Font Size: a A A

A Research On And Implementation Of Management Of Mobile Device On Android Platform

Posted on:2017-12-12Degree:MasterType:Thesis
Country:ChinaCandidate:Y S WangFull Text:PDF
GTID:2348330488973014Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years, mobile office(Bring Your Own Device), BYOD thought is widespread concerned a lot by a large of people because of the widespread use of mobile phones and generally relates to the mobile terminal development. And under the thought of BYOD mobile device management(MDM) has become the most important development of mobile terminals business. And mobile device management with mobile application management(MAM) and mobile content management(MCM) form the entire framework of BYOD. In this paper, I research and implement the system of mobile device management about access authentication, under state control, the policy hair treatment and other parts and the major research and implement are outlined as follows:1. Part of the access authentication of mobile devices under management were studied and realized. Performed for different login pattern of mobile device management design, the main design and implementation of EMO are namely direct login access, VPN login and WLAN login in three ways. And VPN is a virtual private network which through a VPN client and server login establish direct by VPN gateway, and the establishment of SSL(Secure Socket Layer) channel for data transmission can ensure transmission security. WLAN login is to use the wireless network, and it searches for available wireless networks to choose. WLAN login and VPN login are required to configure their own proxy server.2. The state control of the mobile device management were studied and realized. According to the client and server interactions this system updated the status of a client that is on mobile devices in time, and for clients active operations on the server or for client operations it will cause the state to change the status value which is stored using a special field, via UDP packets message processing for the state to acquire, change, save, and report to respond to the packets will change state. At present, the state can be outlines as not registered, be activated, registered, logged on, has been canceled, lost, expired and disabled.3. Under the policy issued about the management of mobile devices were researched and realized. Propose a strategy for dealing with the concept through UDP Packets content client and server need to interact with the transmission and processing. And this system use UDP packet for speed up the transmission and it is easy to use features for interactive client and server for policy processing. Processes involved are configured policies, issued policies, strategies by receiving packets, analysis, packaging and policy information through packet response. It can update policy information through the heartbeat mechanism, which set a time interval, and each updated policy will receive information through this interval, and the data were compared with the original strategy. If there is a change, the update will remain at the original policy data. At present, the policy content of the black and white software strategy, the terminal checks strategy, WLAN access policies, power remind strategy, lock screen password policy and terminal restriction policies and now six categories totally.4. Equipment Information of mobile devices under management were studied and realized. How to obtain the device information in the design of mobile device management methods, and apparatus for device each state information acquisition is described. By designing a network connection and interface for the user this system can recognize the name of the device, operating system version, IP address, MAC address, operators, equipment vendors and device model type and other information. The device information can be viewed on the client, where the device status will also be displayed in the device information among.
Keywords/Search Tags:Bring Your Own Device, Mobile Device Management, Secure Socket Layer, Virtual Private Network, Policy processing
PDF Full Text Request
Related items