Download - Smart Secure
-
8/3/2019 Smart Secure
1/35
SMART SECUREProtecting your smart phone
-
8/3/2019 Smart Secure
2/35
Group No:
Team members:
Adarsh.T.SRoll No: 2S7. IT
Anuraj.RRoll No: 4S7. IT
Chandrakanth.MRoll No: 8S7. IT
Kiren.K
Roll No: 13S7. IT
-
8/3/2019 Smart Secure
3/35
ORGANIZTION PROFILE
SRISHTI SYSTEMS PVT. LTD. provides software solutions to those who need a
helping hand for advanced business technologies. Srishti has carved a niche for itself in the IT
industry. Srishti is unique as it provides ready to use technology and services for clients to
meet their utmost satisfaction. Srishti has a wide range of highly-skilled professionals with
expertise spanning diverse domains.
Srishti engages with clients to understand their unique business and process need. We
develop solution based on the client's business requirements and our experience across
multiple projects. We architect and design models incorporating industry-wide best practices.
We keep in tune with the latest technological aspects and to offer more to our
customers we always look for upgrading and updating our infrastructure, manpower and
quality of service, to realize costumer dreams through efficient communication, honesty, and
respect towards our team, clients and other entities our company is dealing with. We stands
out in the competitive marketplace because of the innovation and depth of solution offerings.
-
8/3/2019 Smart Secure
4/35
SMART SECURE
Secures your mobile device and personal data in the event of loss or theft by allowing you to
locate/track your device, helps prevent device misuse, and remotely locks your device and wipes
your data. It enables you to back up and restore your data from the device or via an easy-to-use web
portal..Android is an open source software stack operated in a heterogenic mobile environment.
Thus, hackers can more easily access, manipulate, and exploit the operating system code very easily.
As a counter suggestive remote management capabilities along with additional security solutions can
improve security substantially. If an attacker steals a device, users could protect information
remotely by turning on a defensive mechanism remotely through a SMS. The intended proposals
are:-
Data encryption: Encrypting data is an excellent way to counter private data exposure. Because
only the owner knows the key for deciphering data, the information is secure. Encrypting sensitive
data can also be handled by core applications such as SMS messaging and that will require
developing applications.
Context-aware access control: By employing context-aware access control (CAAC), users can
-
8/3/2019 Smart Secure
5/35
CONTENTS
TITLE PAGE NO
1. Introduction 11.1General Introduction 11.2Statement Of Problem 1
2. System Analysis 22.1Existing system 32.2Drawbacks the existing system 32.3Proposed System and its features 32.4Feasibility Analysis 4
3. System Design 83.1Introduction 8
3.1.1 Requirements of Specification 93.1.2 Data Flow Diagram/UML 9
3.2Output Design 113.3Input Design 12
-
8/3/2019 Smart Secure
6/35
Smart Secure Project Design 2011
1. INTRODUCTION
1.1. GENERAL INTRODUCTION
SMART SECURE is the complete mobile security service that protects data on your
phone, ensures privacy in the event of theft and enhances the possibility of recovering yourphone. Android is an open source software stack operated in a heterogenic mobile
environment. Thus, hackers can more easily access, manipulate, and exploit the operating
system code very easily. As a counter suggestive remote management capabilities along with
additional security solutions can improve security substantially. If an attacker steals a device,
users could protect information remotely by turning on a defensive mechanism remotelythrough a SMS and web. The application is developed in ANDROID. The database is created
using SQLite.
1.2. STATEMENT OF PROBLEM
A statement of problem is a clear description of the issue(s), it includes a vision, issue
statement, and method used to solve the problem. The purpose of this project is to develop an
application provides user friendly interface. The existing system provides an unrealistic interface and
-
8/3/2019 Smart Secure
7/35
Smart Secure Project Design 2011
2. SYSTEM ANALYSIS
System analysis is a general term that refers to an orderly, structured process for identifying
and solving problems. Before designing a computer system, it is important that the nature of business
and the way it currently operates are clearly understood. The detailed examination will then provide
the design team with the specific data they requires in order to ensure that the clients requirements arefully met.
