Uhuru Mobile
   HOME

TheInfoList



OR:

Uhuru Mobile is a secure Android-based
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
. An
operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
is the principal program allowing
Smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
s, Tablets and
PCs A personal computer (PC) is a multi-purpose microcomputer whose size, capabilities, and price make it feasible for individual use. Personal computers are intended to be operated directly by an end user, rather than by a computer expert or techn ...
to run. This central tool connects and coordinates all the components such as
kernel Kernel may refer to: Computing * Kernel (operating system), the central component of most operating systems * Kernel (image processing), a matrix used for image convolution * Compute kernel, in GPGPU programming * Kernel method, in machine learnin ...
, computers programs,
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
or
device driver In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer or automaton. A driver provides a software interface to hardware devices, enabling operating systems and ot ...
s, letting users managing their devices. Uhuru Mobile is a solution composed with its application
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
market, a modified Android-based OS, a
virtual private network A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
and a
SMS Short Message/Messaging Service, commonly abbreviated as SMS, is a text messaging service component of most telephone, Internet and mobile device systems. It uses standardized communication protocols that let mobile devices exchange short text ...
encryption solution. The purpose of Uhuru Mobile is to prevent physical attacks.


History

The name Uhuru comes from the
Swahili language Swahili, also known by its local name , is the native language of the Swahili people, who are found primarily in Tanzania, Kenya and Mozambique (along the East African coast and adjacent litoral islands). It is a Bantu language, though Swahili ...
and means ''freedom'' and ''independence''. Uhuru Mobile is the result of a
research and development Research and development (R&D or R+D), known in Europe as research and technological development (RTD), is the set of innovative activities undertaken by corporations or governments in developing new services or products, and improving existi ...
project initiated in 2012 to promote digital sovereignty. As an Android-based operating system, Uhuru Mobile focuses on security and privacy for end-users, individuals or businesses, on mobile devices. The operating system is currently developed by a software Editor company called Teclib’.


System architecture


Software Overview


Multi-layers Protection

* Kernel: The system core is protected against malicious or unknown code as well as physical attacks or access. * System protection: Critical resources are dynamically protected from
malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
and vulnerability exploits ensuring the integrity of the operating system’s components. * Data protection: User’s data on the device are
encrypted In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
. User’s authentication resources are protected by using certificates. * Application protection: The
applications Application may refer to: Mathematics and computing * Application software, computer software designed to help the user to perform specific tasks ** Application layer, an abstraction layer that specifies protocols and interface methods used in a c ...
that can be installed on the device are exclusively coming from a market of certified applications. All those applications are validated and certificated before being available within the Uhuru applications market.


Additional Features

To ensure the OS protection and security while using
applications Application may refer to: Mathematics and computing * Application software, computer software designed to help the user to perform specific tasks ** Application layer, an abstraction layer that specifies protocols and interface methods used in a c ...
, a dedicated market has been installed (replacing the Google Play Store). Uhuru Mobile’s applications market only provides apps approved and certified by a team of security experts. Companies can also customize the Uhuru marketplace providing their in-house applications. Uhuru mobile is provided with a deception system, sending fake
GPS location Geodetic coordinates are a type of curvilinear coordinate system, curvilinear orthogonal coordinate system used in geodesy based on a ''reference ellipsoid''. They include geodetic latitude (north/south) , ''longitude'' (east/west) , and ellipsoi ...
coordinates In geometry, a coordinate system is a system that uses one or more numbers, or coordinates, to uniquely determine the position of the points or other geometric elements on a manifold such as Euclidean space. The order of the coordinates is sig ...
to applications. This decoy geolocation tool allows users to fool some applications using
geolocation Geopositioning, also known as geotracking, geolocalization, geolocating, geolocation, or geoposition fixing, is the process of determining or estimating the geographic position of an object. Geopositioning yields a set of Geographic coordinate s ...
. IT administrators can define the redirecting
coordinates In geometry, a coordinate system is a system that uses one or more numbers, or coordinates, to uniquely determine the position of the points or other geometric elements on a manifold such as Euclidean space. The order of the coordinates is sig ...
. For example in the demo version, the
NSA The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collectio ...
headquarters coordinates were sent by the deception system. A
mobile device management Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of m ...
tool for the administration of mobile devices is provided without any additional setup. IT administrators have access to a web-console in order to manage the Uhuru Mobile fleet and all linked applications (such as the remote apps installation/suppression or the set up of user accounts).


See also

*
Operating system An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also in ...
*
Mobile device management Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of m ...
*
Security-focused operating system This is a list of operating systems specifically focused on security. Operating systems for general-purpose usage may be secure without having a specific focus on security. Similar concepts include security-evaluated operating systems that hav ...


References


External links


Teclib Edition/Uhuru Mobile

Uhuru Mobile


Bibliography

* . * . * . * . *{{Citation , last1 = Massolin , first1 = Francis , url =https://fojproject.com/blog/secure-mobile-made-france , title = A secure Mobile made in France , type = article , publisher = FOJproject , year = 2014. Mobile operating systems