nokia (NOK) -- Ignore unavailable to you. Want to Upgrade?


To: S100 who wrote (12335)6/10/2001 2:43:26 PM
From: Eric L  Read Replies (1) | Respond to of 34857
 
re: Mobile Security

Transaction security isn't the sexiest topic related to the mobile Internet, but one of the most important.

>> Secure This

By Carlo Longino
Jun 07 2001
The Feature

Wireless security is a certain barrier in mobile commerce. Many common-sense mobile services such as banking and shopping are held back not only by bandwidth constraints, but also because carriers and vendors can't guarantee consumers that their credit-card numbers and PINs are safe.
Traditional Internet-based security methods, like so many other things, don't translate to the Net's wireless cousin, and most connections from a Web server to a mobile client aren't designed with end-to-end security in mind.

In a desktop environment, data is encoded server-side and decoded by the client, usually using the industry standard secure sockets layer (SSL) method. SSL, however, is designed for somewhat fast network speeds and quite a bit of client-side decryption (ie processing), making it a non-starter in the mobile world.

But typical WAP carrier gateways can receive SSL-encrypted data, decrypt it and then re-encrypt it in the mobile-friendly wireless transport layer security (WTLS), which can then be decrypted by the handset's browser. This provides a modicum of security, but the brief instant the data is decrypted on the gateway provides a vulnerability that is too great for most financial institutions to take a chance on.

Most everyone agrees the ideal solutions are public key infrastructures (PKIs), a system that enables secure transactions by utilizing a pair of keys generated from the same cryptographic algorithm. But most PKIs are based on the RSA algorithm, which is heavily taxing on mobile CPUs, and neither mobile networks or handsets are equipped with the necessary software.

Dialin' In

A simple way to ensure secure transaction for a bank or other service is to host a WAP gateway behind a secure enterprise firewall. WAP gateways suited for corporate deployment are readily available and allow companies to offer dial-up WAP access through modems behind their firewall, bypassing the vulnerabilities of the carrier's network.

But the significant financial and technical overhead required provides yet another stumbling block. A bank, for instance, must install and support a modem bank for dial-up PC banking, something many of them did away with as the Internet gained in popularity. But more importantly, devices must point to the right gateway - something many users will not want to deal with.

Although there are products such as Nokia's Activ solution, which through smart SMS pushes set-up information to a user's phone, there is still a measure of handset-level work that must be done. Users must also manually switch from their carrier's gateway to the enterprise's, and unless their phone is one of a handful that can accept multiple WAP gateway profiles, it's no small task.

This solution is already in use by several banks in Europe, including the region's biggest, Deutsche Bank, and the world's first to offer WAP banking, Finland's Merita.

Openwave's Secure Enterprise Proxy operates on a variation of the same idea. An enterprise sets up an additional gateway behind its firewall, which then communicates with the carrier's WAP gateway, taking out the translation from SSL to WTLS and allowing the transmission to remain secure until it reaches its destination. This product allows consumers to use their carrier's initial WAP settings, however the product only supports Openwave's carrier gateways, and also requires additional client software available only in Openwave WAP browsers.

Under Lock & Key

PKIs provide all the features that enterprises need for secure transactions, whether they be transactions in the commercial or technical sense (ie sending secure e-mails and accessing secure corporate networks):

* Confidentiality - assurance that a third party can't monitor the transaction.

* Authentication - assurance that all parties involved are who they claim to be.

* Integrity - assurance that sent data is not tampered with.

* Non-repudiation - assurance that agreements and transactions are binding.

It provides these by providing every involved party with a pair of keys - one public, one private - that are derived from the same algorithm and linked through asymmetric cryptography and created by a certificate authority (a company such as Verisign or RSA Security). The private key, which is never shared or transmitted is given only to the requestor, and the public key is placed in an open directory referenced by a certificate.

The private key is used to decrypt data that has been encrypted with the freely available matching public key, and vice versa. So for instance, if a user logs on to a bank's secure system, his outgoing data is encrypted using the bank's public key. Thus, only the bank can decode that data with its private key. In reverse, the bank sends data to the user using his public key, so that only he can decrypt the information.

The system also allows for authentication in the same way. To send an encrypted signature, the bank would encrypt a digital "signature" using its private key, which could then be decrypted using its freely available public key.

When the technology is combined with products to generate, store and manage the keys, and security policies that dictate how the system is used, it is referred to as a PKI, and commonly used to protect Web and messaging servers, virtual private networks, and high-level financial transactions. Many Web functions, such as online banking, use the system with the exception that the consumer uses a username and password in place of a certificate.

PKI systems offer the best current level of transaction security, and are ideally suited for customer-enterprise transactions. But they don't make sense in the mobile arena. The system requires a significant amount of processing power on the client side to perform decryption, as well as a considerable amount of memory for storing keys and certificates.

