Professional Documents
Culture Documents
Report FinalSem HIVE Raja
Report FinalSem HIVE Raja
HIVE
By:
Raja Singla
Roll no: IT-1047-2K12
Under the Guidance of
Mr. Yash Buch (Corporate Engineer)
(SRI Noida)
Submitted to the
DEPARTMENT OF COMPUTER ENGINEERING &
TECHNOLOGY
ACKNOWLEDGEMENT
I take this opportunity to express our sincere thanks and deep gratitude to all those people
who extended their wholehearted co-operation and have helped me in completing this
project successfully.
First of all, I would like to thank Mr. Yash Buch (Corporate Engineer), Mr. Sanjeev
Bhatt" (Chief Engineer) for their precious time and support whenever needed. They
have been a driving force behind the successful completion of the project.
I would also like to express my deep gratitude towards SRI, Noida for considering me a
part of their organization and provide such a great Platform to learn and enhance my
skills.
A very special thanks goes to all the faculties of YMCA University under whom guidance
I have been able to excel in my career and reach to such a prestigious organization.
Raja Singla
(IT-1047-2K12)
YMCAUST
Content
1.
COMPANY PROFILE............................................................................................................1
1.1
History..............................................................................................................................3
1.2
1.3
Journey..............................................................................................................................5
1.4
Samsung Global................................................................................................................5
1.5
1.6
1.7
1.8
Management Philosophy..................................................................................................8
1.9
Project Introduction...............................................................................................................18
2.1
2.1.1
Authentication.........................................................................................................18
2.1.2
2.2
3.
OTP Fetch.......................................................................................................................18
Call Notes.......................................................................................................................19
2.2.1
Application Interface...............................................................................................19
2.2.2
Background Service................................................................................................19
2.3
Encryptor........................................................................................................................19
2.4
Resolution Finder............................................................................................................20
Background...........................................................................................................................20
3.1
Project Components........................................................................................................20
3.1.1
User Suite................................................................................................................20
3.1.2
Developer Suite.......................................................................................................23
4.
5.
3.3
3.4
Motivation.......................................................................................................................24
Android...........................................................................................................................24
4.2
Bluetooth.........................................................................................................................26
4.3
4.4
Threading........................................................................................................................29
4.5
MD5/SHA1/SHA2..........................................................................................................31
Project Design.......................................................................................................................32
5.1
5.2
6.
Implementation......................................................................................................................36
7.
Testing...................................................................................................................................37
8.
7.1
7.2
7.3
Results...................................................................................................................................39
8.1
LEARNING....................................................................................................................39
8.2
Snapshots........................................................................................................................40
1. COMPANY PROFILE
About Samsung
Solutions
Services
Products
About Samsung
Our Platform moves the world!
The companys thrust on Product Innovation and R&D has given the company a competitive
edge in the marketplace.
The Samsung Group is a multinational conglomerate corporation headquartered in Samsung
Town, Seoul, South Korea. The Samsung Group comprises numerous international affiliated
businesses, most of them united under the Samsung brand including Samsung Electronics, the
worlds largest technology company by sales. Samsung Heavy Industries, the worlds second
largest shipbuilder, Samsung Engineering was ranked 35th, Samsung C&T 72nd in a 2009 ranking
of 225 global construction firms compiled by Engineering News Record, a US construction
journal. Samsung Life Insurance was ranked 14th in a 2009 ranking of Fortune Global 500
Industries.
