英语原文共 11 页,剩余内容已隐藏,支付完成后下载完整资料
原文:
An Internet Behavior Management System based
Abstract— With the popularity of smart phones and mobile Internet, how to prevent young people from being addicted to Internet and games has become one of the issues which are most concern to parents. To solve this problem, we design and implement an Internet behavior management system which is based on Android. The system implements the mobile phone remote control, network interception and application running control. By using the system, users can filter communication data which contain sensitive words out of childrenrsquo;s mobile phones, monitor behavior of software in the childrenrsquo;s mobile phones, and limit the running time of them.
Index Terms—Android, Internet management, network interception
I. INTRODUCTION
Most current desktop applications of Internet behavior management are designed to limit the online behavior of employees in order to protect corporationrsquo;s information security. The function of this kind software includes the prohibition or monitoring something such as BT, stocks, chat, MSN, QQ, monitoring e-mail and bandwidth, in order to reduce viruses infecting and achieve the purpose of the correct guidance of employees Internet usage. However, mobile devices have small memory and limited resources, whatrsquo;s more, for security reason, most of mobile operating systems have strict restrictions on the functionality of applications and permission management, so it is difficult to obtain permission to manage any application such as stocks, QQ. These make the behavior management software extensions on mobile devices not be implemented so easily like desktop applications, that is the reason why techniques in desktop Internet behavior management software are not entirely suitable for use in mobile devices .
The rest of the paper is organized as follows: Section II discusses the related work and show the novelty. Section III analyses requirements. Section IV describes the system architecture. Section V puts forward the communication protocol. Section VI discusses the message dispatching mechanism. Section VII describes the system implantation in detail. Section VIII concludes the paper.
II. RELATED WORK
There are some mobile parent control applications which are similar to Internet behavior management software, such as 'Net nanny', 'Norton Family parental control' and etc. This kind of software can block or filter web content, monitor SMS and call, remote control, real- time GPS recording. Their functions are just refined or reduced functions of desktoprsquo;s parent control software, not bind them tightly with underlying mobile OS. Most parent control applications are just one application installed on the controlled device. Some applications need to set manually on the installed device. Others have remote administration through web sites, and parents also can read reports through these sites.
Based on studying many desktop monitoring systems, we studied deeply on the phone mobile network technology, network interception technology, communication and control, mobile embedded system operating mechanism and other aspects of mobility, designed and implemented an Internet behavior management system. The system is also optimized for Android mobile phone platform . The innovative points are listed below.
bull; Remote Control. Unlike the above parent control applications, the system includes the control side application and the controlled side application. One control side may control many controlled sides. All of them are installed in mobile phones. So, parents can control kidrsquo;s phones through their phones conveniently in real time manner. Parents can set kidrsquo;s phones alarm events to remind their children, set blacklist/whitelist and also get usage or alarm reports in real time.
bull; Intercept deeply. The current parent control applications can just block and filter web contents. We develop our intercept module combining with Linux kernels, and can intercept any communication data into or from any applications on the control sides.
bull; Applications control. Due to security guarantee, the top API of Android OS does not provide any functions about applications control. We use Linux kernels to implement opening and closing any applications on the controlled sides. So, parents can set starting time, time intervals and span limits for applications of kidrsquo;s phones.
III. REQUIREMENTS ANALYSIS
For the needs of behavior monitoring on phones of kids, this softwarersquo;s requirements are listed below.
A. Functional requirements
- The control side should be able to instantly communicate with the controlled side.
- The control side should be able to monitor and intercept the text messages on phones of the controlled side, and can edit interception list on phones of the controlled side. The controlled side doesn#39;t have permission to modify this list.
- The control side should be able to add alarm event to alert important events to the controlled side.
- The control side should be able to monitor and
control the running time of all applications on the controlled side, and the controlling rules can be set by the control side.
- The control side should be able to monitor and filter network information on the controlled side, and the filtering rules can be set by the control side.
- The control side should be able to monitor the GPS position of the controlled side, and the control side should be able to display this location information.
-
When phones of the controlled side has been replaced the SIM card, th
全文共35632字,剩余内容已隐藏,支付完成后下载完整资料
资料编号:[142684],资料为PDF文档或Word文档,PDF文档可免费转换为Word
以上是毕业论文外文翻译,课题毕业论文、任务书、文献综述、开题报告、程序设计、图纸设计等资料可联系客服协助查找。