Another Approach

But a technology that offers significant advantages over Internet-based security methods are PKI systems based on elliptic curve cryptography.

Pioneered by Certicom, ECC offers security levels comparable to those generated by the RSA algorithm, but at up to one tenth of the size, meaning mobile CPUs have a much easier time decrypting data.

Certicom's ECC systems work in devices with modest amounts of memory, and the algorithm's smaller size reduces the amount needed for key and certificate storage, as well as allowing quicker computations, meaning transactions are quicker. And on today's slow mobile networks, speed is essential.

ECC-based PKI systems look certain to catch on at least in the short-term, as the system is basically an extension of the wired PKI systems many companies and carriers already have in place. SIM cards are being developed for GSM networks that include certificates that can be unlocked with a PIN code.

Another advantage of PKI systems is interoperability. That is to say a system designed to run over WAP can easily be adapted for I-mode or HDML, or to interact with existing Web-based systems.

Like A Deadbolt

But looking to the future, engineers see the obvious solution for 3G security - build the encryption and decryption into silicon.

Several device manufacturers - including Nokia, Ericsson, Handspring and Sony - have signed on to use Texas Instruments' Open Multimedia Applications Platform (OMAP) in their next-generation devices. OMAP is a dual-core architecture featuring a TI digital signal processor and an ARM RISC microcontroller, designed to take advantage of both processor's strengths - multimedia processing on the DSP and control code (such as operating systems and user interfaces) on the microcontroller - at a low power consumption.

A more exciting OMAP feature is that it allows for dynamic upgrades. So when, for instance, streaming video or audio services are available on 3G networks, carriers can send out an upgrade to a phone with an MPEG or MP3 decoder. OMAP is also developer-friendly as it is an open architecture that uses standardized application programming interfaces (APIs), and allows developers to easily move applications to and from other platforms.

TI recently announced the availability of a wide-ranging security library that utilizes both OMAP hardware and software and allows handset manufacturers to choose from a variety of security methods, including public and private key encryption, virus screening, firewall protection and even fingerprint detection. The library utilizes solutions from different developers designed specifically for the OMAP architecture and designed to run swiftly and efficiently across its processors, and transparently to the user.

The OMAP security library offers a number of significant advantages to manufacturers and enterprise. Its security solutions are easily integrated with existing operating systems, and interoperable with major security protocols like WTLS and SSL, as well as conforming to existing standards.

Keep It In The Family

Device manufacturers as well as financial institutions realize the implications and the necessity of common security systems. Interoperability rather than territorialism seems to be the order of the day in future wireless systems. Companies are banding together through industry consortiums such as MeT and Mobey to develop common frameworks and initiatives to ensure ease of use for consumers.

It's clear that security (as well as bandwidth) is holding back m-commerce. And solutions that are easy on the wired Internet just don't cut it in the wireless world. But device manufacturers as well as financial institutions and commerce enterprises must develop transparent, fast, and most of all highly safe security systems to win over consumers.

Carlo Longino is a freelance writer based in Austin, Texas. His previous experience includes work for The Wall Street Journal, Dow Jones Newswires, and Hoover's Online. He doesn't hold much hope for m-commerce as long as his mobile carrier can't even get voice calls right. <<

- Eric -



To: S100 who wrote (12335)6/11/2001 9:24:10 AM
From: Eric L  Respond to of 34857
 
re: Java Phones

>> Java Moves To Silicon For Better Phones

Stephen Shankland
6/11/01
c|net News.com

After years of promises, cell phones using Sun Microsystems' Java software have just begun shipping, but the real payoff is expected next as phones begin to use special Java chips to improve performance.
A host of companies are working on Java accelerator chips likely to find a welcome home in cell phones. The resulting speed-up could improve cell phones in several ways: by allowing more elaborate Java programs such as games, easing cell phone manufacturers' programming woes, or increasing battery power.

Sun, Java's inventor, has long wanted special-purpose chips to speed up Java. Though its own effort flopped, companies including Nazomi, Aurora VLSI, InSilicon, ARM Holdings, Zucotto Wireless and Parthus have come up with a new method. Instead of taking Sun's approach and creating an entirely new processor, these companies' products add Java acceleration to existing processors.

"I used to not believe in Java because of the performance issues, but now I see it coming. It's just a matter of time," said MicroDesign Resources analyst Markus Levy. "There's no doubt you will see three to 10 times more performance over software only."

The companies' plans--and chips, too, in Zucotto's case--were on display last week at Sun's JavaOne conference.

Java is a software technology invented by Sun to shield programmers from the difficulties of writing programs for different computing devices. Java programs run inside a special piece of software called a "Java virtual machine" that handles all the details of communicating with the underlying chips. That way, Java programs don't have to be changed for each device.

