Smart Secure

Embed Size (px)

Citation preview

  • 8/3/2019 Smart Secure

    1/35

    SMART SECUREProtecting your smart phone

  • 8/3/2019 Smart Secure

    2/35

    Group No:

    Team members:

    Adarsh.T.SRoll No: 2S7. IT

    Anuraj.RRoll No: 4S7. IT

    Chandrakanth.MRoll No: 8S7. IT

    Kiren.K

    Roll No: 13S7. IT

  • 8/3/2019 Smart Secure

    3/35

    ORGANIZTION PROFILE

    SRISHTI SYSTEMS PVT. LTD. provides software solutions to those who need a

    helping hand for advanced business technologies. Srishti has carved a niche for itself in the IT

    industry. Srishti is unique as it provides ready to use technology and services for clients to

    meet their utmost satisfaction. Srishti has a wide range of highly-skilled professionals with

    expertise spanning diverse domains.

    Srishti engages with clients to understand their unique business and process need. We

    develop solution based on the client's business requirements and our experience across

    multiple projects. We architect and design models incorporating industry-wide best practices.

    We keep in tune with the latest technological aspects and to offer more to our

    customers we always look for upgrading and updating our infrastructure, manpower and

    quality of service, to realize costumer dreams through efficient communication, honesty, and

    respect towards our team, clients and other entities our company is dealing with. We stands

    out in the competitive marketplace because of the innovation and depth of solution offerings.

  • 8/3/2019 Smart Secure

    4/35

    SMART SECURE

    Secures your mobile device and personal data in the event of loss or theft by allowing you to

    locate/track your device, helps prevent device misuse, and remotely locks your device and wipes

    your data. It enables you to back up and restore your data from the device or via an easy-to-use web

    portal..Android is an open source software stack operated in a heterogenic mobile environment.

    Thus, hackers can more easily access, manipulate, and exploit the operating system code very easily.

    As a counter suggestive remote management capabilities along with additional security solutions can

    improve security substantially. If an attacker steals a device, users could protect information

    remotely by turning on a defensive mechanism remotely through a SMS. The intended proposals

    are:-

    Data encryption: Encrypting data is an excellent way to counter private data exposure. Because

    only the owner knows the key for deciphering data, the information is secure. Encrypting sensitive

    data can also be handled by core applications such as SMS messaging and that will require

    developing applications.

    Context-aware access control: By employing context-aware access control (CAAC), users can

  • 8/3/2019 Smart Secure

    5/35

    CONTENTS

    TITLE PAGE NO

    1. Introduction 11.1General Introduction 11.2Statement Of Problem 1

    2. System Analysis 22.1Existing system 32.2Drawbacks the existing system 32.3Proposed System and its features 32.4Feasibility Analysis 4

    3. System Design 83.1Introduction 8

    3.1.1 Requirements of Specification 93.1.2 Data Flow Diagram/UML 9

    3.2Output Design 113.3Input Design 12

  • 8/3/2019 Smart Secure

    6/35

    Smart Secure Project Design 2011

    1. INTRODUCTION

    1.1. GENERAL INTRODUCTION

    SMART SECURE is the complete mobile security service that protects data on your

    phone, ensures privacy in the event of theft and enhances the possibility of recovering yourphone. Android is an open source software stack operated in a heterogenic mobile

    environment. Thus, hackers can more easily access, manipulate, and exploit the operating

    system code very easily. As a counter suggestive remote management capabilities along with

    additional security solutions can improve security substantially. If an attacker steals a device,

    users could protect information remotely by turning on a defensive mechanism remotelythrough a SMS and web. The application is developed in ANDROID. The database is created

    using SQLite.

    1.2. STATEMENT OF PROBLEM

    A statement of problem is a clear description of the issue(s), it includes a vision, issue

    statement, and method used to solve the problem. The purpose of this project is to develop an

    application provides user friendly interface. The existing system provides an unrealistic interface and

  • 8/3/2019 Smart Secure

    7/35

    Smart Secure Project Design 2011

    2. SYSTEM ANALYSIS

    System analysis is a general term that refers to an orderly, structured process for identifying

    and solving problems. Before designing a computer system, it is important that the nature of business

    and the way it currently operates are clearly understood. The detailed examination will then provide

    the design team with the specific data they requires in order to ensure that the clients requirements arefully met.