1.1 History
In 1938,Lee Byung-chull (19101987) of a large landowning family in the Uiryeong county
came to the nearby Daegu city and founded Samsung Sanghoe, a small trading company with
forty employees located in Su-dong (now Ingyo-dong). It dealt in groceries produced in and
around the city and produced noodles itself. The company prospered and Lee moved its head
office to Seoul in 1947. Lee sought to establish Samsung as an industry leader in a wide range of
enterprises, moving into businesses such as insurance, securities, and retail. Lee placed great
importance on industrialization, and focused his economic development strategy on a handful of
large domestic conglomerates, protecting them from competition and assisting them
financially.In the late 1960s, Samsung Group entered into the electronics industry. It formed
several electronics-related divisions, such as Samsung Electronics Devices Co., Samsung
Electro-Mechanics
Co.,
Samsung
Corning
Co.,
and
Samsung
Semiconductor
&
Telecommunications Co. Its first product was a black-and-white television set. Samsung
Electronics overtook Sony as one of the world's most popular consumer electronics brands in
2004 and 2005.
1.3 Journey
Samsung has established Software Engineering Lab in 2007 in India with a firm belief towards
success and realistic goals. Noida Lab has transformed itself into one of the most competitive
and proficient R&D centers of Samsung worldwide. It is focused on embedded and PC software
development for Samsung Electronics, in a variety of areas related to Mobile phones.
Noida Lab started its operations with Regional Adaption and Multimedia testing while focusing
to bring great innovations and latest technologies in the era of wireless communications. SRINoida is engaged in development of latest mobile software for all range of handsets. SRI-Noida
also focuses on Quality which includes automation testing, protocol testing, white box testing
and GCF certifications.
Former Chairman Mr. BC Lee, 50 years (1938-1987), founded Samsung, 1938 making it the
Engine of Korean Economy. The Achiever Chairman Mr. KH Lee has been continuously making
Samsung best in Class Company since 1988 till today.
Samsung global has more than 429 offices/facilities 68 countries, including 30 Manufacturing
Subsidiaries, 51 Sales Subsidiaries, one Manufacturing and Sales Subsidiaries, 2 Distribution
centers, 6 design centers, 77 Branch offices and others.
With a strong commitment towards R&D, Samsung has invested $5.3bn in 2005 gradually
increasing to$6.2bn in 2009.
1994
6Mb DRAM developeded
1988
1996
Leading
Technology: The first foremost objective of SRI Noida is to make optimum use of best
technology for the research and development.
Creative Solutions: To make the product more customer-centric, we follow new ideas
and provide creative solutions for additional features.
1.12 TECHNOLOGY
Wireless
SRI Noida is involved in development and testing of extensive range of mobiles software by the
combination of exceptional talent and superior technology.
The focus of SRI center is to produce best quality mobile phone software in both CDMA and
GSM technologies. The center has talented and development activities are carried out in ideal
manner to stabilize every model in terms of quality, features and enhancement. The dedicated
team works in coordination with other centers across the world to produce high quality mobiles
considering various factors such as market research, target customers, competing products etc.
proved a success in the world market with affordable price, magnificent features and variety
applications.
olution
Apart from research and development, SRI Noida is also occupied in the creations of new ideas
and providing solutions by analyzing the customers view point and prospective. For India
region, the center is involved in following solutions:
Mobile Prayer
Indian Calendar
Mobile Tracker
Dictionary
IMEI Tracker
At SRI Noida, the company aims to emerge as a center of excellence for research, development,
testing and solutions in wireless communication. Its target is to expand strong technological base
in South West Asia region for carrying out research work, nurturing the local talent and
exploring the market.
Services
Corporate competitiveness, in the era of global competition, begins from understanding its
customers- knowing who they are, what they want, and how they are changing. In this regards,
Samsung is fully committed to understanding its customers across all functions from
development and production to marketing and after-sales services, as well as to changing its
thinking and working processes to serve them better with innovative products and services.
Samsung Electronics is focusing ongoing innovation activities in the overseas markets to
strengthen its edge in service. Excellence in after sales service is an important goal in the
overseas markets. To offer swift and convenient service, 14,000 service centers are available
overseas as of 2009. In regions where there are relatively frequent requests, it has 400 directlyrun service centers. Samsung is also expanding its service network in Central Asia and Africa.
Samsung Electronics is devising service schemes tailored to each product and regional
characteristics to offer greater customer satisfaction. To this end, we conduct global customer
satisfaction surveys every year. The outcome of the survey is used in drawing up improvement
actions to raise customer satisfaction levels.
