摘要随着移动互联网技术的快速发展,移动终端如手机等电子设备的广泛使用,对于信息安全来说引发了一场隐形的变革。有一种木桶定律,即是说互联网系统的稳定水平依赖于网络节点和终端节点的安全水平,这使得移动终端成为网络防护中最薄弱的一环。目前也已经出现了很多文件加密软件,但是由于频繁的密码输入和日益严重的密码破解问题,用户的需求越来越得不到满足。
经过对Android操作系统及其平台知识的学习,重点使用钩子透明加密技术和AES对称加解密算法,以及在基本程序框架中使用流行的JAVA语言,并且使用SQL语言编写了需要的数据库内容,成功实现了一个基于Android平台的文件透明加解密APP,能加解密包括图片格式和文本格式的文件,它的加解密方法事先由系统人员设定,所有用户对需要加解密的文件的操作的第一步都在后台自动迅速完成,而且对于已加密文件如果用户本身没有合法的身份,合理的使用渠道就无法对文件进行任何操作,这样数据和信息的安全就能得到更加便利的保障,用户的体验性就会得到提高。最后通过进行各级测试过程,排除了基本漏洞,成功的挂载到了各种安卓手机和其他设备上并且功能有效。86616
最后,通过设计和实现的一系列过程,对Android平台下的移动终端应用开发有了更加深入的了解与运用,同时掌握了加密和透密加密的区别,也增加了对信息安全的认识和关注,并且学会了保持更加严谨的研究态度,更加努力去取长补短。
毕业论文关键词:安卓;移动终端;透明加密;信息安全
Abstract With the rapid development of mobile Internet technology and the popularity of mobile terminals such as mobile phones, tablets and other electronic devices, to information security, it sparked a stealth change change。There is a cask law, that is to say a stable level of the entire network system relies on the security level of the network nodes and end nodes, which makes the mobile terminal become the weakest security link。 Currently there have been a lot of file encryption software, but due to frequent password cracking and growing problem, the users’ need become more and more。
Through the study of the Android operating system and platform knowledge, focusing on the use of hooks transparent encryption and AES symmetric encryption algorithm, and the use of popular JAVA language in basic procedural framework , and the use of SQL language in writing the contents of the database, it achieved an APP in a file-based Android platform, transparent encryption and decryption successfully。 Encryption and decryption can include pictures and text format file format, its encryption method set in advance by the system, operators require all users to encrypt and decrypt the file automatically completed quickly in the background, but also for the encrypted file if the user does not have legal status, rational use of channels he will not be able to file any action, so that the safety of data and information can be more convenient to protect and the user's experience of it will be improved。 Finally, the testing which process at all levels exclude the basic vulnerability to mount a variety of Android phones and other device successfully,on the other hand,it’s on and active。
Finally, through a series of process of design and implementation, it has a more in-depth understanding and application of application development for mobile terminals under Android platform, and mastered the distinction through encryption and encrypting , but also increased the understanding and awareness of information security and we learned to maintain a more rigorous attitudes of study to work harder to learn from each other。
Keywords: android; mobile terminal; transparent encryption; information security;