Uhuru Mobile is a secure Android-based
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
.
An
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
is the principal program allowing
Smartphone
A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s,
Tablets and
PCs to run. This central tool connects and coordinates all the components such as
kernel
Kernel may refer to:
Computing
* Kernel (operating system), the central component of most operating systems
* Kernel (image processing), a matrix used for image convolution
* Compute kernel, in GPGPU programming
* Kernel method, in machine learnin ...
,
computers programs,
software
Software consists of computer programs that instruct the Execution (computing), execution of a computer. Software also includes design documents and specifications.
The history of software is closely tied to the development of digital comput ...
or
device driver
In the context of an operating system, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabli ...
s, letting users managing their devices.
Uhuru Mobile is a solution composed with its application
encryption
In Cryptography law, cryptography, encryption (more specifically, Code, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the inf ...
market, a modified Android-based
OS, a
virtual private network
Virtual private network (VPN) is a network architecture for virtually extending a private network (i.e. any computer network which is not the public Internet) across one or multiple other networks which are either untrusted (as they are not con ...
and a
SMS
Short Message Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile phones exchange short text messages, t ...
encryption solution.
The purpose of Uhuru Mobile is to prevent physical attacks.
History
The name Uhuru comes from the
Swahili language
Swahili, also known as as it is referred to endonym and exonym, in the Swahili language, is a Bantu languages, Bantu language originally spoken by the Swahili people, who are found primarily in Tanzania, Kenya, and Mozambique (along the East Af ...
and means ''freedom'' and ''independence''.
Uhuru Mobile is the result of a
research and development
Research and development (R&D or R+D), known in some countries as OKB, experiment and design, is the set of innovative activities undertaken by corporations or governments in developing new services or products. R&D constitutes the first stage ...
project initiated in 2012 to promote digital sovereignty.
As an Android-based operating system, Uhuru Mobile focuses on security and privacy for end-users, individuals or businesses, on mobile devices.
The operating system is currently developed by a software Editor company called Teclib’.
System architecture
Software Overview
Multi-layers Protection
*
Kernel: The system core is protected against
malicious or unknown code as well as physical attacks or access.
* System protection: Critical resources are dynamically protected from
malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
and
vulnerability exploits ensuring the integrity of the operating system’s components.
* Data protection: User’s data on the device are
encrypted
In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
. User’s authentication resources are protected by using certificates.
* Application protection: The
applications
Application may refer to:
Mathematics and computing
* Application software, computer software designed to help the user to perform specific tasks
** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
that can be installed on the device are exclusively coming from a market of certified applications. All those applications are validated and certificated before being available within the Uhuru applications market.
Additional Features
To ensure the OS protection and security while using
applications
Application may refer to:
Mathematics and computing
* Application software, computer software designed to help the user to perform specific tasks
** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
, a dedicated market has been installed (replacing the Google Play Store). Uhuru Mobile’s applications market only provides apps approved and certified by a team of security experts. Companies can also customize the Uhuru marketplace providing their in-house applications.
Uhuru mobile is provided with a deception system, sending fake
GPS location
Geodetic coordinates are a type of curvilinear orthogonal coordinate system used in geodesy based on a ''reference ellipsoid''.
They include geodetic latitude (north/south) , ''longitude'' (east/west) , and ellipsoidal height (also known as geo ...
coordinates
In geometry, a coordinate system is a system that uses one or more numbers, or coordinates, to uniquely determine and standardize the Position (geometry), position of the Point (geometry), points or other geometric elements on a manifold such as ...
to applications. This decoy geolocation tool allows users to fool some applications using
geolocation
Geopositioning is the process of determining or estimating the geographic position of an object or a person.
Geopositioning yields a set of Geographic coordinate system, geographic coordinates (such as latitude and longitude) in a given map datum ...
. IT administrators can define the redirecting
coordinates
In geometry, a coordinate system is a system that uses one or more numbers, or coordinates, to uniquely determine and standardize the Position (geometry), position of the Point (geometry), points or other geometric elements on a manifold such as ...
. For example in the demo version, the
NSA
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
headquarters coordinates were sent by the deception system.
A
mobile device management
Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of ...
tool for the administration of mobile devices is provided without any additional setup.
IT administrators have access to a web-console in order to manage the Uhuru Mobile fleet and all linked applications (such as the remote apps installation/suppression or the set up of user accounts).
See also
*
Operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
*
Mobile device management
Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of ...
*
Security-focused operating system
This is a list of operating systems specifically focused on computer security, security. Similar concepts include security-evaluated operating systems that have achieved certification from an code audit, auditing organization, and trusted operati ...
References
External links
Teclib Edition/Uhuru Mobile
Uhuru Mobile
Bibliography
* .
* .
* .
* .
*{{Citation , last1 = Massolin , first1 = Francis , url = https://fojproject.com/blog/secure-mobile-made-france , title = A secure Mobile made in France , type = article , publisher = FOJproject , year = 2014 , access-date = 2016-07-18 , archive-date = 2016-08-11 , archive-url = https://web.archive.org/web/20160811064642/https://fojproject.com/blog/secure-mobile-made-france , url-status = dead .
Mobile operating systems