Font Size: a A A

Design And Implementation Of Mobile Security Terminal System Based On Android

Posted on:2018-05-10Degree:MasterType:Thesis
Country:ChinaCandidate:K WangFull Text:PDF
GTID:2348330521450963Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
With the development of Android system,a variety of applications based on Android appears,many kinds of applications are intermingled,users' data leak frequently.Android mobile phone security has become the focus of attention.From the current research on Android mobile phone security,problems can be found.Most applications do not provide a complete function to protect the data on the phone,and the protection of local private data is not enough,which can't ensure the security of data.To this end,this thesis researched for the protection of private data on Android mobile phone,designed and implemented a security system based on Android platform.The system mainly protects the user's contacts data and files data,and provides a safe cloud disk so that users can backup or restore the data anytime,anywhere.And ensure the security of the system through opening background supervision service during the operation of the system.The implementation of the system is based on the third party trusted PKI system and the introduction of CA institutions to authenticate the identity of users.For each user issued a unique digital certificate to register,the local data use the National Cipher Algorithm to encrypt and decrypt,the system achieves national security Protection standards.The system consists of four modules,namely,secret contact,secret folder,secret cloud disk and background supervision module.For the secret contact module,the system created a new database to make sure that the data in the database is private and safe,all secret contacts' information stored in,and using the National Cipher Algorithm to encrypt the deposited information.At the same time,for user's convenience,the system implements the data-import and data-export between the secret contacts and the system contacts,and offers the secret contact flag to provide the corresponding interface for the third party security software.For the secret folder module,users can not only use the system to manage the secret files,but also the local files.the local files use the National Cipher Algorithm to encrypt the data.When restore files,provide a restore path for users to select.For the secret cloud module,use the third-party management center and Ali cloud storage platforms,manage the access authority of users.Users can backup the contacts data and the encrypted files to the cloud disk,if necessary,users can easily restore the data from the cloud.In addition,the system started a background service to detect the system status timely,which can monitor the entrance of the system,ensure the safety of data in the system.Finally,the test cases are designed for the system,and the actual functional tests are carried out.The results of the tests verified the feasibility of the system.
Keywords/Search Tags:Android, encryption, secret contacts, secret folder, secret cloud disk
PDF Full Text Request
Related items