Chapter 10, the system can prevent modules, EXEs, and DLLs from being run at all. Even when allowed to run, there are two levels of run-time privilege that can be Listing 10-1 in Chapter 10, the Smartphone restricts an additional set of communication-related functions. A list of these additional functions is shown in Figure 19-10.
ExTAPI SIM lineRegister simUnlockPhone lineSetCallBarringPassword simSetLockingStatus lineSetCallBarringState simGetSmsStorageStatus lineUnregister simChangeLockingPassword lineSetPreferredOperator simReadMessage lineSetEquipmentState simWriteMessage lineGetGeneralInfo simDeleteMessage lineManageCalls simReadRecord lineSetGprsClass simWriteRecord lineGetNumberCalls simGetRecordInfo lineSetHSCSDState lineGetUSSD CPM lineSendUSSD CPMRegister lineSetSendCallerIDState CPMShutdown lineSetCallWaitingState CPMStatus CPMRegisterTest Short Message Service Connection Manager SmsSetMessageNotification ConnMgrProviderMessage SmsClearMessageNotification SmsReceiveAllMessagesFromSIM Radio Interface Layer SmsSetSMSC All Radio Interface Layer functions * * The system can be configured to allow the RIL functions to be called by untrusted applications
Figure 19-10: The list of restricted communication functions in the Smartphone
The level of security implemented on a particular Smartphone is set by the telecommunication service that sells the phone. The service defines the protection level after considering security on its network, its phones, and the profit potential of restricting all software to be sold through its own service. Market pressures will drive this issue's Chapter 20.