Mobile VAS--from fantasy to reality

Chanay, Xavier
February 2001
Telecommunications - International Edition;Feb2001, Vol. 35 Issue 2, p102
Trade Publication
Discusses wireless telecommunication operators' ability to have value added service (VAS) interoperability by using security identity module (SIM) toolkit and javacard. Shortening of marketing time; Reduction of cost and risk; Impact of javacard technology on the SIM card market; Ramifications for code division multiple access (CDMA) operators; SIM toolkit capability of universal SIM.


Related Articles

  • Cellphone THEFT. BROWN, RACHEL // Rural Telecom;Mar/Apr2013, Vol. 32 Issue 2, p19 

    The article focuses on cellphone theft in the U.S. Topics discussed include the creation of a nationwide database to prevent reactivation of stolen phones, educating consumers to report lost or stolen phones and theft in rural tourism areas. Some of the security measures customers are encouraged...

  • The security analysis and improvements of link connection mechanism for mobile phone bluetooth transmission. Rui Zhang; Jian Wei Wang; Yaobin Xie; Lizhong Wang // Journal of Chemical & Pharmaceutical Research;2014, Vol. 6 Issue 6, p1380 

    The development of mobile communication technology has become a dazzling star in the information field. Especially for the third-generation mobile communication, Mobile phone Bluetooth is a highly-anticipated technology, with wide application prospects and potential economic value. Bluetooth...

  • NEW SECURITY THREATS TARGET CELL PHONES, MOBILE DEVICES. Villano, Matt; Follett, Jennifer Hagendorf // CRN;3/21/2005, Issue 1138, p45 

    Addresses the emergence of security threats targeting cellular phones as of March 2005. Information on the Cabir virus that originated from the Philippines; Reason for considering the BlackBerry product from Research In Motion as a potential risk for customers; Methods that increase the risks...

  • Verizon to support tablets and personal devices.  // RBOC Update;Jun2011, Vol. 22 Issue 6, p3 

    The article reports that Verizon Communications Inc. has added new management and security capabilities for both corporate and employee-owned mobile devices to its Managed Mobility portfolio in 2011, as well as an on-device portal to allow mobile workers to obtain required business applications....

  • Mobile phone technology: changing faces and fascias.  // MarketWatch: Global Round-up;Dec2005, Vol. 4 Issue 12, p233 

    The article presents information on the security concerns related to the new mobile technology. The vast majority of mobile phones are lacking in any form of protection, and anybody who picks one up can make use of it. Many users do not bother to implement PIN protection which may be the most...

  • Mobile Security--A Work In Progress. Finneran, Michael // Business Communications Review;Nov2006, Vol. 36 Issue 11, p18 

    The article discusses the challenges of wireless phone security. As technology increases, maintaining secure wireless devices is becoming increasingly complex. The four aspects of mobile security--privacy, authentication, veracity and network/device availability--are related. The unique...

  • Mobile Security: A Market Set to Soar. Hulme, George // CRN;Mar2009 Channel Advisor, p10 

    The article focuses on the importance of security protection for smartphones and mobile storage media in the U.S. The threats to confidential information stored on mobile devices are increasing and assures that the probability that hackers will start crafting it is also high. In response,...

  • Enterprises will soon become the key drivers of the mobile phone security market, analysts believe.  // SC Magazine: For IT Security Professionals (UK Edition);Jan2007, p8 

    The article considers the possible role of business enterprises as the key drivers of the mobile phone security market. According to Alan Goode, senior analyst at Juniper Research, corporate information technology managers are getting very concerned about the use of mobile devices on corporate...

  • Smartphones are great tools, but at what risk? Tullett, Jon // SC Magazine: For IT Security Professionals (UK Edition);Jul2004, p9 

    This article focuses on the risk of using smartphones. Mobile phones are allegedly evolving into smartphones. For one, Sony has taken the step of backing out of the personal digital assistant market, choosing instead to back its Sony-Ericsson smartphone line. Manufacturers are cramming new...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics