In Brief: Spansion designs Flash cell-phone barrier

Jun 19, 2006

Silicon Valley's Spansion Inc. Monday announced a new cell-phone security system that wards off viruses and other wireless threats.

Spansion said in a news release it had designed a solution that can be directly embedded into the phone's Flash memory subsystem, protecting the vital component against tampering and theft of consumer data.

Most wireless security systems function in the potentially vulnerable operating software while embedding the solution chip directly into the Flash subsystem offers better protection.

The company said the development will fit in well with advances that allow consumers to use cell phones for credit-card functions, electronic keys and storage of sensitive data.

"As more m-commerce and content applications become available, our mobile security approach will provide secure data storage and give consumers the confidence to use their handsets for important financial transactions and downloading digital media," said Spansion Vice President Amir Mashkoori, "That will open up revenue opportunities for wireless operators and content providers."

Copyright 2006 by United Press International

Explore further: The new Candy Crush? Chinese language apps make learning a game

add to favorites email to friend print save as pdf

Related Stories

Spansion 512Mb NOR Flash Memory Ships In Mobile Phone

Jun 13, 2005

Spansion LLC, the Flash memory venture of AMD and Fujitsu Limited, today announced that top French handset manufacturer, SAGEM, has developed the SAGEM myX-8 mobile phone using the Spansion S29GL512N Flash memory device – ...

Recommended for you

New app first to use gesture for language learning

Jan 29, 2015

While you might think a person shaking her phone or tablet from side to side is having issues with the device, she might actually be playing a game that has her mimicking a steering wheel motion as part of ...

Linux distrib vendors make patches available for GHOST

Jan 29, 2015

Qualys said on Tuesday that there was a serious weakness in the Linux glibc library. During a code audit, Qualys researchers discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc. ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.