1 / 103
文档名称:

基于Android系统的手机防盗_毕业设计论文.doc

格式:doc   页数:103页
下载后只包含 1 个 DOC 格式的文档,没有任何的图纸或源代码,查看文件列表

如果您已付费下载过本站文档,您可以点这里二次下载

基于Android系统的手机防盗_毕业设计论文.doc

上传人:珍贵文档 2016/5/17 文件大小:0 KB

下载得到文件列表

基于Android系统的手机防盗_毕业设计论文.doc

相关文档

文档介绍

文档介绍:北京工业大学毕业设计(论文) 摘要近年来,智能手机的功能日趋强大,移动终端应用程序层出不穷。由于现在人们的工作繁忙,手机的丢失似乎也成为常有的事。与之带来最让人烦心的是私人数据的丢失及带来的不安全隐患。基于以上原因,本文设计了一款手机防盗追踪软件。本软件利用 Android 系统的广播机制,当手机用户开启防盗追踪功能后,本程序将后台监听手机开机启动、信号状态、短信收发以及位置的改变,通过监听手机用户 SIM 卡的 IMSI 码的改变来判断手机安全状态,监听并截获安全短信内容,实现非法用户的手机号码向合法用户预先设置的安全号码发送特殊信息的功能,告知用户当前手机状态和位置信息,并可通过安全短信控制被盗手机锁屏、销毁隐私数据、发报警音等功能。最后将设计完成的软件进行测试,其所有功能都完美实现,真正起到了手机防盗追踪的作用。关键词: Android 系统手机防盗广播机制***北京工业大学毕业设计(论文) ABSTRACT In recent years, the intelligent mobile phone function is powerful, the mobile terminal application emerge in an endless stream. Because now people's busy work, the lost mobile phone also seems mon thing. And bring the most disturbing isa private data loss and insecurity hidden trouble. Based on the above reasons, this paper introduces the design of a mobile phone anti-theft tracking software. This software uses Android system broadcast mechanism, when the mobile phone users to open anti-theft tracking function, the program will monitor the background mobile phone boot, signal condition, send and receive text messages and a change of location, through the monitoring mobile phone user SIM card IMSI code changes to determine mobile phone safety state, monitor and intercepts a secure message content, realize the illegal user the mobile phone number to the legitimate user preset safety numbers to send special message to inform the user of mobile phone function, current status and location information, and through SMS security control of stolen mobile phone lock screen, the destruction of privacy data, send alarm sound and other functions. pleted the design of the software testing, allof its functions are perfect, played a real mobile phone anti-theft tracking function . Keywords: Android system DroidRing Broadcasting mechanism Listener 北京工业大学毕业设计(论文) 目录 1绪论...................................................................................................................................... 1 应用开发研究背景与意义...........................................................