Font Size: a A A

The Research Of Intelligent Mobile Terminal

Posted on:2011-07-25Degree:MasterType:Thesis
Country:ChinaCandidate:J QinFull Text:PDF
GTID:2178360305483081Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
3G network development for mobile networks has been a qualitative leap in performance, allowing mobile network devices can enjoy a variety of service types. However, service is often accompanied by risk. The mobile network device will be exposed and may be subject to a variety of malicious code attacks. This article proposes a solution based on the mobile terminals for the network threat.Now there is such a wide range of threat and so the mere software solution can not fully solve the security problems. This article proposes an integrate solution combining endpoint security software and hardware solutions. Specific programs are as follows:This article introduces the idea of trusted computing technology into mobile platform. Trusted computing idea is to ensure the credibility of the network access device to form a trusted network. Therefore, the mobile network is firstly to strengthen the security of terminal equipment. The TPM and the CRTM will be introduced into the terminal device, and which will be the core of the credibility of trusted platform through the transmission mechanism. The security features of terminal trusted platform including:the implementation of environmental protection, data integrity verification, data encryption storage, important information of the hardware protection.In order to ensure immunity to network terminal, the research of software solutions is about the detection of the terminal virus. By analyzing the characteristics and mode of transmission of the virus terminal, we choose the "behavior detection" mechanism to detect the terminal virus. It will build an comprehensive library rules of by analyzing and summarizing the behavior of malicious programs, which fully meet the terminal platform with low processing capability and limited resources.The integration of hardware and software solution can guarantee the security of mobile devices, and so it can establish the greater trust network.
Keywords/Search Tags:Terminal Security, TPM, CRTM, Behavior Detection, Rules Library
PDF Full Text Request
Related items