Professional Documents
Culture Documents
I-Guard: Home Security For I-Phone Application
I-Guard: Home Security For I-Phone Application
A Report on
I-Guard
Submitted By
Honey Patel(080120107062)
&
Aanal Purani(080120107077)
1
HOME SECURITY FOR I-PHONE APPLICATION
A Report on
I-Guard
Major Project-I
Submitted in partial fulfilment of the requirements
Submitted By
Honey Patel(080120107062)
&
Aanal Purani(080120107077)
Certificate
2
HOME SECURITY FOR I-PHONE APPLICATION
This is to certify that the Major Project-I entitled ”I-Guard” submitted by (Honey Patel)
(080120107062), towards the partial fulfillment of the requirements for the degree of Bachelor of
Engineering in Computer Engineering of Gandhinagar Institute of Technology, Moti
bhoyan is the record of work carried out by her under my supervision and guidance. In my
opinion, the submitted work has reached a level required for being accepted for examination. The
results embodied in this major project, to the best of my knowledge, haven’t been submitted to
any other university or institution for award of any degree.
External Faculty
Acknowledgement
3
HOME SECURITY FOR I-PHONE APPLICATION
This project would not have been possible without the guidance and support technical
and personal of a number of people. We would like to thank all those individuals, researchers,
professionals and technicians who are working in the domain of I-phone directly and indirectly.
We went through many problems and challenges during our tenure with the industry. We had
gone through many books and also referred many recommendations proposed by many forums
and standards making bodies.
Finally we would like to thank our college faculty members and friends without whose
support we would not have been able to complete the project up to this.
Aanal Purani
&
Honey Patel
Abstract
4
HOME SECURITY FOR I-PHONE APPLICATION
The purpose of making this project is to provide security network on .Net platform, with
its own database so that all users of that application can secure their premises whether they are at
their work place or at their home.
5
HOME SECURITY FOR I-PHONE APPLICATION
Index
1. Introduction ...........................................................................................................................7
1.1 Purpose ..................................................................................................................................7
1.2 Document Conventions .........................................................................................................7
1.3 Intended audience and reading suggestions………………………………………………....7
1.4 Project Scope ..........................................................................................................................7
2. Overall Description ................................................................................................................8
2.1 Product Perspective ................................................................................................................8
2.2 Product Features......................................................................................................................8
2.3 User Characteristics ................................................................................................................8
2.4 Operating Environment ..........................................................................................................10
2.5 Design and Implementation Constraints ................................................................................13
2.6 User Documentation ...............................................................................................................15
2.7 Assumptions and Dependencies ............................................................................................16
3. System Features .....................................................................................................................17
3.1 System Feature 1 ...................................................................................................................17
4. System design………………………………………………………………………………..18
4.1 Data flow Diagram……………………………………………………………………….....18
4.2 Use case Diagram……………………………………………………………………………20
4.3 Class Diagram…………………………………………………………………………….....21
4.4 Sequence Diagram…………………………………………………………………………..22
4.5 E-R Diagram………………………………………………………………………………..23
5. External Interface Requirements ........................................................................................24
5.1 User interface……………………………………………………………………………….24
5.2 Hardware Interfaces ..............................................................................................................24
5.3 Software Interfaces ...............................................................................................................24
5.4 Communication interface…………………………………………………………………...27
6. Other Nonfunctional Requirements .....................................................................................27
6.1 Safety Requirements ..............................................................................................................27
6.2 Security Requirements ..........................................................................................................28
6.3 Software Quality Attributes ..................................................................................................28
References………………………………………………………………………………29
1.Introduction:
6
HOME SECURITY FOR I-PHONE APPLICATION
1.1 Purpose:
This project is about the design and development of an automated home
security system.
Home security system should provide security and safety features for those
houses that are using it. It should be able to alarm residents from natural,
accidental and/or human dangers such as: fire,theft, animals invading, .etc.
The requirement document will include some details about the problem or the
need for a home security system as well as the solution specifications or what
is expected from home security system.
This document, the Software Requirements Specification (SRS) is used to
describe and track the software requirements for home security system. In
addition to basic requirements this SRS will describe the external Interface
Requirements, nonfunctional requirements, and Overall Description,System
Features,etc.
1.2Document Convention:
Main Section Title :
Font : Times New Roman Face: Bold Size: 14
This SRS is useful for developer, user, external guide and internal guide.Each
of them can easily understand how to use our software product by reading this
SRS.
7
HOME SECURITY FOR I-PHONE APPLICATION
2. Overall Description:
2.1Product Perspective:
iPhone Technology and Literature Review application for Home security
&monitoring. User can control – arm(lock)/disarm(unlock)/alarm(emergency)
his home from the mobile.
He can view the history of the events and camera attached in his home.
Whoever can interact with our home security systems such as the lightening
system, phone system, alarm etc in enable mode.
2.2Product Features:
Reports sent in seconds via pop up messages in phone call.
It does support WI-FI and GPRS for iphone and Internet connection for
Application server.
