Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

QIS COLLEGE OF ENGINEERING AND TECHNOLOGY

(AUTONOMOUS)
DEPARTMENT OF INFORMATION TECHNOLOGY

PROJECT TITLE

Security Launcher: Making Data Protection for Lost or Stolen Android


Devices
Under The Guidance Of
N.Suresh.,M.tech
Assistant professor

Submitted by:
B.Surendra Reddy 17491A1231
B.Vinay Kumar 17491A1234
B.Prudhvi Babu 16491A1240
M.Sarbaaz Shah 17491A1245
SECURITY LAUNCHER
<AN ANDROID APPLICATION>
ABSTARCT

• In this android application is based on application manager to manage the sensitive private application like
(Facebook, whatsapp, twitter, etc.,).

• This application is a collection of applications for manage the security and privacy of that sensitive
application.

• This application has one password to sign all the application, after sign out from this application then other
signed application automatically logout from the network.

• We use touch screen based password to access this application.

• In further if any other person try to open the lock means front camera capture their face and store in gallery.
EXISTING SYSTEM

 The android application in manage the other sensitive application but only it lock and unlock the
application.

 This application show in menu of the android mobile, it lock the application if any one open the
application get master password or pin to unlock.

 They used password, pin and pattern for unlock authentication.


PROPOSED SYSTEM

 In our proposed system, we have fully maintain the other sensitive application with privacy.

 The proposed android application is collection of sensitive application with its access rights.

 This system manages the authentication of the other applications and it hides from the menu of the
android mobile.

 The new password system use to authenticate that touch screen based password authentication.
Software Requirements Hardware Requirements

O/S : Windows 7 & Above System : Core 2 duo

Language : Java (Android). Hard Disk : 500 GB

IDE : Eclipse with SDK Ram : Min 2 GB

Database : SQLite
ARCHITECTURE
Network
Applications

Authorized user

User

Security System

Unauthorized user
Take image using front
camera SD card
Launch app

Data Flow Diagram


Start Splash

Touch screen based authentication

Sign in all apps

Open application

Change authentication

Exit app sign out all application


Use Case Diagram Launch app

Touch pixel coordinates

User
Verify and login

Sign in all apps

Change authentication

Exit app

Sign out all apps


Activity Diagram Launch app

Start Splash screen

Touch screen based authentication

Sign in all apps

Open application

Change authentication

Exit app sign out all application


Modules
Authorized users :-
Authorized users are registered users. They need to be register to login.So they can use
application in our mobile and from that application user manage various applications. users are not to enter the
details every time.

Unauthorized users :-
Unauthorized users are thefts or not registered users.so they didn’t enter into my application.

Activities :
 Register Touch co-ordinates
 Touch based Authentication
 Application List
 Sign in and Sign out
Register Touch co-ordinates

 Use Motion event class to get touch co ordinates.


 Get users touch co ordinates.
 Use android SQLite database to store touch co ordinates

Touch Based Authentication

 Retrieve values get pixel coordinates from user login.


 Match coordinates with stored coordinates.
 If match sign in to the application menu.
Application List

 Create List view control in menu


 Use application manger to get all installed app
 Arrange in the list view with its logo.

Sign In and Sign out:

• Sign in to the application manager and sign in to social network application.


• If exit from application manager then sign out from all the application.
Screenshots:
FUTURE ENHANCEMENT

• We can provide the authenticated person to identify the person if any one try to unlock
application in the smart phone.

• We can send the email of the images to the person of unauthenticated users
CONCLUSION

• In this system achieves user friendly environment to access social network application in
mobile.

• Also maintain privacy to visible the password.

• Also this application is perfect app lock application in android.

You might also like