Study and Implementation of Data Protection and Assisted Searching on Smart Phone
碩士 === 南臺科技大學 === 資訊工程系 === 103 === In recent years, lost of smart phones often happens. No one can guarantee his own smart phone will not be stolen or lost. This thesis thus aims to design a smart phone assisted searching system and data protection system. It can protect user’s confident data and...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
104
|
Online Access: | http://ndltd.ncl.edu.tw/handle/24493308998698473731 |
id |
ndltd-TW-103STUT8392007 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-103STUT83920072017-04-22T04:32:37Z http://ndltd.ncl.edu.tw/handle/24493308998698473731 Study and Implementation of Data Protection and Assisted Searching on Smart Phone 智慧型手機資料保護及協尋系統之研究與實作 Yi-Ting-Hsu 徐苡庭 碩士 南臺科技大學 資訊工程系 103 In recent years, lost of smart phones often happens. No one can guarantee his own smart phone will not be stolen or lost. This thesis thus aims to design a smart phone assisted searching system and data protection system. It can protect user’s confident data and increase the opportunity of searching lost smart phones, once the smart phones are lost. Assume that smart phones are lost, attackers can reveal user’s confident data and make users serious damage. Therefore, we will base on GPS, remote operation and network access technologies to provide the abilities of remote data backup, remote data deletion, remote lock, alarm trigger and data recovery for protecting the data of smart phones. Narn-Yih Lee 李南逸 104 學位論文 ; thesis 53 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 南臺科技大學 === 資訊工程系 === 103 === In recent years, lost of smart phones often happens. No one can guarantee his own smart phone will not be stolen or lost. This thesis thus aims to design a smart phone assisted searching system and data protection system. It can protect user’s confident data and increase the opportunity of searching lost smart phones, once the smart phones are lost. Assume that smart phones are lost, attackers can reveal user’s confident data and make users serious damage. Therefore, we will base on GPS, remote operation and network access technologies to provide the abilities of remote data backup, remote data deletion, remote lock, alarm trigger and data recovery for protecting the data of smart phones.
|
author2 |
Narn-Yih Lee |
author_facet |
Narn-Yih Lee Yi-Ting-Hsu 徐苡庭 |
author |
Yi-Ting-Hsu 徐苡庭 |
spellingShingle |
Yi-Ting-Hsu 徐苡庭 Study and Implementation of Data Protection and Assisted Searching on Smart Phone |
author_sort |
Yi-Ting-Hsu |
title |
Study and Implementation of Data Protection and Assisted Searching on Smart Phone |
title_short |
Study and Implementation of Data Protection and Assisted Searching on Smart Phone |
title_full |
Study and Implementation of Data Protection and Assisted Searching on Smart Phone |
title_fullStr |
Study and Implementation of Data Protection and Assisted Searching on Smart Phone |
title_full_unstemmed |
Study and Implementation of Data Protection and Assisted Searching on Smart Phone |
title_sort |
study and implementation of data protection and assisted searching on smart phone |
publishDate |
104 |
url |
http://ndltd.ncl.edu.tw/handle/24493308998698473731 |
work_keys_str_mv |
AT yitinghsu studyandimplementationofdataprotectionandassistedsearchingonsmartphone AT xúyǐtíng studyandimplementationofdataprotectionandassistedsearchingonsmartphone AT yitinghsu zhìhuìxíngshǒujīzīliàobǎohùjíxiéxúnxìtǒngzhīyánjiūyǔshízuò AT xúyǐtíng zhìhuìxíngshǒujīzīliàobǎohùjíxiéxúnxìtǒngzhīyánjiūyǔshízuò |
_version_ |
1718443394250833920 |