Analysis involved a detailed study of the current system, leading to specifications of a new
system. Analysis is a detailed study of various operations performed by a system and their
relationships within and outside the system. During analysis, data are collected on the available files,
decision points and transactions handled by the present system. Interviews, on-site observation andquestionnaire are the tools used for system analysis. Using the following steps it becomes easy to
draw the exact boundary of the new system under consideration:
Keeping in view the problems and new requirements Workout the pros and cons including new areas of the system
All procedures, requirements must be analyzed and documented in the form of detailed data
flow diagrams (DFDs), data dictionary, logical data structures and miniature specifications. System
-
8/3/2019 Smart Secure
8/35
Smart Secure Project Design 2011
2.1. EXISTING SYSTEM
In the existing system, it is difficult to trace the lost phone. The only way to track phone is by
the IMEI number. It is done by the help of security authorities and service providers. Also there is no
security for the private datas in phone like contact numbers, credit card password,personal datas etc.
It can be easily traced out by phone thief, also there is no way to store any backup of our private datas
in phone. Similarly there are no functions available for avoiding the unwanted calls/sms from
particular numbers.
2.2. DRABACK OF EXISTING SYSTEM
There exist many disadvantages in the existing system. Some of the main problems with the
conventional system are:
Difficult to trace lost phone No security for private datas in phone No way to backup data No way to avoid unwanted calls/sms
2.3. PROPOSED SYSTEM AND ITS FEATURESThe scope of this application is to provide user friendly working environment and more
-
8/3/2019 Smart Secure
9/35
Smart Secure Project Design 2011
B. SMS filtration:1. Set blacklist numbers (numbers you dont want to receive any sms or calls).2. Set whitelist numbers (numbers you like to receive sms and calls).3. Set mode: blacklist/whitelist.
C.Encryption:1. Set a login pattern that would encrypt/hide data including images, sounds,
videos & sms.
2.
Set the list of datas to be encrypted (folders and files).
Note: Encryption and deletion of data is available to antitheft mode too.
-
8/3/2019 Smart Secure
10/35
Smart Secure Project Design 2011
Finding out whether a new system is required or not. Determine the potentials and drawbacks of the existing system Identification of user requirements and the benefits expected by the user from the
resulting system.
Finding out the various alternatives available. Knowing what should be incorporated in the new system. Define the ingredients and objectives involved in the project.
Feasibility study is conducted to test whether the system is beneficial to the organization. The
feasibility study analyses potential solutions against a set of requirements, evaluate their ability to
meet these objectives, describe a recommended solution, and offer a justification for the selection.
Considering the technical aspects of feasibility, the proposed system is very useful and
helpful in finding solution as soon as they come across a problem encountered. It acts as network
trouble shooting tool. It maintains computer traffics and is capable of finding whether a system is
down or not, if it is working properly or not etc. Thus it is technically feasible.
This software is user friendly. There is no need that should be technically skilled to use this
-
8/3/2019 Smart Secure
11/35
Smart Secure Project Design 2011
2.4.1. Technical Feasibility
The main objective of feasibility study is to test the technical, social and economic feasibility
of developing a system. Investing the existing system in the area under investigation and generating
ideas about the new system does this. Feasibility study has been done to gather required information.
Training, experience and commonsense are required for collection of the information. Data was
gathered and checked for completeness and accuracy. Analyzing the data involved identification of
the components of the system and their inter relationship and identifying the strength and weakness of
the system.
The main points that are considered to prove that the project is technically feasible are:
The present technology is sufficient to develop the project. The proposed system provides adequate response to the user. The system can be expanded and developed. The project outputs given are reliable and it is easy to access.
2.4.2. Economic Feasibility
-
8/3/2019 Smart Secure
12/35
Smart Secure Project Design 2011
Proposed system is economically feasible because it uses available resources rather than
special additional resources. Software development cost is much less. In the proposed system the cost
of hardware and software for the class of application of web development is less.
2.4.3. Operational Feasibility
There is no difficulty in implementing the system. The proposed system is effective, user
friendly and functionally reliable that the user in the company will find the new system reducing their
hardship. The user of the system must be completely unaware of the internal working of the system so
that the users will not face any problem running the system. The system thus reduces the responsive
time of computer thereby, the system is found to be operationally feasible.
Design is the only way that can accurately translate customer registration into finished
software or system. Without software design, the risk of building an unstable system exists. System
design provides the procedural details necessary for implementing the system recommended in the
feasibility study.
-
8/3/2019 Smart Secure
13/35
Smart Secure Project Design 2011
3. SYSTEM DESIGN3.1 INRTRODUCTION
System design refers to the description of a new system based on the information that
collected during the analysis phase and the process by which it is developed. It is the most creative
and challenging phase of the system life cycle. The design of the system is essentially a blue print or a
plan for a solution for the system. The primary objective in this case is to design a system which
delivers the functions required by the client in efficient message passing within an organization. Detail
design focuses on refinement to the architectural representation that lead to detail algorithm data
structure and representation of software. System design is a creative art of inventing and developing
inputs, database, file, methods and procedures for processing to get a meaningful output that satisfy
the organization objectives. Software design is considered as the main part of software engineering
process and is applied regardless of the software process model that is used. The system design
includes the database design, the requirements specification for inputs, processing and outputs. During
the system design phase the designer must design how to produce an efficient and effective system.