Optimal supply of parts is essential in providing speedy after service. For this purpose, it has
developed the demand forecast method for specific parts to improve supply capability and
inventory status. Under the program, the company is able to carry out diverse improvement
actions for prompt after service including maintaining sufficient inventory of materials that are
expected to have most usage in repair work.
At Samsung Electronics, all the new products under development must pass the demanding CS
certificate program in order to go into production. The program is designed to identify and
address potential problems when applying new functions and designs at the development stage to
ensure highest quality. Items for mandatory certification are identified at the development stage.
The product can proceed to the next stage only after completing the quality assessment at each
phase. The executive council conducts the final quality check.
Samsung Electronics is committed to delivering safe and quality products to its customers. It
tests all elements that can compromise product safety by considering a specific products use in
real life settings. All Samsung Electronics products sold are subjected to a battery of tests in
normal and abnormal conditions. To conduct the tests, Samsung Electronics operates an
internationally accredited laboratory certified by 27 accreditation bodies in Korea and 12 other
countries that ensures internationally-accepted quality assurance standards in the areas of testing
environment, facility, workforce and quality system, and that each accreditation body recognizes
the companys testing ability. It is also a testament to Samsung Electronics proven capabilities
in inspecting product safety to the satisfaction of customers. In 2009, Samsung was certified as a
CTIA Authorized Test Lab (CATL) by the Cellular Telecommunication & Internet Association,
the international wireless association based in the U.S.
Products
The product range of Samsung varies from one to vivid digital equipment that ranks in the top
range of items available in the market. The range includes Mobile phones, Televisions,
Audio/Video devices, Cameras and Camcorders, Home appliances, PCs, Peripherals, Printers
and Samsung Apps. Samsung apps, a proprietary to Samsung, are a special section of
applications meant basically for enhancing the features and usability of Samsung products.
1.15 Mobile
From the conventional and Smartphones, to the touch-screen, bars, sliders and feature-rich
devices with full QWERTY keyboard, Samsung has a wide range of products in the fields of
mobile handsets. The range of mobile devices vary from Tablet Smartphones, Smartphones,
Dual sim phones, Touch phones, Qwerty messaging phones, Multimedia phones, CDMA phones
to essential phones.
Among tablet Smartphones, Galaxy Tabs are the basic class of devices introduced in the market.
While Smartphones include the Samsung Galaxy and Wave models, dual sim phones like duos
and star duos and several other models are available in the market. Touch phones supported by
Touch wiz Lite technology are also available in models like Nexus, Corby, Galaxy, Star, Wave
etc. QWERTY messaging phones like Corby and Omnia series are the phones that provide
QWERTY keyboard support. Among multimedia phones Hero, Metro, Corby, Guru and almost
all the models have the multimedia support feature. Some Galaxy, Corby and MPower models
do support the CDMA features also. Guru series and a few other models are available that are
available with minimal but basic mobile features at cheapest possible prices. Mobile phone
accessories like headphones, Bluetooth headphones etc. are also available.
reference, social networking, navigation and more applications, Samsung Apps makes the
Smartphone smarter.
30 Manufacturing Subsidiaries
51 Sales Subsidiaries
2 Distribution Centers
18 R&D Centers
6 Design Centers
77 Branch Offices
2. Project Introduction
Hive is a collection of android applications aimed at targeted solutions to some of the most
basic problems a user faces. I have briefly described the need and underlying requirement
of the products. Different applications serve different purpose and are discussed in detail as
follows:-
2.1.1
2.1.2
on the applications main screen where he/she can choose which user to get the OTP
from. The delivery of messages uses GCM.
Listen to Call broadcasts The service has Broadcast managers defined for both
incoming and outgoing calls made to or by the device. Whenever a call is made
or received these broadcast managers define the next action.