    Analysis involved a detailed study of the current system, leading to specifications of a new

    system. Analysis is a detailed study of various operations performed by a system and their

    relationships within and outside the system. During analysis, data are collected on the available files,

    decision points and transactions handled by the present system. Interviews, on-site observation andquestionnaire are the tools used for system analysis. Using the following steps it becomes easy to

    draw the exact boundary of the new system under consideration:

    Keeping in view the problems and new requirements Workout the pros and cons including new areas of the system

    All procedures, requirements must be analyzed and documented in the form of detailed data

    flow diagrams (DFDs), data dictionary, logical data structures and miniature specifications. System

  • 8/3/2019 Smart Secure

    8/35

    Smart Secure Project Design 2011

    2.1. EXISTING SYSTEM

    In the existing system, it is difficult to trace the lost phone. The only way to track phone is by

    the IMEI number. It is done by the help of security authorities and service providers. Also there is no

    security for the private datas in phone like contact numbers, credit card password,personal datas etc.

    It can be easily traced out by phone thief, also there is no way to store any backup of our private datas

    in phone. Similarly there are no functions available for avoiding the unwanted calls/sms from

    particular numbers.

    2.2. DRABACK OF EXISTING SYSTEM

    There exist many disadvantages in the existing system. Some of the main problems with the

    conventional system are:

    Difficult to trace lost phone No security for private datas in phone No way to backup data No way to avoid unwanted calls/sms

    2.3. PROPOSED SYSTEM AND ITS FEATURESThe scope of this application is to provide user friendly working environment and more

  • 8/3/2019 Smart Secure

    9/35

    Smart Secure Project Design 2011

    B. SMS filtration:1. Set blacklist numbers (numbers you dont want to receive any sms or calls).2. Set whitelist numbers (numbers you like to receive sms and calls).3. Set mode: blacklist/whitelist.

    C.Encryption:1. Set a login pattern that would encrypt/hide data including images, sounds,

    videos & sms.

    2.

    Set the list of datas to be encrypted (folders and files).

    Note: Encryption and deletion of data is available to antitheft mode too.

  • 8/3/2019 Smart Secure

    10/35

    Smart Secure Project Design 2011

    Finding out whether a new system is required or not. Determine the potentials and drawbacks of the existing system Identification of user requirements and the benefits expected by the user from the

    resulting system.

    Finding out the various alternatives available. Knowing what should be incorporated in the new system. Define the ingredients and objectives involved in the project.

    Feasibility study is conducted to test whether the system is beneficial to the organization. The

    feasibility study analyses potential solutions against a set of requirements, evaluate their ability to

    meet these objectives, describe a recommended solution, and offer a justification for the selection.

    Considering the technical aspects of feasibility, the proposed system is very useful and

    helpful in finding solution as soon as they come across a problem encountered. It acts as network

    trouble shooting tool. It maintains computer traffics and is capable of finding whether a system is

    down or not, if it is working properly or not etc. Thus it is technically feasible.

    This software is user friendly. There is no need that should be technically skilled to use this

  • 8/3/2019 Smart Secure

    11/35

    Smart Secure Project Design 2011

    2.4.1. Technical Feasibility

    The main objective of feasibility study is to test the technical, social and economic feasibility

    of developing a system. Investing the existing system in the area under investigation and generating

    ideas about the new system does this. Feasibility study has been done to gather required information.

    Training, experience and commonsense are required for collection of the information. Data was

    gathered and checked for completeness and accuracy. Analyzing the data involved identification of

    the components of the system and their inter relationship and identifying the strength and weakness of

    the system.