There are two levels of system design.
L i l d i
-
8/3/2019 Smart Secure
14/35
Smart Secure Project Design 2011
3.1.1. REQUIREMENT OF SPECIFICATION
System analysts talk to a variety of persons to gather details about the data transfer and their
opinions of why things as they do and their ideas for challenging the process. These can be done
through detailed investigation and observation. As the details are collected, the analysts study the
requirements data to identify features the new system should have, including both the information the
system should produce and operational features such as processing controls, response times and input-
output methods.
Requirement specification simply means, Figuring out what to make before make it. It
determines what people need before start developing a product for them. Requirement definition is the
activity of translating the information gathered into a document that defines a set of requirements.
These should accurately reflect what customer wants. It is an abstract description of the services that
the system should provide and the constraints under which the system must operate. The notations
used for requirements definition should be based on natural language, forms and simple intuitive
diagrams. The requirements fall into two categories: functional and non functional
The requirements of specification of the proposed system are as follows
Faster response time Efficient processing
-
8/3/2019 Smart Secure
15/35
Smart Secure Project Design 2011
represents the entire software elements as a single bible with input and output indicated by incoming
and outgoing arrows respectively.
DFD illustrates how data is processed by a system in terms of inputs and outputs. It is a
picture of system processing and flow without excessive concern for details.
The DFD showing the top level of the system is called Context Diagram. It should be an
overview including basic inputs, processes and outputs. Then it is exploded in to more detailed lower
level diagram that shows additional features of the system.
The purpose of DFD is to provide a semantic bridge between users and system developers.
The diagrams are graphical, eliminating thousands of words, logical representations, modeling what
system does; hierarchical, showing system at any level of details; and Jargon less, allowing user
interaction and reviewing.
The goal of data flow diagramming is to have a commonly understood model of a system.
The diagram is the basis of structured system analysis. The Data flow diagram, also known as
Bubble Chart has the purpose of clarifying system requirements and identifying major
transformations that will become program in system design. The bubble represents the data
transformations and the lines represent data flows in the system.
DFD SYMBOLS
-
8/3/2019 Smart Secure
16/35
Smart Secure Project Design 2011
Process
A circle or a bubble represents a process that transforms incoming data flows into outgoing data
flows.
3.2. OUTPUT DESIGN
Output refers to the results and information that are generated by the system. Heredetermine information to be present, decide lat and select output medium, arrange
presentation of information in accepted format and decide how to distribute output to intend
recipients. Location characteristics and format of column headings and pagination are
specified.
Output design plays a major role in providing the user with required format. The
-
8/3/2019 Smart Secure
17/35
Smart Secure Project Design 2011
that should be given to the users according to the requirements. Efficient, intelligible output
design should improve the systems relationship with the user and help in decision making.
Since the reports are directing referred by the management for taking decisions and to draw
conclusions they must be designed with almost care and the details in the reports must be
simple, descriptive and clear to the user. So while designing output the following things are
to be considered.
Determine what information to present. Arrange the presentation of information in an acceptable format. Decide how to distribute the output to intend receipts Depending on the nature and future use of output required, they can be displayed on
the monitor for immediate need and for obtaining the hardcopy.
Efficient and intelligent output design should improve system relation with the user
and help in decision making that is, this makes system user friendly to be displayed or printed
as per the users choice. A quality output is one which meets the requirements of the end user
and which presents the information in a way which is clear, easy to read and visually
attractive. In order to decide on an appropriate method of presentation, and a suitable format,
-
8/3/2019 Smart Secure
18/35
Smart Secure Project Design 2011
Avoiding delay. Avoiding errors. Avoiding extra steps.
The input forms are designed, using GUI controls like Buttons, Images, Image
Buttons, Text Boxes, Spinners, and Last etc.
FEATURES OF INPUT DESIGN
The features of the input design are,
The input designing is done so as to have most efficient way forinteraction between the user and the system.
Measures have been taken to minimize user inputs. Extra steps are eliminated and process is made simple.
