Font Size: a A A

Analysis And Implementation Of Mobile Phone Authentication And Development Process For The Operators On Android

Posted on:2013-11-24Degree:MasterType:Thesis
Country:ChinaCandidate:Y LiangFull Text:PDF
GTID:2248330374499268Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Shipments of smartphones willhave a compound annual growth rate of24.9%for the period2011-2017to reach1.7b units, according to leading telecoms analyst house Ovum. In recent years, open source mobile phone operating system has become the representative of the smartphone with intelligent mobile phone in domestic large range promotion, especially with the emergence of the Android which developed by Google company. Whether bus and subway, or in the workplace, we can see them all everywhere, and they entered in all areas of our lives. At the same time, more and more mobile phone company at home and abroad would like to enter the Chinese market to sell their products, so to the respective development out of the cell phone manufacturers to better into the market will and the various mobile network operators in cooperation with Android mobile phone custom and to sales, so this needs through the operators of the authentication. How fast does not contact in the solution of the underlying hardware at the same time, the minimum simplified Android system certification collection development are particularly important.This paper first introduces the Android system at home and abroad and the technical background and market background, Android development framework and the application layer and the correlation is introduced. I detailed analysis of domestic three mobile operators (China telecom, China unicorm and China mobile) for Android mobile phone access custom authentication requirements, and from the point of view of application layer compared to three operators smartphone operating system each module of the different levels of demand, to their demands to compare and analysis, it is concluded that the development of basic mobile phone authentication function. In the traditional development process, and on the basis of the semantic tree is put forward in this paper based on the development process, and the advantages and disadvantages of the process are analyzed and compared. To enable the end system in the frame of the application layer can realize the operators based on relevant certification.
Keywords/Search Tags:Android, Carrier, Certification, Development, Semantic tree
PDF Full Text Request
Related items