Font Size: a A A

The Research And Practice In Smartphone Terminal Security Mechanism

Posted on:2011-12-18Degree:MasterType:Thesis
Country:ChinaCandidate:P H ChenFull Text:PDF
GTID:2178360308462397Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the widespread use of smart phone devices, as well as the rapid development of the network, smart phones demand for security is being concerned. Smart phones, have a cell phone call function, but also with most of the functions of personal digital assistants, in particular, personal information management, data communication networks based on wireless e-mail, web pages and other functions. A lot of personal information is stored in the smart mobile phones.As the security requirements of smart phone terminals increased, the existing security architecture, which is difficult to meet the current security requirements of many personal information, has brought great security risk to the users'information in smart mobile terminals. The existing smart phone safety study mainly concerns about the network and service applications, and uses a more sophisticated encryption methods to encrypt, but in the actual daily life, resources of smart mobile terminals are usually limited, lack of inflexible, so, to guarantee the smart mobile terminals comprehensive security, the use of lower computation but a higher degree of security encryption algorithm has a strong sense of research and practical application.In this paper, based on embedded system OS technology, it introduces the knowledge of Windows CE embedded system, and does the relevant analysis on ARM instruction set, summarizes the existing security architecture of smart phones and the security vulnerabilities which exist in the model. In response to this situation, this paper presents security methods of an intelligent mobile terminal, and in-depth study of the system software layer, finally gives out a concrete solution:base on instruction-level encryption, and make the relative design and implementation. With the help of this encryption method, the security of the executable file in smart phones has been improved.Finally, it gives out test cases, validates and tests the security idea of system software layer, and based on the related analysis of its safety and efficiency, to find that the solution achieves the desired results.
Keywords/Search Tags:smart phone, security mechanism, system software layer, instruction-level encryption
PDF Full Text Request
Related items