Show pop-up notification If you have used facebook messenger you must have
observed the popup notification. This is based on the same concept. A popup
window opens after a call is made/received and on this popup you can
view/edit/save the call note.
2.3 Encryptor
This application is a developer purpose package. It takes a file as its inputand outputs
MD5 ,SHA1, SHA256 digest of the file. It can be used by the developer while
pushing out application packages so as that the end user can verify if the incoming file
is authentic or not.
3. Background
On the beginning of the internship we were told that Samsung focusses on OJT ( On the
job training). Since Samsung is a dynamic organization and products are released every
week my mentor asked me to aim at trivial problems any user or developer faces in the
current android scenario which can be addressed and may even be implemented by
Samsung in its future products. All the applications in the Hive package are targeted
towards this goal.
OTP Fetch
Call Notes
o Functionality
1. OTP Fetch
For OTP Fetch all the authenticated users are shown on the applications main
screen where he/she can choose which user to get the OTP from.
The delivery of messages uses GCM.
The requesting user selects the user from the list from which to fetch the OTP.
Unique GCM IDs of the authenticated devices are stored in the SQLite database.
A message, in the JSON format, is sent to the target device using GCM service
over the mobile internet/ WiFi /Ethernet. The receiving device identifies the
sender and sends the OTP back using the same GCM service it in real-time.
Usecase:
The aim of Hive is to target the problem of asking for One Time Passwords in a
scenario where the OTP initiator is different from the OTP receiver.
Ex. A father asks his son to perform some transaction which requires an OTP
sent to the fathers mobile (registered) for successful completion of the
transaction. There may be the case that father is in an urgent meeting and cant
take any phone calls or messages. In such a scenario Hive assists the son to get
the OTP without any hassles.
2. Call Notes
In call notes you can select a user from your contacts and add a note with a title
and body . This interface enables the user to choose the contact to he/she wants
enable the call notes on. Once enabled whenever a call is made or received the
call note would be displayed on the device.
Call notes make use of Androids Sticky service in which even if the application
is not running, a service keeps running in the background listening for incoming
and outgoing calls.
Usecase:
If your are the kind of person who needs to call someone multiple times because
you keep forgetting something each time, this app is for you.With Call Notes, you
can keep track of things or points you wish to discuss with a person. Whenever
you call that person, the respective note will popup on screen. You can also make
changes to the note while in-call or you can create/edit notes after the call.
o
Security
1.OTP Fetch
In any application securing user data is one of the major concerns. Since OTPs
are semi confidential information for the users eyes only, security has been
topmost concern.
Authentication
In the present age where we are surrounded by digital devices, protecting ones
personal information is a necessary and difficult task.
The authentication process involves a secure Bluetooth channel so that the
devices in the nearby vicinity can be paired up securely. Connection is
established using an encrypted Bluetooth RFCOMM channel. Once a
connection is established the devices use the applications UUID to identify
each other and share each others credentials and save them for future use.
Storage
Hive makes use of Android Keystore System. User GCM IDs are stored in the
database after Symmetric Encryption and the keys are stored in the Android
Keystore.
For security purposes the One Time Passwords that a user pulls from
another user are not stored.
Encryptor
Resolution Finder
1.Building OTP Fetch and Call Notes as a part of user based applications
2.Building Developer suite applications Encryptor and Resolution Finder.
3.
Testing
both
suites
comprehensively
to
match
industry
standards.
Systems design and Structure: This phase involved designing the actual system
andconverting the requirements into suitable modules. Database for each applications
was designed and UI was decided upon
Implementation:This phase witness the actual development of the project and
turningthe project into actual program. Work on android application was done
according to the requirements and UI elements.
Testing: Thisphase will engage in testing and debugging. All the issues are recorded.
The issues are then resolved and tested again.
3.4 Motivation
Below are the listed motivation for doing this project
The motivation for doing this project was primarily an interest in undertaking a
challenging project in an interesting area of real life problem.
The opportunity to learn about new areas of computing not covered in lectures was
appealing. Opportunity to learn new technologies, tools and languages.
