Security for Windows Mobile Devices
4/8/2010
Security technologies control access to resources, such as devices, applications and data. They help ensure information confidentiality, data integrity, entity authentication, and data origin authentication. Security technologies provide security for data and communication in Windows® phones.
In This Section
This section provides information on the Windows Mobile security model, Authentication Services, Credential Manager, Cryptography, and LASS application development and programming elements.
- Windows Mobile Device Security Model
Provides information on the structure of one-tier and two-tier security models, acquiring and using digital certificates to sign code and .cab files, and implementing security policies on Windows Mobile devices.
- ** Supported Authentication Protocols **
Contains information on the different authentication protocols used to provide security for network communications.
- ** Guidelines for Creating Strong Passwords **
Tips to create secure passwords.
- ** Certificate Installer **
Describes installation of certificates via various file formats.
Device Encryption
Describes protection of local device data from offline hardware attacks by employing encryption.Authentication Services
Describes the application programming interfaces supporting authentication services.
- Certificates
Describes how you can use certificates to provide enhanced security in communications and how to use the certificates programming elements to use and manage those certificates.
- Credential Manager
Describes the application programming interfaces supporting credential manager. Credential Manager provides storage for cached credentials, and enables the sharing of common credentials.
- Cryptography
Provides information about how you can use the cryptography functionality to enable application developers to encrypt and decrypt sensitive data.
- Local Authentication Subsystem (LASS)
Describes the application programming interfaces supporting LASS which enable application-independent and authentication mechanism-independent user authentication. Contains information on the different authentication protocols used to provide security for network communications.
- Smart Card
Provides information about how you can use the smart card dynamic-link libraries (DLLs), smart card resource manager application programming interface (API), and the smart card reader hardware device drivers that make up the smart card functionality.