Font Size: a A A

Design And Implementation Of A Personal Privacy Protection Application In The Android Platform

Posted on:2015-04-17Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhuFull Text:PDF
GTID:2298330467485466Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the popularity of smart phones and their features’increasingly improvement, mobile phones are no longer limited to be used to make calls and send messages. Cell phone stores not only photos, videos, documents and other information, but also chats with your friends. However, it leads to a series of safety problems. How to ensure the safety of private files in your phone? How should I do when my phone is lost? How should I do when I don’t want someone else use some apps installed to my phone?Currently, the mobile Internet era has come. Mobile devices develop rapidly and a variety of intelligent terminal equipments come into being. In the current smart phone markets, Android, iOS and Windows Phone platforms competes fiercely. Among these platforms, Android occupies the largest market share with its open source and a good user experience. However, precisely because of its open nature, security of the system is difficult to be guaranteed. When viruses are implanted, the private information stored on the phone is no longer safe. So it has come to a crucial stage to protect Android phone users’privacy.Now there have been a lot of tools used to protect user’s privacy in Android phones. But some problems such as complex operation, long encryption time and lack of proactive defense are widespread. So user experience is not good. To solve these problems, this thesis has designed and implemented a privacy protection software in Android platform. It can be used to encrypt files on your phone, lock applications you don’t want to be used by others and do some protection measures such as locking your phone and data destruction when your phone is lost.This thesis firstly describes the projects’background, technology and users’needs in detail. Then it gives a detailed explanation of the system’s design and implementation process, from the system’s overall design and detailed design. Through the simulator and real machine tests, the system runs normally. It proves the system is available and meets the requirement of original design. Finally, the thesis summarizes the entire process of the system design and implementation and makes an analysis of the shortcomings of the system.
Keywords/Search Tags:Android, Privacy Protection, Security Software
PDF Full Text Request
Related items