In our last write-up, we went on a roller-coaster ride to explore the different blocks that make up the entire architecture of the Wings Mobile Operating System.
Today, hold tight as we take down a deeper look into this sophisticated architecture that makes the creation of an exclusive device possible!
1. Application Wings Layer
Situated right at the top of the Safe Core OS, is the layer that consists of all Wings applications. Here, ONLY THE NATIVE Wings applications exist that have been implemented under the Android based Safe Core OS.
Some of these applications include: Wings Guardian 2.0, Wings Pay, Neural Face ID, Wings Dialer, Wings Play 2.0, Wings Secure Call, Wings Second Number, Wings World Roaming Free and Wings VOIP Call.
2. Neural Secure Launcher
Neural Secure Launcher, NSL, is a program that allows you to customize certain features of the user interface. For example: the Application Menu or the appearance of the Main Screen.
Nonetheless, NSL also authorizes and regulates access to telephone resources, using native Wings applications such as the Neural Face ID and the Triple Factor Authentication.
3. Application Framework
This consists of the above mentioned native Wings Applications and the Wings Safe Box.
Here, Wings Safe Box is a secure container that can only be accessed by the owner of the device while it protects the private applications, e-wallet, photo or video galleries and important documents from unauthorised access.
4. Secure Neural Libraries
This is an application layer that consists of the Wings Secure Libraries and the Neural Wings Libraries, in addition to Android based and SSL libraries responsible for internet or external security. Together, these libraries offer much greater control over the analysis and security management of the device based on various essential factors.
5. Wings Kernel
This layer provides a variant level of abstraction between the hardware of the device and contains all the essential drivers, for instance, camera, keyboard, display and so on. Wings Kernel makes use of a secure network along with a wide range of device drivers, to hook up the interface with the peripheral hardware.
6. Secure Boot Loader
Secure Boot Loader, SBL, guarantees the integrity of the device software across all Wings X Series devices. If any integrity violation is detected during start-up, a warning is reported on the local device and the start-up process is halted.
7. Crypto Storage Hardware (CSH)
This is a secure hardware element made up of a 32 GB encrypted and safe partition of storage memory. CSH securely stores confidential and cryptographic data like key management as well any other sensitive and private documents of the device user.
We are sure you are left astonished now after looking into the complexity of Wings devices, to create the very best for you through INNOVATION and TECHNIQUE!
— — — — — — — — — — — — — — — — — — — — — — — — — —