Professional Documents
Culture Documents
Qis College of Engineering and Technology: Security Launcher: Making Data Protection For Lost or Stolen Android Devices
Qis College of Engineering and Technology: Security Launcher: Making Data Protection For Lost or Stolen Android Devices
(AUTONOMOUS)
DEPARTMENT OF INFORMATION TECHNOLOGY
PROJECT TITLE
Submitted by:
B.Surendra Reddy 17491A1231
B.Vinay Kumar 17491A1234
B.Prudhvi Babu 16491A1240
M.Sarbaaz Shah 17491A1245
SECURITY LAUNCHER
<AN ANDROID APPLICATION>
ABSTARCT
• In this android application is based on application manager to manage the sensitive private application like
(Facebook, whatsapp, twitter, etc.,).
• This application is a collection of applications for manage the security and privacy of that sensitive
application.
• This application has one password to sign all the application, after sign out from this application then other
signed application automatically logout from the network.
• In further if any other person try to open the lock means front camera capture their face and store in gallery.
EXISTING SYSTEM
The android application in manage the other sensitive application but only it lock and unlock the
application.
This application show in menu of the android mobile, it lock the application if any one open the
application get master password or pin to unlock.
In our proposed system, we have fully maintain the other sensitive application with privacy.
The proposed android application is collection of sensitive application with its access rights.
This system manages the authentication of the other applications and it hides from the menu of the
android mobile.
The new password system use to authenticate that touch screen based password authentication.
Software Requirements Hardware Requirements
Database : SQLite
ARCHITECTURE
Network
Applications
Authorized user
User
Security System
Unauthorized user
Take image using front
camera SD card
Launch app
Open application
Change authentication
User
Verify and login
Change authentication
Exit app
Open application
Change authentication
Unauthorized users :-
Unauthorized users are thefts or not registered users.so they didn’t enter into my application.
Activities :
Register Touch co-ordinates
Touch based Authentication
Application List
Sign in and Sign out
Register Touch co-ordinates
• We can provide the authenticated person to identify the person if any one try to unlock
application in the smart phone.
• We can send the email of the images to the person of unauthenticated users
CONCLUSION
• In this system achieves user friendly environment to access social network application in
mobile.