    The main points that are considered to prove that the project is technically feasible are:

    The present technology is sufficient to develop the project. The proposed system provides adequate response to the user. The system can be expanded and developed. The project outputs given are reliable and it is easy to access.

    2.4.2. Economic Feasibility

  • 8/3/2019 Smart Secure

    12/35

    Smart Secure Project Design 2011

    Proposed system is economically feasible because it uses available resources rather than

    special additional resources. Software development cost is much less. In the proposed system the cost

    of hardware and software for the class of application of web development is less.

    2.4.3. Operational Feasibility

    There is no difficulty in implementing the system. The proposed system is effective, user

    friendly and functionally reliable that the user in the company will find the new system reducing their

    hardship. The user of the system must be completely unaware of the internal working of the system so

    that the users will not face any problem running the system. The system thus reduces the responsive

    time of computer thereby, the system is found to be operationally feasible.

    Design is the only way that can accurately translate customer registration into finished

    software or system. Without software design, the risk of building an unstable system exists. System

    design provides the procedural details necessary for implementing the system recommended in the

    feasibility study.

  • 8/3/2019 Smart Secure

    13/35

    Smart Secure Project Design 2011

    3. SYSTEM DESIGN3.1 INRTRODUCTION

    System design refers to the description of a new system based on the information that

    collected during the analysis phase and the process by which it is developed. It is the most creative

    and challenging phase of the system life cycle. The design of the system is essentially a blue print or a

    plan for a solution for the system. The primary objective in this case is to design a system which

    delivers the functions required by the client in efficient message passing within an organization. Detail

    design focuses on refinement to the architectural representation that lead to detail algorithm data

    structure and representation of software. System design is a creative art of inventing and developing

    inputs, database, file, methods and procedures for processing to get a meaningful output that satisfy

    the organization objectives. Software design is considered as the main part of software engineering

    process and is applied regardless of the software process model that is used. The system design

    includes the database design, the requirements specification for inputs, processing and outputs. During

    the system design phase the designer must design how to produce an efficient and effective system.

    There are two levels of system design.

    L i l d i

  • 8/3/2019 Smart Secure

    14/35

    Smart Secure Project Design 2011

    3.1.1. REQUIREMENT OF SPECIFICATION

    System analysts talk to a variety of persons to gather details about the data transfer and their

    opinions of why things as they do and their ideas for challenging the process. These can be done

    through detailed investigation and observation. As the details are collected, the analysts study the

    requirements data to identify features the new system should have, including both the information the

    system should produce and operational features such as processing controls, response times and input-

    output methods.

    Requirement specification simply means, Figuring out what to make before make it. It

    determines what people need before start developing a product for them. Requirement definition is the

    activity of translating the information gathered into a document that defines a set of requirements.

    These should accurately reflect what customer wants. It is an abstract description of the services that

    the system should provide and the constraints under which the system must operate. The notations

    used for requirements definition should be based on natural language, forms and simple intuitive

    diagrams. The requirements fall into two categories: functional and non functional

    The requirements of specification of the proposed system are as follows

    Faster response time Efficient processing

  • 8/3/2019 Smart Secure

    15/35

    Smart Secure Project Design 2011

    represents the entire software elements as a single bible with input and output indicated by incoming

    and outgoing arrows respectively.

    DFD illustrates how data is processed by a system in terms of inputs and outputs. It is a

    picture of system processing and flow without excessive concern for details.

    The DFD showing the top level of the system is called Context Diagram. It should be an

    overview including basic inputs, processes and outputs. Then it is exploded in to more detailed lower

    level diagram that shows additional features of the system.

    The purpose of DFD is to provide a semantic bridge between users and system developers.

    The diagrams are graphical, eliminating thousands of words, logical representations, modeling what

    system does; hierarchical, showing system at any level of details; and Jargon less, allowing user

    interaction and reviewing.

    The goal of data flow diagramming is to have a commonly understood model of a system.

    The diagram is the basis of structured system analysis. The Data flow diagram, also known as

    Bubble Chart has the purpose of clarifying system requirements and identifying major

    transformations that will become program in system design. The bubble represents the data

    transformations and the lines represent data flows in the system.

