Symbian Mobile Operating System
We all are familiar with different operating systems that are used in our mobile phones and computer systems. Of these the most important one is the Symbian mobile operating system. Have you heard about Symbian mobile operating system? As a matter of fact Symbian may be a mobile operating system (OS) targeted at mobile phones that provides a high-level of integration with communication and personal information management (PIM) functionality.<!–more–>
Symbian OS consists of middleware with wireless communications through an integrated mailbox and also the integration of Java and PIM functionality. The Symbian OS is open for third-party development by independent software vendors, network operators, enterprise IT departments and Symbian OS licensees.
Symbian OS offers a high level of integration with communication and personal information management (PIM) functionality. Generally, as a smart phone operating system, Symbian will give several applications and services such as; music playback, games, associated libraries, navigation, etc. In fact Symbian was designed for mobile devices from its earliest incarnation as EPOC32 in the Psion Series 5.
Mainly there are three modules for a Symbian security model. Now let us have a look at these:
Trusted Computing Base (TCB):
The trusted computing base holds a group of software packages that are used enforce and touphold the latter 2 modules. The TCB consists of the file system, the kernel and the software installer.
A feature known as data caging is introduced to safeguard data files and executables of the applications. Directories which are used for applications are protected by the file system in a method that only the processes with the original application secure identifier (SID) will get access to them. By caging processes, so that they’ll only access specific components of the file system all of the users’ private information are often kept safe and separated from the applications processes.
All data and application resources, regardless whether or not they are public or personal should be shielded from unauthorized access by data‐caging protected directories and thus limiting access rights.
Capabilities define what the application will and can’t do. These rights are defined on application installation and that they can’t be altered later on. In a method the capability model is used to express how trustworthy an application is. In another point of view it also limits the applications permissions.
If a method needs to accomplish some tasks it desires some capabilities so as to be able to run the task in question. In order to run these tasks. Also the application also needs permissions which are defined by the applications signature.
Now let us see some of the advantages of using Symbian Operating system in mobile devices:
- Wide range of applications
- High quality games
- Good inbuilt wap browser
- Connectivity is more faster and easier
- You can install pdf reader in your mobile
- It is possible to download big files using your phone with 3G around
In fact one of the major disadvantages of mobile phones with Symbian operating system is that they are prone to virus attack.0