Font Size: a A A

Design And Implementation On Mobile Office System Based On Android

Posted on:2016-01-31Degree:MasterType:Thesis
Country:ChinaCandidate:Z F XueFull Text:PDF
GTID:2308330482964372Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the continuous improvement of network technology and the rapid development of mobile application technology, people’s life has changed a lot. Both the personal life and the connection of collective environments are enjoying the convenient services under the advanced Internet technologies. Nowadays, benefited from a variety of smart mobile devices, the offices have evolved from the old pattern to an efficient mobile pattern. This improvement gives OA more freedom and much broader spaces. More users are experiencing the convenience. This thesis presents a series tasks through analyzing the Android based mobile office system and related implementation technologies. The main contributions are as follows:Firstly, this paper proposes the general architecture and describes the logic architecture and function module structure of the system. The main function module structures include the auxiliary function modules, business modules and the client functional modules. Secondly, this thesis presents the system to accomplish the OA system based on Android client. Users can accomplish the preset business of WEB client through office system on the mobile based client, such as the data processing, mail management and document management, etc. All of them can be achieved on the mobile client including the business transaction, receiving and delivering information through e-mail and obtaining the business information and public resources. Thirdly, this thesis proposes a mobile office system to encrypt information by using the RSA based algorithm. This can ensure the security and stability, and prevent the disclosure of office data. Experimental results show that the system is safe and stable. It can effectively prevent the disclosure of information and ensure the safety of the system. Finally, the deficiencies and the further works are also present in the end.
Keywords/Search Tags:Mobile Office, Information Leakage, Information Security, Information Encryption, RSA Algorithm
PDF Full Text Request
Related items