The opportunity to work with teams.
developed Android TV for televisions, Android Auto for cars, and Android Wear for
wrist watches, each with a specialized user interface. Variants of Android are also used
on notebooks, game consoles, digital cameras, and other electronics.
Android applications run in a sandbox, an isolated area of the system that does not
have access to the rest of the system's resources, unless access permissions are
explicitly granted by the user when the application is installed. Before installing an
application, Play Store displays all required permissions: a game may need to enable
vibration or save data to an SD card, for example, but should not need to read SMS
messages or access the phonebook. After reviewing these permissions, the user can
choose to accept or refuse them, installing the application only if they accept The
sandboxing and permissions system lessens the impact of vulnerabilities and bugs in
applications, but developer confusion and limited documentation has resulted in
applications routinely requesting unnecessary permissions, reducing its effectiveness.
Google has now pushed an update to Android Verify Apps feature, which will now run
in background to detect malicious processes and crack them down.
In Android 6.0 Marshmallow, the permissions system was changed to allow the user
to control an application's permissions individually, to block applications if desired
from having access to the device's contacts, calendar, phone, sensors, SMS, location,
microphone and camera. Full permission control is only possible with root access to
the device.
4.2 Bluetooth
The Android platform includes support for the Bluetooth network stack, which allows
a device to wirelessly exchange data with other Bluetooth devices. The application
framework provides access to the Bluetooth functionality through the Android
Bluetooth APIs. These APIs let applications wirelessly connect to other Bluetooth
devices, enabling point-to-point and multipoint wireless features.
Using the Bluetooth APIs, an Android application can perform the following:
Scan for other Bluetooth devices
Query the local Bluetooth adapter for paired Bluetooth devices
Establish RFCOMM channels
Connect to other devices through service discovery
Transfer data to and from other devices
Manage multiple connections
All of the Bluetooth APIs are available in the android.bluetooth package. Some of the
classes and interfaces are required to create Bluetooth connections:
BluetoothAdapter
Represents the local Bluetooth adapter (Bluetooth radio). The BluetoothAdapter is the
entry-point for all Bluetooth interaction. Using this, you can discover other Bluetooth
devices, query a list of bonded (paired) devices, instantiate a BluetoothDevice using a
known MAC address, and create a BluetoothServerSocket to listen for
communications from other devices.
BluetoothDevice
Represents a remote Bluetooth device. Use this to request a connection with a remote
device through a BluetoothSocket or query information about the device such as its
name, address, class, and bonding state.
BluetoothSocket
Represents the interface for a Bluetooth socket (similar to a TCP Socket). This is the
connection point that allows an application to exchange data with another Bluetooth
device via InputStream and OutputStream.
BluetoothServerSocket
Represents an open server socket that listens for incoming requests (similar to a TCP
ServerSocket). In order to connect two Android devices, one device must open a server
socket with this class. When a remote Bluetooth device makes a connection request to
the this device, the BluetoothServerSocket will return a connected BluetoothSocket
when the connection is accepted.
Google GCM Connection Servers accept downstream messages from your app
server and send them to a client app. The XMPP connection server can also
accept messages sent upstream from the client app and forward them to your
app server. For more information, see About GCM Connection Server.
On your App Server, you implement the HTTP and/or XMPP protocol to
communicate with the GCM connection server(s). App servers send
downstream messages to a GCM connection server; the connection server
enqueues and stores the message, and then sends it to the client app. If you
implement XMPP, your app server can receive messages sent from the client
app.
The Client App is a GCM-enabled client app. To receive and send GCM
messages, this app must register with GCM and get a unique identifier called a
registration token. For more information on how to implement the client app,
see the documentation for your platform.
4.4 Threading
In computer science, a thread of execution is the smallest sequence of programmed
instructions that can be managed independently by a scheduler, which is typically a
part of the operating system.The implementation of threads and processes differs
between operating systems, but in most cases a thread is a component of a process.