3.4. DATABASE DESIGN
A database is a collection of interrelated data stored with minimum redundancy to serve users
more quickly and efficiently. The general objective of a database is to make information access easy,
quick, inexpensive, integrated and shared by different applications and users. Database design is an
i t t t ti l k d t f th li ti d l t lif l A t d
-
8/3/2019 Smart Secure
19/35
Smart Secure Project Design 2011
A primary key is an attribute (or combination of attributes) that uniquely identifies each
instance of an entity. A primary key cannot be null and the value assigned to a primary key should not
change over time. A primary key also needs to be efficient. For example, a primary key that is
associated with an INTEGER data type will be more efficient than one that is associated with a
CHAR data type.
A relationship is a logical link between two entities. A relationship represents a business rule
and can be expressed as a verb phrase.
The second type of relationship is the "many-to-many" relationship. In a "many-to-many"
relationship, many instances of one entity relate to many instances of the other entity. "Many-to-
many" relationships need to be resolved in order to avoid data redundancy. "Many-to-many"
relationships may be resolved by creating an intermediate entity known as a cross-reference (or
XREF) entity.
A "foreign key" exists when the primary key of a parent entity exists in a child entity. A
foreign key requires that values must be present in the parent entity before like values may be inserted
in the child entity. The concept of maintaining foreign keys is known as "
After create a new project in eclipse, will see the following top-level folders in package
explorer.
http://sudarmuthu.com/wp/wp-content/uploads/2010/02/androidprojectstructure2.jpg -
8/3/2019 Smart Secure
20/35
Smart Secure Project Design 2011
/res
This directory contains all the external resources (images, data files etc)
that are used by the android application. These external resources
(content) will be referenced in the android application.
This contains the following sub-folders
/res/drawable /res/lat /res/Values
/res/drawable
http://sudarmuthu.com/wp/wp-content/uploads/2010/02/androidprojectstructure4.jpg -
8/3/2019 Smart Secure
21/35
Smart Secure Project Design 2011
This folder also contains external resources used in the application like the /res folder. But the main
difference is that the resources are stored in raw format and can be read only programmatically.
3.5. PROGRAM DESIGN
The project is divided into seven modules according to the functionality.
User operation. Encryption Data wipe Data backup Tracking Locating phone filtration
User operation
Login with username & password. Add buddies. Manage buddies
-
8/3/2019 Smart Secure
22/35
Smart Secure Project Design 2011
Locating phone
Locating phone using GPS
Filtration
SMS/Call filtration
-
8/3/2019 Smart Secure
23/35
Smart Secure Project Design 2011
4. SOFTWARE FEATURES4.1. SOFTWARE SPECIFICATION
Platform : Java/AndroidOperating System : Android OSEditor : Eclipse
4.2. HARDWARE SPECIFICATION
Processor : 800 MHz ARM 11 RAM : 128 MB Memory : 160 MB or higher Display : TFT capacitive touch screen Card slot : microSD Phone : Android Smart phone
-
8/3/2019 Smart Secure
24/35
Smart Secure Project Design 2011
4.3. SELECTION OF SOFTWARE
4.3.1. ANDROID
Android is a software stack for mobile devices that includes an operating system, middleware
and key applications. The Android SDK provides the tools and APIs necessary to begin developing
applications on the Android platform using the Java programming language.Android applications arewritten in the Java programming language. The Android SDK tools compile the codealong with
any data and resource filesinto anAndroid package, an archive file with an .apk suffix. All the code
in a single .apk file is considered to be one application and is the file that Android-powered devices
use to install the application.Application components are the essential building blocks of an Androidapplication. Each component is a different point through which the system can enter your application.
Not all components are actual entry points for the user and some depend on each other, but each one
exists as its own entity and plays a specific roleeach one is a unique building block that helps define
application's overall behavior.
Features
Application framework enabling reuse and replacement of components Dalvik virtual machine optimized for mobile devices Integrated browser based on the open source Web Kit engine
-
8/3/2019 Smart Secure
25/35
Smart Secure Project Design 2011
ANDROID ARCHITECTURE
The following diagram shows the major components of the Android operating system.
Each section is described in more detail below.
-
8/3/2019 Smart Secure
26/35
Smart Secure Project Design 2011
APPLICATION FRAMEWORK
By providing an open development platform, Android offers developers the ability to build
extremely rich and innovative applications. Developers are free to take advantage of the device
hardware, access location information, run background services, set alarms, add notifications to the
status bar, and much, much more.
Developers have full access to the same framework APIs used by the core applications. The
application architecture is designed to simplify the reuse of components; any application can publish
its capabilities and any other application may then make use of those capabilities (subject to security
constraints enforced by the framework). This same mechanism allows components to be replaced by
the user.
