Font Size: a A A

The Security Research And Implementation Of Android Operating System

Posted on:2016-01-08Degree:MasterType:Thesis
Country:ChinaCandidate:F RenFull Text:PDF
GTID:2308330473454543Subject:Electronic and communication engineering
Abstract/Summary:PDF Full Text Request
Android operating system has been widely used in the field of Mobile Internet, as it is widely used in the mobile office, mobile payments, social networking, games, entertainment and other fields, Android platform has become an important target network attacker coveted. The analysis of its security problems and needs and building the solution of the security system have become hot topics in the ICT companies.This paper aims at the needs of public mobile security businesses and solving the problems in the mobile internet. Through analyzing the need of mobile security in details, we design the security mobile system based on the cryptography and verify the defense capabilities of the security mechanism. The main contents are:1. Raise the "three-side" security architecture, as the important complementary of a native Android security mechanism. Security architecture covers platform security, application security, and data security. It can provide security support for business users by using centralized management of mobile security.2. Android multi-level security isolation mechanism has been studied and analyzed. Compared to the rationality of mainstream popular Trust Zone, credible separation kernel architecture and application container mechanism is proposed based on LXC container which was combined with code security mechanisms to build applications to solve program.3. Propose code protection mechanisms to support the application of legality verification, secure login and key code protection, and build the secure transmission channel between the process of code-based.4.The analysis is proposed based on the online data protection program to protect key, enable the whole process of user data confidential support center unified control and safety audits, provide a reference for data security, which can be used in BYOD trend of mobile Internet.5. Develop a cloud key management center, security SDK, code management proxy component data and privacy data protection.
Keywords/Search Tags:mobile security, Android operating system, platform security, data security
PDF Full Text Request
Related items