Multiple threads can exist within one process, executing concurrently and sharing
resources such as memory, while different processes do not share these resources. In
particular, the threads of a process share its executable code and the values of its
variables at any given time.
Multithreading is mainly found in multitasking operating systems. Multithreading is a
widespread programming and execution model that allows multiple threads to exist
within the context of one process. These threads share the process's resources, but are
able to execute independently. The threaded programming model provides developers
with a useful abstraction of concurrent execution. Multithreading can also be applied to
one process to enable parallel execution on a multiprocessing system.
Multithreaded applications have the following advantages:
results.[6]
Faster execution: this advantage of a multithreaded program allows it to
operate faster on computer systems that have multiple central processing units
(CPUs) or one or more multi-core processors, or across a cluster of machines,
because the threads of the program naturally lend themselves to parallel
execution, assuming sufficient independence (that they do not need to wait for
each other).
Lower resource consumption: using threads, an application can serve multiple
clients concurrently using fewer resources than it would need when using
multiple process copies of itself. For example, the Apache HTTP server uses
thread pools: a pool of listener threads for listening to incoming requests, and a
(such as cache memory) can be retrieved by one thread while another thread
retrieves data from a slower medium (such as external storage) with neither
Threading has been extensively used on the Android applications for better system
performance and user interaction.
4.5 MD5/SHA1/SHA2
The MD5 message-digest algorithm is a widely used vulnerable cryptographic hash function
producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32-digit
hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications and
is also commonly used to verify data integrity.
MD5 is a one-way function; it is neither encryption nor encoding. It can be
reversed by brute-force attack and suffers from extensive vulnerabilities as
detailed in the security section below.
SHA-1 forms part of several widely used security applications and protocols, including TLS and
SSL, PGP, SSH, S/MIME, andIPsec. Those applications can also use MD5; both MD5 and SHA1 are descended from MD4. SHA-1 hashing is also used indistributed revision control systems
like Git, Mercurial, and Monotone to identify revisions, and to detect data corruption or
tampering. The algorithm has also been used on Nintendo's Wii gaaming console for signature
verification when booting, but a significant flaw in the first implementations of the firmware
allowed for an attacker to bypass the system's security scheme. [12]
SHA-1 and SHA-2 are the secure hash algorithms required by law for use in
certain U.S. Government applications, including use within other cryptographic
algorithms and protocols, for the protection of sensitive unclassified information.
FIPS PUB 180-1 also encouraged adoption and use of SHA-1 by private and
commercial organizations
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the
National Security Agency (NSA). SHA stands for Secure Hash Algorithm. Cryptographic hash
functions are mathematical operations run on digital data; by comparing the computed "hash"
(the output from execution of the algorithm) to a known and expected hash value, a person can
determine the data's integrity. For example, computing the hash of a downloaded file and
comparing the result to a previously published hash result can show whether the download has
been modified or tampered with.[4] A key aspect of cryptographic hash functions is their collision
resistance: nobody should be able to find two different input values that result in the same hash
output.
SHA-2 includes significant changes from its predecessor, SHA-1. The SHA-2 family consists of
six hash functions with digests (hash values) that are 224, 256, 384 or 512 bits: SHA-224, SHA256, SHA-384, SHA-512, SHA-512/224, SHA-512/256.
5. Project Design
5.1 OTP Fetch DFD
DFD Level 1
6. Implementation
Concept analysisand Requirements Analysis and POC: This phase involved learningand
discovering various new technologies used in the project. I had to understand the basic concepts of
Java and Android.. This phase also involved analysing the requirements of the project, discussing
details and gathering information in collaboration with the mentor.
Systems design and Structure: This phase involved designing the actual system andconverting
the requirements into suitable modules. Database for each applications was designed and UI was
decided upon
Implementation:This phase witness the actual development of the project and turningthe project
into actual program. Work on android application was done according to the requirements and UI
elements.
