Please enable JavaScript.
Coggle requires JavaScript to display documents.
android, On-Body Detection, Trusted Places, Trusted Face Recognition,…
Android Security Features
Kernel level
CPU
DEVICES
Memory
Application Framework level
Activity Manager
Content Provide
Resource Manager
Notification Manager
View System
Window Manager
Location Manager
Package Manager
Google Play Protect
Google Play Protect is Google’s built-in malware protection for Android devices.
Basic Android Security Settings
Setting a password, and enabling two-step verification and the Find My Device tool.
Setting Your Password
Android phones require the traditional locking methods of setting a pattern, PIN, or password.
Two-Step Verification
Security
Signing in to Google
turn on 2-Step Verification
Find My Device
Setting
Security
Turn on Find My Device
Advanced Android Security Settings
biometric authentication.
Fingerprint Unlock
Android Architecture
Application
Home
Contact
Phone
Browser
application framework
Activity Manager
Window Manager
Content Providers
View System
Package Manager
Telephony Manager
Resource Manager
Location Manager
Notification Manager
Libraries
Surface Manage
SQLite
Media Framework
Open GL | ES
Free Type
Webkit
SGL
SSL
libc
Android Runtime
Core Libraries
Direct Virtual Machines
Linux Kernel
Display Driver
Camera Driver
Flash Memory Driver
Binder (IPC) Driver
Keypad Driver
Wifi Driver
Audio Driver
Power Management
Android Permission
Normal
permissions do not require explicit approval from the user at install time.
Dangerous
require explicit approval from the user at install time.
Signature
Signature
can only be accessed by other applications that were signed by the same certificate
SignatureOrSystem
applications installed on the /system partition (which have elevated privileges)
Android White Paper
encryption key must not be written to storage
if active-encryption key must be AES-encrypted with lock screen passcode
using a slow stretching algorithm
user has not specified a lock screen passcode/has disable passcode
the systems use a default passcode to wrap the encryption key
device provides a hardware-backed keystore, the password stretching algorithm must be cryptographically bound to that keystore
On-Body Detection
Trusted Places
Trusted Face Recognition
Trusted Voice