Arm/Disarm alarm via internet keypad
Remote programming of the system
Super fast transmission speed
Easy to install and set-up
APPLICATIONS:
Alarm signal reporting
Open/Close signal reporting - Monitor by user code
Latch-key reporting -
Polling loss notification - Monitor if you lose communication
Supervisory by zone - Monitor a liquor or gun cabinet in your home
2.3User Characteristics:
Passwords:
Many users, security specialists and administrators rely at least in part on
passwords to authenticate the identity of those wishing to gain access to a
security system.
Passwords need to incorporate more than just letters for the greatest security,
making use of numbers and other symbols available on the keyboard.
Those wishing to gain access by defeating the password security system may
try commonly used passwords, or to hack the password system in order to
gain unauthorized entry.
Biometrics:
Biometric devices detect the identity of the person trying to gain access to a
security system.
8
HOME SECURITY FOR I-PHONE APPLICATION
Certificates:
Third-party digital security companies (called certification authorities) issue
digital certificates to companies or individuals.
Digital certificates vary in their complexity, depending on the security needs
of the individual or company.
The certification authority issues a certificate that the user embeds on security
sysytem. When the user attempts to gain access to secured areas on a network,
or even secured websites, another software program at the receiving end of the
request validates the required digital certificate.
Smart cards:
An authorized individual may use a smart card to authenticate his identity in
order to gain access to secured devices or areas.
Smart cards look much like a credit card and have a microchip and memory
embedded in the card.
The user inserts a smart card into a reader device and enters a password. A
remote server checks the smart card against the entered password.
If the user enters incorrect passwords too many times in a row, the reader
device can be programmed to destroy the smart card to eliminate unauthorized
access.
If a user loses his smart card, a network administrator can turn the card off so
it can no longer be use to gain access to secured devices or areas.
9
HOME SECURITY FOR I-PHONE APPLICATION
2.4Operating Environment:
In our system we would be using following software and hardware:
Softwares:
1. Objective c:
• Objective-C's features often allow for flexible, and often easy, solutions to
programming issues.
• Delegating methods to other objects and remote invocation can be easily
implemented using categories and message forwarding.
• Swizzling is a pointer allows for classes to change at runtime. Typically
used for debugging where freed objects are swizzled into zombie objects
whose only purpose is to report an error when someone calls
them.Swizzling was also used in Enterprise Objects Framework to create
database faults. Swizzling is used today by Apple’s Foundation
Framework to implement Key-Value Observing.
• Serialization, commonly called Archiving in Objective-C, can be done by
overwriting read and write methods.
2. SQL server(2005/2008)
SQL Server 2005 (codename Yukon), released in October 2005, is the
successor to SQL Server 2000.
It included native support for managing XML data, in addition
to relational data. For this purpose, it defined an xml data type that
could be used either as a data type in database columns or as literals in
queries.
XML columns can be associated with XSD schemas; XML data being
stored is verified against the schema. XML is converted to an internal
binary data type before being stored in the database.
Specialized indexing methods were made available for XML data.
XML data is queried using XQuery; Common Language
Runtime (CLR) integration was a main feature with this edition,
enabling one to write SQL code as Managed Code by the CLR.
SQL Server 2005 introduced "MARS" (Multiple Active Results Sets),
a method of allowing usage of database connections for multiple
purposes.
10
HOME SECURITY FOR I-PHONE APPLICATION
3. SQL light:
• A high-level overview of what SQLite is and why you might be interested
in using it.
• This document describes situations where SQLite is an appropriate
database engine to use versus situations where a client/server database
engine might be a better choice.
• This document enumerates and describes some of the features of SQLite
that make it different from other SQL database engines.
• A list of all titled pages on this website, sorted by title.
11
HOME SECURITY FOR I-PHONE APPLICATION
6. Iphone SDK(x-code):
Apple today provided development details for native third-party applications
for the iPhone and iPod touch.
The company has created a development kit that uses the same programming
language and interface used by Apple itself and now includes Cocoa Touch,
an API designed to add touchscreen input. Programmers now use a modified
version of Xcode that is not only used to write programs for the iPhone but to
manage them as well, including designing the visual interface, source control,
and debugging.
Developers can also test the final results in an environment known as the
iPhone Simulator, according to Apple.
Single Window
As an experienced Xcode user, the first thing you will notice about Xcode is
that the many windows used to perform the development tasks you work on
every day have been consolidated into a single window.
12
HOME SECURITY FOR I-PHONE APPLICATION
The Xcode work area has several unique UI elements that make it easy to
work on many different tasks, even multiple projects, without cluttering your
work area. Your editor is always front and center.
Navigators
The unified navigator UI provides live filtering of content and search results,
so you can focus on your current task.
Hardware:
1. Server(1 gb RAM):
Application server:
A new, user-friendly Add Roles Wizard that helps you choose the services
and features that are necessary to run your applications
Application Server Foundation, the default installation of Application Server
that includes the .NET Framework 3.0 features (If you have applications that
are built with the .NET Framework 3.5, you can download and install the
.NET Framework 3.5 onto the operating system.)
2. IP camera:
This device takes the images and videos of different areas and sends the
updates to the server as well as the device.
