Font Size: a A A

The Design And Implementation Of LC1860's Enhanced Security Mechanism

Posted on:2018-07-17Degree:MasterType:Thesis
Country:ChinaCandidate:J J WangFull Text:PDF
GTID:2348330512490621Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,the development and progress of science has heavily promoted the rapid development of smart phones,The operating system which is running on the intelligent terminal occupies a very important position.As an open source operating system,Android attracts more and more intelligent terminal manufacturers and developers to join the cmap because of the open source nature and good extensibility,Android system gradually occupies the market share of smart phones and tablets.For intelligent terminal manufacturers,android's open source nature makes it possible to customize their desired operating system,not only be able to customize their UI,can also optimize the system to have a better performance,provide their own operating system features.Any computer system,no matter the system software level,or application software level,system security is a very important factor to consider,as a running platform of other applications,the importance of its security mechanism is needless to say.So in the process to customize operating system of the vendors,operating system security mechanism is the top priority,to build a secure operating system is the foundation of customizing operating system.In this thesis,we achieve reinforcement operating system to enhance security mechanism based on android source code,the core module is driven authentication mechanism,the application authentication mechanism.the intensification of network firewall policy mechanism and a tool to generate configuration files,driver certification ensures the safety of HAL driver loaded layer,application certification ensures the safety of applications' operation and installation,firewall policy guarantee the environment of network security,in the base of talking about the background of authentication implementation and problems of its development and design,we analyzed the desired requirements and non-functional requirements,and the demand for the system implementation using flow chart and case diagram for detailed instructions.After we got the analysis of requirements,we made an architecture design of implementation of the system.Made a further detailed design of the system implementation.According to the functional requirements of system analysis of safety,reliability and stability of requirements for the design of the different modules,respectively.The functions of these modules,such as both their own and to co-ordinate the overall improve the performance of the system.Through the detailed design of system,develop the overall effect and the realization of the various parts of the system.Finally,based on the reinforcement system and application effect of enhanced security mechanism from the performance,functionality,stability was tested,and the implementation of the system further improvements are put forward.
Keywords/Search Tags:Android system, security, verification, firewall rules, md5 encryption check
PDF Full Text Request
Related items