Font Size: a A A

Security System Research On BYOD

Posted on:2015-01-05Degree:MasterType:Thesis
Country:ChinaCandidate:J XuFull Text:PDF
GTID:2268330428461549Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Mobile office is the inevitable outcome of the development of information and communication technologies. With the development of social information, emerged a large number of diversified mobile terminals, which changed the traditional patterns of the people’s life, work without time limitation, regional restrictions, giving people more means of access to information. Along with the development of broadband and wireless communication technology, people are not content with fixed location and the way of fixed connection, hope to get and deal with the important information anytime and anywhere, intelligent mobile phones, tablets, and the extension of social network, make this dream come true which will make people’s communication everywhere, the boundaries between the work and life has become increasingly blurred, accelerate the emergence of new mode mobile office--BYOD.The growing popularity of smart mobile devices, Android and iOS devices in particular, has not gone unnoticed by cyber-criminals. Compared with traditional PC, mobile device can work at anytime,anywhere and no network restrictions, However, mobile devices will be more easy to lose or be used because of its portability.this paper including the following parts:●Introduces BYOD and the composition of the core technology in the BYOD, and to interpret of existing mature solutions on the market, summarizes the advantages and disadvantages of each solution.●At present most of the mobile devices can support biometric authentication technology, like face recognition.however, attackers can make use of photographs and other nonliving face to bypass the detection, this paper puts forward face living detection algorithm based on LGS, which to improve the reliability of the mobile devices face recognition●There are two statuses when login a device, which is logged in or not logged in, it is difficult to determine whether the device is under legitimate use in case of device lost. We propose anomaly detection base on device location, test proved that the method can effectively detect the device loss when abnormal use.
Keywords/Search Tags:BYOD, Spoofing Face Detection, Location-awareness, AnomalyDetection
PDF Full Text Request
Related items