3. Sensor:
Mechanical device sensitive to light, temperature,
radiation level, or the like, that transmits a signal to measuring or control instr
-ument.
Databases:
13
HOME SECURITY FOR I-PHONE APPLICATION
Security considerations:
security system has the ability to range from a simple motion sensor that turns
on a light or an alarm to an entire suite of detectors – motion, door/window
sensors, glass-break, cameras – setting off the most advanced applications
employing cutting edge technology.
Not only can your highly developed system activate lights and alarms, but
also it has the capability of notifying the proper emergency response team.
You can also program your system to notify you about an intrusion or
emergency via email, cellular phone, instant message, or other online
notifications.
When you are trying to secure your home, a home security system can go all
the way.
language requirements:
English
communications protocols:
It should be voice alert and message alert inside Home security application.
security considerations:
burglary:
The system shoots an alarm in case a burglary takes place and sends an
instant notification to our apple device.
Breakdown:
In case someone intentionally tries to break the security system before
barging inside the system by default sends an alarm notification to the apple
device.
14
HOME SECURITY FOR I-PHONE APPLICATION
User accounts:
Unused default user accounts created during an operating system install
should be disabled.
There is also a long list of software that when installed, user accounts are
created on the operating system.
Such accounts should also be checked properly and permissions need to be
changed required.
15
HOME SECURITY FOR I-PHONE APPLICATION
3.System Features:
16
HOME SECURITY FOR I-PHONE APPLICATION
The alarm will alert the security company on intrusion, fire, or emergency.
In fact, the system can summon police, fire, or ambulance via a call to the security
company. Once again a user-defined delay should be used.
The system will be able to monitor and control all sensors currently
marked as activated. Even if a sensor is not currently activated, the system should
monitor the status of that sensor.
Remote access.
The user must be able to check the status of the system through a remote link
4.System Analysis:
4.1Data flow Diagram:
17
HOME SECURITY FOR I-PHONE APPLICATION
0
Input Photo capture display of the image
Output
Process
Information notification
Level 1:
Photo capture 1.0 detect the obj into its vicinity
Input Process
Information sensor
Buffer
1.1
Server
Level -2:
Send the info the device 2.0
Output
Server
Sql light
18
HOME SECURITY FOR I-PHONE APPLICATION
Home security
Create a user
user
19
HOME SECURITY FOR I-PHONE APPLICATION
Home
Reply back
20
HOME SECURITY FOR I-PHONE APPLICATION
21
HOME SECURITY FOR I-PHONE APPLICATION
input Output
M
Sql ligh
Send the info
Give info to
M
server
22
HOME SECURITY FOR I-PHONE APPLICATION
The first interface is the log-in screen. This is where the user has a specific Username
and Password so that they can gain access to the database. Then user can manage his/her profile.
IP camera:
This device takes the images and videos of different areas and sends the updates
to the server as well as the device.
23
HOME SECURITY FOR I-PHONE APPLICATION
3. SQ L light:
A high-level overview of what SQLite is and why you might be interested in
using it.
This document describes situations where SQLite is an appropriate database
engine to use versus situations where a client/server database engine might be a
better choice.
This document enumerates and describes some of the features of SQLite that
make it different from other SQL database engines.
A list of all titled pages on this website, sorted by title.
24
HOME SECURITY FOR I-PHONE APPLICATION
6. Iphone SDK(x-code):
25
HOME SECURITY FOR I-PHONE APPLICATION
if you're going to be away from home for a few days, adjust your telephone
ring to its lowest volume setting. An unanswered phone may tip off a burglar that
no one is home. Also, have a neighbor or friend collect your newspaper and mail.
Never cancel delivery - you don't know who will get that information.
Keep garage doors shut.
Don't leave notes on the door for service people or family members. These alert
the burglar that you are not home.
If out of the home for an extended period of time, create the illusion that
someone may still be there. Leave a TV or stereo on in the room where a
burglar would most likely break in. Use exterior lighting and motion detectors to
minimize burglar concealment.
Keep your alarms working properly.
Test and maintain your sensor at least once a month, or follow the
manufacturer’s instructions. sensor most often fail because of missing, dead or
disconnected batteries. Replace batteries at least once a year. Testing is generally
as simple as pushing a button and listening to hear the beep.
Practice a fire escape plan.
In addition to installing fire alarms in your home, you should develop a
fire-escape plan and practice it at least twice a year with all members of your
household. In the event of a fire, every family member should know at least two
ways out of each room.
26
HOME SECURITY FOR I-PHONE APPLICATION
27
HOME SECURITY FOR I-PHONE APPLICATION
The system should be directly wired in to the phone lines, preferably in such a
way that will not cut off phone usage from inside the house.
References:
http://en.wikipedia.org/wiki/Microsoft_SQL_Server
http://technet.microsoft.com/enus/library/cc770499(WS.10).aspx
http://hss.fatih.edu.tr/docs/pdf/srs.pdf
http://www.cs.colorado.edu/~kena/classes/6448/s01/examples/nick
m3.pdf
http://www.cs.colorado.edu/~kena/classes/6448/s01/examples/tom
p3.pdf
28