    DFD SYMBOLS

  • 8/3/2019 Smart Secure

    16/35

    Smart Secure Project Design 2011

    Process

    A circle or a bubble represents a process that transforms incoming data flows into outgoing data

    flows.

    3.2. OUTPUT DESIGN

    Output refers to the results and information that are generated by the system. Heredetermine information to be present, decide lat and select output medium, arrange

    presentation of information in accepted format and decide how to distribute output to intend

    recipients. Location characteristics and format of column headings and pagination are

    specified.

    Output design plays a major role in providing the user with required format. The

  • 8/3/2019 Smart Secure

    17/35

    Smart Secure Project Design 2011

    that should be given to the users according to the requirements. Efficient, intelligible output

    design should improve the systems relationship with the user and help in decision making.

    Since the reports are directing referred by the management for taking decisions and to draw

    conclusions they must be designed with almost care and the details in the reports must be

    simple, descriptive and clear to the user. So while designing output the following things are

    to be considered.

    Determine what information to present. Arrange the presentation of information in an acceptable format. Decide how to distribute the output to intend receipts Depending on the nature and future use of output required, they can be displayed on

    the monitor for immediate need and for obtaining the hardcopy.

    Efficient and intelligent output design should improve system relation with the user

    and help in decision making that is, this makes system user friendly to be displayed or printed

    as per the users choice. A quality output is one which meets the requirements of the end user

    and which presents the information in a way which is clear, easy to read and visually

    attractive. In order to decide on an appropriate method of presentation, and a suitable format,

  • 8/3/2019 Smart Secure

    18/35

    Smart Secure Project Design 2011

    Avoiding delay. Avoiding errors. Avoiding extra steps.

    The input forms are designed, using GUI controls like Buttons, Images, Image

    Buttons, Text Boxes, Spinners, and Last etc.

    FEATURES OF INPUT DESIGN

    The features of the input design are,

    The input designing is done so as to have most efficient way forinteraction between the user and the system.

    Measures have been taken to minimize user inputs. Extra steps are eliminated and process is made simple.

    3.4. DATABASE DESIGN

    A database is a collection of interrelated data stored with minimum redundancy to serve users

    more quickly and efficiently. The general objective of a database is to make information access easy,

    quick, inexpensive, integrated and shared by different applications and users. Database design is an

    i t t t ti l k d t f th li ti d l t lif l A t d

  • 8/3/2019 Smart Secure

    19/35

    Smart Secure Project Design 2011

    A primary key is an attribute (or combination of attributes) that uniquely identifies each

    instance of an entity. A primary key cannot be null and the value assigned to a primary key should not

    change over time. A primary key also needs to be efficient. For example, a primary key that is

    associated with an INTEGER data type will be more efficient than one that is associated with a

    CHAR data type.

    A relationship is a logical link between two entities. A relationship represents a business rule

    and can be expressed as a verb phrase.

    The second type of relationship is the "many-to-many" relationship. In a "many-to-many"

    relationship, many instances of one entity relate to many instances of the other entity. "Many-to-

    many" relationships need to be resolved in order to avoid data redundancy. "Many-to-many"

    relationships may be resolved by creating an intermediate entity known as a cross-reference (or

    XREF) entity.

    A "foreign key" exists when the primary key of a parent entity exists in a child entity. A

    foreign key requires that values must be present in the parent entity before like values may be inserted

    in the child entity. The concept of maintaining foreign keys is known as "

    After create a new project in eclipse, will see the following top-level folders in package

    explorer.

    http://sudarmuthu.com/wp/wp-content/uploads/2010/02/androidprojectstructure2.jpg
  • 8/3/2019 Smart Secure

    20/35

    Smart Secure Project Design 2011

    /res

    This directory contains all the external resources (images, data files etc)

    that are used by the android application. These external resources

    (content) will be referenced in the android application.

