diff -r 25a17d01db0c -r ebc84c812384 Symbian3/SDK/Source/GUID-BC191AA8-696F-51A2-801F-B3F952037F54.dita --- a/Symbian3/SDK/Source/GUID-BC191AA8-696F-51A2-801F-B3F952037F54.dita Fri Jan 22 18:26:19 2010 +0000 +++ b/Symbian3/SDK/Source/GUID-BC191AA8-696F-51A2-801F-B3F952037F54.dita Thu Mar 11 15:24:26 2010 +0000 @@ -10,12 +10,12 @@ OS -Security Quick StartOS Security on Symbian platform enables data confidentiality, integrity -and authentication. It provides high-level services, such as key and certificate -management, authentication, secure user prompting, and Digital Rights Management -(DRM) framework. -
Getting started with OS Security

OS Security is -intended to support:

    +Security Quick StartOS Security on the Symbian platform enables data confidentiality, +integrity and authentication. It provides high-level services, such as key +and certificate management, authentication, secure user prompting, and Digital +Rights Management (DRM) framework. +
    Getting started +with OS Security

    OS Security is intended to support:

    • Secure communication protocols that provide data confidentiality and integrity

    • Authentication of installable @@ -23,8 +23,8 @@

    • Protection of device integrity

    -
    Architecture

    OS Security includes the following -collections:

      +
      Architecture

      OS +Security includes the following collections:

      • Authorisation contains User Prompt Service (UPS) component that provides standard interfaces for the device creators to set policies that determine if requests made by applications to access system @@ -62,8 +62,8 @@ OpenSSL components.

      The following diagram shows the OS Security's components grouped into collections, which are shown as white boxes:

      -
      Technologies

      DRM

      DRM refers to -an access control technology that prevents unauthorised use of copyrighted +

      Technologies

      DRM

      DRM +refers to an access control technology that prevents unauthorised use of copyrighted content.

      To know more about the key concepts used in OS Security, see OS Security Concepts.