Underlying all applications is a set of services and systems, including:
A rich and extensible set of the views that can be used to build an application, including lists,grids, text boxes, buttons, and even an embeddable web browser
Content Providers that enable applications to access data from other applications (such asContacts), or to share their own data
A Resource Manager, providing access to non-code resources such as localized strings,graphics and layout files
http://developer.android.com/guide/topics/providers/content-providers.htmlhttp://developer.android.com/guide/topics/resources/resources-i18n.htmlhttp://developer.android.com/guide/topics/resources/resources-i18n.htmlhttp://developer.android.com/guide/topics/providers/content-providers.html -
8/3/2019 Smart Secure
27/35
Smart Secure Project Design 2011
Surface Manager - manages access to the display subsystem and seamlessly composites 2Dand 3D graphic layers from multiple applications
LibWebCore - a modern web browser engine which powers both the Android browser andan embeddable web view
SGL - the underlying 2D graphics engine 3D libraries - an implementation based on OpenGL ES 1.0 APIs; the libraries use either
hardware 3D acceleration (where available) or the included, highly optimized 3D software
rasterizer
FreeType - bitmap and vector font rendering SQLite - a powerful and lightweight relational database engine available to all applications
Android Runtime
Android includes a set of core libraries that provides most of the functionality available in the
core libraries of the Java programming language.
Every Android application runs in its own process, with its own instance of the Dalvik virtual
machine. Dalvik has been written so that a device can run multiple VMs efficiently. The Dalvik VM
executes files in the Dalvik Executable (.dex) format which is optimized for minimal memory
footprint. The VM is register-based, and runs classes compiled by a Java language compiler that have
-
8/3/2019 Smart Secure
28/35
Smart Secure Project Design 2011
If an activity has lost focus but is still visible (that is, a new non-full-sized or transparentactivity has focus on top of your activity), it ispaused. A paused activity is completely alive
(it maintains all state and member information and remains attached to the window manager),
but can be killed by the system in extreme low memory situations.
If an activity is completely obscured by another activity, it is stopped. It still retains all stateand member information, however, it is no longer visible to the user so its window is hidden
and it will often be killed by the system when memory is needed elsewhere.
If an activity is paused or stopped, the system can drop the activity from memory by eitherasking it to finish, or simply killing its process. When it is displayed again to the user, it must
be completely restarted and restored to its previous state.
The following diagram shows the important state paths of an Activity. The square rectangles represent
callback methods you can implement to perform operations when the Activity moves between states.
The colored ovals are major states the Activity can be in.
-
8/3/2019 Smart Secure
29/35
Smart Secure Project Design 2011
-
8/3/2019 Smart Secure
30/35
Smart Secure Project Design 2011
engine. SQLite is the most widely deployed SQL database engine in the world. The source code for
SQLite is in the public domain.
Features of SQLite
Application File Format. Rather than using fopen () to write XML or some proprietaryformat into disk files used by your application, use an SQLite database instead. To
avoid having to write and troubleshoot a parser, your data will be more easily
accessible and cross-platform and your updates will be transactional.
Database for Gadgets. SQLite is popular choice for the database engine in cellphones, PDAs, MP3 players, set-top boxes, and other electronic gadgets. SQLite has a
small code footprint, makes efficient use of memory, disk space, and disk bandwidth,
is highly reliable, and requires no maintenance from a Database Administrator.
Website Database. Because it requires no configuration and stores information inordinary disk files, SQLite is a popular choice as the database to back small to
medium-sized websites.
Stand-in for an Enterprise RDBMS. SQLite is often used as a surrogate for anenterprise RDBMS for demonstration purposes or for testing. SQLite is fast and
requires no setup, which takes a lot of the hassle out of testing and which makes
d k d l h
-
8/3/2019 Smart Secure
31/35
Smart Secure Project Design 2011
APPENDIX A
DFD
Level 0 (Context Level)
Request Response
Level 1 of user
Login UserUser
-
8/3/2019 Smart Secure
32/35
Smart Secure Project Design 2011
Level 1 of filtration
Level 2 of Backup process
Filter
sms/call
Add blacklist
numbers
Manage
blacklist
filtration blacklist
-
8/3/2019 Smart Secure
33/35
Smart Secure Project Design 2011
Level 2 of Encryption process
Level 2 of Tracker process
Select data
Encrypt
Decrypt
EncryptionEncryption
-
8/3/2019 Smart Secure
34/35
Smart Secure Project Design 2011
Level 2 of Wipe process
Select data
Wipe phone
data
Tracking user
-
8/3/2019 Smart Secure
35/35