    This contains the following sub-folders

    /res/drawable /res/lat /res/Values

    /res/drawable

    http://sudarmuthu.com/wp/wp-content/uploads/2010/02/androidprojectstructure4.jpg
  • 8/3/2019 Smart Secure

    21/35

    Smart Secure Project Design 2011

    This folder also contains external resources used in the application like the /res folder. But the main

    difference is that the resources are stored in raw format and can be read only programmatically.

    3.5. PROGRAM DESIGN

    The project is divided into seven modules according to the functionality.

    User operation. Encryption Data wipe Data backup Tracking Locating phone filtration

    User operation

    Login with username & password. Add buddies. Manage buddies

  • 8/3/2019 Smart Secure

    22/35

    Smart Secure Project Design 2011

    Locating phone

    Locating phone using GPS

    Filtration

    SMS/Call filtration

  • 8/3/2019 Smart Secure

    23/35

    Smart Secure Project Design 2011

    4. SOFTWARE FEATURES4.1. SOFTWARE SPECIFICATION

    Platform : Java/AndroidOperating System : Android OSEditor : Eclipse

    4.2. HARDWARE SPECIFICATION

    Processor : 800 MHz ARM 11 RAM : 128 MB Memory : 160 MB or higher Display : TFT capacitive touch screen Card slot : microSD Phone : Android Smart phone

  • 8/3/2019 Smart Secure

    24/35

    Smart Secure Project Design 2011

    4.3. SELECTION OF SOFTWARE

    4.3.1. ANDROID

    Android is a software stack for mobile devices that includes an operating system, middleware

    and key applications. The Android SDK provides the tools and APIs necessary to begin developing

    applications on the Android platform using the Java programming language.Android applications arewritten in the Java programming language. The Android SDK tools compile the codealong with

    any data and resource filesinto anAndroid package, an archive file with an .apk suffix. All the code

    in a single .apk file is considered to be one application and is the file that Android-powered devices

    use to install the application.Application components are the essential building blocks of an Androidapplication. Each component is a different point through which the system can enter your application.

    Not all components are actual entry points for the user and some depend on each other, but each one

    exists as its own entity and plays a specific roleeach one is a unique building block that helps define

    application's overall behavior.

    Features

    Application framework enabling reuse and replacement of components Dalvik virtual machine optimized for mobile devices Integrated browser based on the open source Web Kit engine

  • 8/3/2019 Smart Secure

    25/35

    Smart Secure Project Design 2011

    ANDROID ARCHITECTURE

    The following diagram shows the major components of the Android operating system.

    Each section is described in more detail below.

  • 8/3/2019 Smart Secure

    26/35

    Smart Secure Project Design 2011

    APPLICATION FRAMEWORK

    By providing an open development platform, Android offers developers the ability to build

    extremely rich and innovative applications. Developers are free to take advantage of the device

    hardware, access location information, run background services, set alarms, add notifications to the

    status bar, and much, much more.

    Developers have full access to the same framework APIs used by the core applications. The

    application architecture is designed to simplify the reuse of components; any application can publish

    its capabilities and any other application may then make use of those capabilities (subject to security

    constraints enforced by the framework). This same mechanism allows components to be replaced by

    the user.

    Underlying all applications is a set of services and systems, including:

    A rich and extensible set of the views that can be used to build an application, including lists,grids, text boxes, buttons, and even an embeddable web browser

    Content Providers that enable applications to access data from other applications (such asContacts), or to share their own data

    A Resource Manager, providing access to non-code resources such as localized strings,graphics and layout files

    http://developer.android.com/guide/topics/providers/content-providers.htmlhttp://developer.android.com/guide/topics/resources/resources-i18n.htmlhttp://developer.android.com/guide/topics/resources/resources-i18n.htmlhttp://developer.android.com/guide/topics/providers/content-providers.html
  • 8/3/2019 Smart Secure

    27/35

    Smart Secure Project Design 2011

    Surface Manager - manages access to the display subsystem and seamlessly composites 2Dand 3D graphic layers from multiple applications

    LibWebCore - a modern web browser engine which powers both the Android browser andan embeddable web view

    SGL - the underlying 2D graphics engine 3D libraries - an implementation based on OpenGL ES 1.0 APIs; the libraries use either

    hardware 3D acceleration (where available) or the included, highly optimized 3D software

    rasterizer

    FreeType - bitmap and vector font rendering SQLite - a powerful and lightweight relational database engine available to all applications

    Android Runtime

    Android includes a set of core libraries that provides most of the functionality available in the

    core libraries of the Java programming language.

