?
Solved

Mobile Application Security

Posted on 2012-03-26
3
Medium Priority
?
439 Views
Last Modified: 2012-03-28
We are reviewing a document on mobile application security and one of the topics is: Implement Controls to Prevent Unauthorized Access to Paid-For Resources.  Under this topic is the following comment which I need help on:

"Minimize data transfers using techniques such as fast dormancy (3GPP), caching, and others to minimize signaling load on base stations."  ...what does this mean?

I will appreciate any help understanding this comment.
0
Comment
Question by:kooolsam
  • 2
3 Comments
 
LVL 65

Accepted Solution

by:
btan earned 1500 total points
ID: 37772006
Over is to minimise mobile congestion with connection and persistent connection to base station unnecessarily. At the same time to stay efficient by maximizing every connection established. This some sort alluding to content delivery network where cache is done at local some instead of always making longer trip to base station. Likewise for father normalcy the idea is not to tear down and build connection to many or unnecessarily. Sort of reducing the chance for new connection instead and optimized already established or going to established connection call...hope those make senses...one example below http://m.computerworld.com/s/article/9191759/Fast_dormancy_to_improve_smartphone_networking_and_battery_performance_?mm_ref=http%3A%2F%2Fwww.google.com%2Fsearch%3Fhl%3Den%26gl%3DGB%26ie%3DUTF-8%26source%3Dandroid-browser%26q%3Dfaster%2Bdormancy%2Bmobile%2Bbase%2Bstation
0
 

Author Closing Comment

by:kooolsam
ID: 37777279
The comments was very poor and hard to understand.  But the link provided was very, very helpful
0
 
LVL 65

Expert Comment

by:btan
ID: 37780015
Sorry as using the mobile phone as input keyboard.
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
When you put your credit card number into a website for an online transaction, surely you know to look for signs of a secure website such as the padlock icon in the web browser or the green address bar.  This is one way to protect yourself from oth…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…
Suggested Courses

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question