But this added virtual machine layer has a penalty: It takes a lot more processor horsepower to run the virtual machine as well as the Java program itself, so Java programs tend to run more slowly.

The Java accelerator chips take over some of the virtual machine's duties, executing Java instructions more speedily than the software.

Reversal of Fortune

The Java accelerator chips fulfill Sun's glaringly premature predictions that Java and Java chips would spread to the world of gadgets such as mobile phones, handheld computers, car navigation systems and TV set-top boxes.

"With the Java programming language positioned to be the platform of choice for next-generation information appliances, Java processor technology, developed to optimize Java applications, will be at the center of these devices in 1998," Sun trumpeted in a 1997 news release. The company's PicoJava chip never caught on, despite being licensed to IBM, NEC, Fujitsu and Rockwell.

Sun offered to license the PicoJava designs to interested parties, but the new generation of chips doesn't use Sun's design, said Curtis Sasaki, director of technology advocacy at Sun.

The satisfaction Sun must feel at having chips available is probably comparable to its relief at the recent arrival of Java phones after years of promises from Sun. Sun has signed up all the major first-tier cell phone manufacturers and most of the second-tier ones, Sasaki said.

In a speech at the JavaOne conference Tuesday, Nokia President Pekka Ala-Pietila said his company will sell 50 million Java phones in 2002 and 100 million in 2003. Motorola is making all its phones Java capable. NTT DoCoMo in Japan, the leading Java phone adopter thus far, has already shipped 3 million.

Sasaki expects that all the phones NTT DoCoMo sells will be Java phones by the end of the year. That's a nice ally, considering NTT DoCoMo sells 60,000 phones a day.

"Java is clearly moving into the mainstream," said Stuart Creed, director of business development at Zucotto.

Creed, Levy, Sasaki and InSilicon Product Marketing Director Gervais Fong all believe phones with Java accelerator chips will arrive in 2002.

Java Justified
Once Java is a staple, the next problem is figuring out what to do with it. Sasaki points to Java applications such as games for Japanese teenagers, gambling programs for Hong Kong high rollers and tools to help U.S. salespeople tap into corporate computers. But many analysts are skeptical.

"It still isn't clear that the applications are compelling enough. Whether somebody is going to buy a phone because of Java support, I don't think that's the case right now," Levy said.

Java accelerators could change that--especially in combination with high-speed third-generation (3G) cell phone networks that would enable data and Java programs to be downloaded more quickly.

Java chips would allow more powerful Java programs to run, such as MP3 players or better games. Or they could offload Java processing from the processor to let it run more slowly, thus consuming less power and providing longer battery life. In addition, cell phone makers could move some of the basic cell phone software--that used to remember phone numbers, log on to networks or synchronize with a PC--to Java versions that could be used with multiple models.

Once the Java foundation is laid, the money and the programmers likely will follow. "I also believe there are a lot of smart people who have a burning desire to make money. When that happens, Java is a big piece of it," Levy said.

Technicalities

Creating a Java accelerator chip isn't a trivial problem. And even when a chip is ready, there's the problem of updating the programming tools used by cell phone makers so software takes advantage of the new Java capabilities.

One difficulty is that Java programs use different types of instructions to perform tasks such as adding numbers together, so Java chips must be designed differently than conventional ones.

Chip size and capacity is also an issue. ARM Holdings engineer Howard Ho said his company's Jazelle chip executes 145 of the 228 total possible Java instructions, but that subset is what's used for about 80 percent of the Java processing.

Aurora VLSI takes a different approach. Its DeCaf chip runs 90 percent of Java instructions and thus is faster than competitors. But the added capacity means it's much bigger and therefore more expensive and power-hungry.

While Aurora and Zucotto plan standalone chips, most of the companies involved in putting Java on silicon sell only intellectual property in the form of chip designs meant to be grafted onto the main processor, Levy said.

It's not clear who's scoring with customers yet, but InSilicon's Fong said the company has signed at least one cell phone manufacturer. Zucotto's first chip, a combination Java accelerator and Bluetooth wireless communications chip called the x100, is due in the third quarter of 2001, and a Java-only one called the x120 is due in the fourth quarter.

Philips Semiconductor will use Zucotto's technology, Creed said. ARM has licensed its Jazelle design to LSI Logic and Sanyo, and its own models will be introduced in the fourth quarter, Ho said.

ARM, along with MIPS, has a major presence in the cell phone market CPU already. MIPS could be considering acquiring one of the smaller players, Levy said.

The merits of the different strategies and marketing efforts aren't certain yet, Levy said. Of the companies vying for customers now, "half will be gone by next year," he said. But the Java accelerator industry itself will be strong. <<

- Eric -