    Every Android application runs in its own process, with its own instance of the Dalvik virtual

    machine. Dalvik has been written so that a device can run multiple VMs efficiently. The Dalvik VM

    executes files in the Dalvik Executable (.dex) format which is optimized for minimal memory

    footprint. The VM is register-based, and runs classes compiled by a Java language compiler that have

  • 8/3/2019 Smart Secure

    28/35

    Smart Secure Project Design 2011

    If an activity has lost focus but is still visible (that is, a new non-full-sized or transparentactivity has focus on top of your activity), it ispaused. A paused activity is completely alive

    (it maintains all state and member information and remains attached to the window manager),

    but can be killed by the system in extreme low memory situations.

    If an activity is completely obscured by another activity, it is stopped. It still retains all stateand member information, however, it is no longer visible to the user so its window is hidden

    and it will often be killed by the system when memory is needed elsewhere.

    If an activity is paused or stopped, the system can drop the activity from memory by eitherasking it to finish, or simply killing its process. When it is displayed again to the user, it must

    be completely restarted and restored to its previous state.

    The following diagram shows the important state paths of an Activity. The square rectangles represent

    callback methods you can implement to perform operations when the Activity moves between states.

    The colored ovals are major states the Activity can be in.

  • 8/3/2019 Smart Secure

    29/35

    Smart Secure Project Design 2011

  • 8/3/2019 Smart Secure

    30/35

    Smart Secure Project Design 2011

    engine. SQLite is the most widely deployed SQL database engine in the world. The source code for

    SQLite is in the public domain.

    Features of SQLite

    Application File Format. Rather than using fopen () to write XML or some proprietaryformat into disk files used by your application, use an SQLite database instead. To

    avoid having to write and troubleshoot a parser, your data will be more easily

    accessible and cross-platform and your updates will be transactional.

    Database for Gadgets. SQLite is popular choice for the database engine in cellphones, PDAs, MP3 players, set-top boxes, and other electronic gadgets. SQLite has a

    small code footprint, makes efficient use of memory, disk space, and disk bandwidth,

    is highly reliable, and requires no maintenance from a Database Administrator.

    Website Database. Because it requires no configuration and stores information inordinary disk files, SQLite is a popular choice as the database to back small to

    medium-sized websites.

    Stand-in for an Enterprise RDBMS. SQLite is often used as a surrogate for anenterprise RDBMS for demonstration purposes or for testing. SQLite is fast and

    requires no setup, which takes a lot of the hassle out of testing and which makes

    d k d l h

  • 8/3/2019 Smart Secure

    31/35

    Smart Secure Project Design 2011

    APPENDIX A

    DFD

    Level 0 (Context Level)

    Request Response

    Level 1 of user

    Login UserUser

  • 8/3/2019 Smart Secure

    32/35

    Smart Secure Project Design 2011

    Level 1 of filtration

    Level 2 of Backup process

    Filter

    sms/call

    Add blacklist

    numbers

    Manage

    blacklist

    filtration blacklist

  • 8/3/2019 Smart Secure

    33/35

    Smart Secure Project Design 2011

    Level 2 of Encryption process

    Level 2 of Tracker process

    Select data

    Encrypt

    Decrypt

    EncryptionEncryption

  • 8/3/2019 Smart Secure

    34/35

    Smart Secure Project Design 2011

    Level 2 of Wipe process

    Select data

    Wipe phone

    data

    Tracking user

  • 8/3/2019 Smart Secure

    35/35