Does Your Mobile Application Need to Be Signed?Mobile devices can be placed into three categories: Fixed-purpose devices These are devices that ship with all the software on them that they are going to allow their users to access. There is no facility for adding additional software after device deployment. The original mobile phones of not too many years ago were such systems. Today the main reason for having a fixed-purpose device is to guarantee reliability and security. A closed system can be tested exhaustively. The only way to get your software onto a fixed-purpose system is to have it included in the device's ROM image either when the device is first manufactured or when its ROM is flash upgraded. Most interesting mobile device platforms today are not fixed-purpose systems. Open devices These are devices that have no restrictions on what software can be installed on them. The user is free to place any software they want on the device and does not need permission from anyone to do so. Most PDA/Pocket PC types of devices are open systems, and some smart phone devices are open systems. Restricted-extensibility devices These are devices that allow only approved applications to be installed on them. Any application that wants to run on a restricted-access device needs the consent of the third party that controls access to the device. In the case of mobile phones, this is typically the mobile network operator that issued the device. Applications deployed to restricted-access devices must be cryptographically signed before deployment.Appendix A). |