Testing: This phase will engage in testing and debugging. All the issues are recorded. The
issues are then resolved and tested again.
7. Testing
7.1 OTP Fetch Test Cases
TC Id
OTP_M_1
OTP_M_2
OTP_M_3
OTP_M_4
OTP_M_5
Test
Descriptio
n
Application
should not
crash on launch
Application should
switch activities
without stacking up
and without crash
Clicking on
Bluetooth button
should ask
permission to turn
on Bluetooth if not
enabled
Nearby Bluetooth
devices need to be
scanned
Authenticate
devices
OTP_M_6
OTP_M_7
Deleting the
authenticate device
Test
Procedure
Install the
application on
mobile device and
click on its icon
Start the
application and
click on all
buttons.
Click on
Bluetooth button
inside the
application
Click on Search
devices button
Click on any
device name to
authenticate
Select the device
from trusted
device to fetch the
device
From the trusted
device list ,
choose the device
to be deleted
Accepted
Behavior
No crash
Result
No crash
Activities should
not stack and
application should
not crash
Clicking on
Bluetooth button
should ask
permission to turn
on Bluetooth if
not enabled
Nearby Bluetooth
devices should
show up
Device should be
added in the
trusted list
OTP should be
fetched from the
device
Activities do not
stack up and
application does
not crash
Permission to turn
on Bluetooth is
asked
Device should be
deleted and we
should not be now
able to fetch the
OTP from the
same
Device deleted
and OTP not
fetched from the
device.
Nearby devices
are shown
Device added in
the trusted list
OTP fetched
successfully
TC Id
Test Description
Test Procedure
CNO_M_1
Notes display
CNO_M_1
Application should
not crash on
launch
CNO_M_2
CNO_M_3
Application should
switch activities
without stacking
up and without
crash
Add new note
Install the
application on
mobile device and
click on its icon
Start the
application and
click on all
buttons.
CNO_M_4
CNO_M_5
Start PopUp
service
CNO_M_6
Click on + button
and add title,
description and
add contact
Click on + button
and add title,
description and
add contact. Click
in tick button.
Go to settings
icon and tap on
Start Service
Make a call to the
contact for which
a note is saved
Accepted
Behavior
The saved note
text should popup
when that contact
is called or is
calling
No crash
Result
Activities should
not stack and
application should
not crash
Activities do not
stack up and
application does
not crash
Contact List
should be shown
Contact List is
shown
Note should be
saved and
displayed on
home screen
Note is saved
Service should be
started
Service is
started(Verified
using LogCat)
A yellow text box
pops up
Note is displayed
as saved in the
overlay window
on top of other
apps
No crash
Test Description
Test Procedure
RES_M_1
Resolution finder
TC Id
Test Description
Test Procedure
ENC_M_1
encryptor
Accepted
Behavior
The app interface
should show the
proper resolution
and orientation of
the device
Accepted
Behavior
Selected apps
SHA1 SHA256
and MD5 dump
should be created
Result
Proper resolution
and orientation of
the device is
shown on app
interface
Result
Dumps are
created
succesfully
8. Results
8.1 LEARNING
Undertaking a challenging project in a leading company not only helped me to
understand the the working culture of IT firms but also gave me an opportunity to learn
about new areas of computing, new tools, technologies and languages not covered in
lectures in college. The project Hive helped me to increase my knowledge set as I
learnt following new technologies and used them to complete the project:
Java : I was proficient in C/C++ and this was my first time dabbling in Core Java and its
concepts such as Singleton classes.
Android :Android was used to create all the applications.
Bluetooth APIs: I had to go through the Bluetooth API documentation for android to
understand its concepts and implement it
Threading: Although I have learnt threading in OS but this was the first time I
implemented it in a project.
Apart from these new tools and technologies, the languages and technologies
learnt in college helped in the completion of the project.
8.2 Snapshots
Here are a few snapshots of Hive Applications which will display some its
features
Figure 11
Figure
Saved
12Notes
Saved notes
50
51