| In recent years, the mobile Internet has got a rapid development. Simultaneously, with the popularization of the cloud computing and the Internet of things, the scale of the data generated by the Internet users enlarges dramatically. In addition, the other technologies such as big data technique, machine learning and artificial intelligence also experience a rapid development and improvement. As a result, human’s ability to process data is getting stronger. For example, a bunch of seemingly unrelated data, under the various technical analysis and data mining, can become the key data which is intimately associated with the users’ privacy. In a nutshell, individualized service of new technologies also pose a threat to privacy disclosure, especially for intelligent terminal.Android phones as the most popular smart phones, they are widely used in various terminal devices and their security issues are prominent. This paper will start with the security mechanism of Android system, study the related protection mechanism, analyze its measure to protect the users’privacy, design and implement a long-range control system which can provide data synchronization and long-range positioning. The long-range control system includes control end, control terminal and file server. Both the control end and control terminal are running on the Android phones and the file server is running on the PC side. The control end sends instructions, the control terminal receives and analyzes them, executes operation, and then returns the operating results to control end or writes the operating results to a file to upload to data server.The significance of this design is through the realization of the Android long-range control system, study the running process of the application program, practice Android related protection mechanism, imitate and recover the process of the rogue program collects the users’ data. Additionally, the long-range control system supports the remote data synchronization, the remote data wipe and device lock functions, which can help the users to recover data and find the devices.Security is an eternal topic, this paper just does a preliminary study. As the most concerned issue by the users, privacy protection has been attracting more and more researchers and scholars make efforts to explore the ways to protect the users’privacy. The development and the use of the new technologies will be able to better serve the research and provide more solutions. |