Chapter 10, the system can prevent modules, EXEs, and DLLs from being run at all. Even when allowed to run, there are two levels of run-time privilege that can be Listing 10-1 in Chapter 10, the Smartphone restricts an additional set of communication-related functions. A list of these additional functions is shown in Figure 19-10.
ExTAPI SIM
lineRegister simUnlockPhone
lineSetCallBarringPassword simSetLockingStatus
lineSetCallBarringState simGetSmsStorageStatus
lineUnregister simChangeLockingPassword
lineSetPreferredOperator simReadMessage
lineSetEquipmentState simWriteMessage
lineGetGeneralInfo simDeleteMessage
lineManageCalls simReadRecord
lineSetGprsClass simWriteRecord
lineGetNumberCalls simGetRecordInfo
lineSetHSCSDState
lineGetUSSD CPM
lineSendUSSD CPMRegister
lineSetSendCallerIDState CPMShutdown
lineSetCallWaitingState CPMStatus
CPMRegisterTest
Short Message Service Connection Manager
SmsSetMessageNotification ConnMgrProviderMessage
SmsClearMessageNotification
SmsReceiveAllMessagesFromSIM Radio Interface Layer
SmsSetSMSC All Radio Interface Layer functions
*
* The system can be configured to allow the RIL functions to be called
by untrusted applications
Figure 19-10: The list of restricted communication functions in the Smartphone
The level of security implemented on a particular Smartphone is set by the telecommunication service that sells the phone. The service defines the protection level after considering security on its network, its phones, and the profit potential of restricting all software to be sold through its own service. Market pressures will drive this issue's Chapter 20.