Font Size: a A A

Research And Design Of Security Of Data Syncchronization Technology Based On Android Platform

Posted on:2016-05-25Degree:MasterType:Thesis
Country:ChinaCandidate:H ZhuFull Text:PDF
GTID:2298330467493179Subject:Computer technology
Abstract/Summary:PDF Full Text Request
Along with the development of Android mobile intelligent terminal equipment, mobile phone functions to meet the people in many key information storage requirements, such as mail list, SMS, short documents etc. Because this information is brief and general, in daily life and work, such as information storage may exist in more than one intelligent terminal, so the user needs to apply an obtainable personal integrity of the data information at any time. To achieve this function, we need to use the data synchronization technology.In the previous data synchronization methods, researchers realized that among mobile phone, PC and the cloud server data synchronization function, the synchronization can be realized in the mobile terminal and server data according to the account number and password login application. But in the previous study, the data in the establishment of synchronous is connected directly after the transfer, which is not protected. Secondly, the security scheme of data synchronization takes too much time before the second time in slow synchronization after the interruption. The need for coverage of the transmission of all data occupies a longer time, but also consumes data flow more, which may influence the use of the user.This paper aims at solving the above problems, and studies the data synchronization, data encryption technology. The application of research results to data security synchronization system is based on Android platform. The main work includes:(1)In order to improve the traditional method of synchronous transmission cover, redundant storage and transmission delay long problem, this paper puts forward a two-times and slow synchronization ratio transmission mechanism. It is applied according to the data item ID mapping table alignment data item ID logo. If it does not exist in the data, then saved directly, if the existence of this data a computational abstract, receiving data, compare, abstract the data in the local database Abstract With the received data is ignored if consistent, the corresponding part of the data storage, if not, you will need to correspond to this abstract data items stored. (2)In order to ensure security and data encryption, this paper uses Secure Hash Algorithm to compute the symmetric key account based on the information, the data interactive process of the symmetric key is applied between the client and the server.(3)In order to cater to the needs of the development of mobile Internet, this paper designs and implies a data-security system based on the synchronization of Android platform. The system uses the C/S framework, divided into Android client, PC client and server. It has realized the different terminal data security synchronization function, and the function and performance test of the related.
Keywords/Search Tags:data synchronization, syncml, android, data transmission
PDF Full Text Request
Related items