Font Size: a A A

Research And Implementation Of The Security System Of Mobile Widget Engine

Posted on:2013-03-05Degree:MasterType:Thesis
Country:ChinaCandidate:Y R SunFull Text:PDF
GTID:2248330374985460Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the continuous development of mobile computing technology, theperformance and function of mobile phones and other mobile devices has also been agreat development, now the phone is no longer confined to the role of communicationmore often become personal mobile data terminal. With the increasing popularity of3Gnetworks, and even4G network will be formally entered the commercial stage, networkbandwidth greatly enhance the mobile Internet which is full of opportunities fordevelopment. Under the impetus of the above two factors, the limited mobile Internetapplications in the2G era are gradually become realities, and are more widely used.However, there are many terminal manufacturers and platforms, and the differencesbetween them generate many issues to the development of applications, such asadaptability, higher development costs, and longer development cycle. The industry istherefore an urgent need for a unified application platform can mask the differences in avariety of terminal, to achieve "write once, run everywhere", and minimize thedevelopment threshold. Mobile Widget was born in this context and has gottenexplosive growth.Mobile Widget is compact, lightweight and full-featured, and the low requirementsfor development and running make it perfect to implement mobile Internet applications.Mobile Widget applications generally run on mobile phones and other mobile devices,which contain a lot of personal contacts and other private information, therefore securityissues must be given adequate attention. This dissertation is to conduct in-depth analysisand discussion on this issue.This paper introduced the mobile widget research achievements, including themainstream standards, as well as commercial products, an overview of several securitytechnologies firstly. Then a brief introduction to xFace, the specific research project, ispresented, mainly to explain the technical characteristics and advantages of xFace andto analysis the technical architecture briefly. The introduction laid the practicalfoundation for the subsequent theoretical analysis. The following detailed analysis of mobile widget security requirements, accordingto the characteristics of the mobile widget, pointed out that a variety of securitytechnologies need to be applied and cooperate with each other in order to build a perfectsecurity system. During the requirements analysis process, this paper creativelyproposed an analysis method including two points of view, the life cycle and the role ofmobile widget applications, to analysis and classify all requirements, making theconclusion is more closely and clear. With the determined specific securityrequirements, this article described the concrete realization of these requirements onproject xFace, with detailed statements of technical details. Additionally, someimportant and typical technologies, including digital signature, authorization certificatemechanism and original SingleFile technology, are selected to be more in-depthanalyzed and discussed. Finally, this article described the test approach and processaccompanied the development of xFace. Part of the test results are presented andanalyzed, proving that the mobile widget security system which proposed andimplemented in this paper achieved the research objectives. The system could protectmobile widget’s security effectively, along with superior operating performance, andsignificantly promoted the practicality and commercialization of mobile widget.
Keywords/Search Tags:Mobile Internet, Mobile Widget, Widget Engine, Widget Security System
PDF Full Text Request
Related items