Design and implementation of improved authentication system for android smartphone users

0 %
100 %
Information about Design and implementation of improved authentication system for android...
Education

Published on March 4, 2014

Author: NaveenKumar358

Source: slideshare.net

Description

Dear IT Aspirants ,
Greetings from Embedpark , Bangalore!!!
Embedpark Innovations pvt ltd, Bangalore offers Total Developement solutions and Embedpark Innovations projects for freshers, working professionals and corporate in the below mentioned technologies:-
Final Year Projects Include:
1. Embedded Systems(Embedded / ARM / PIC/ MC/ MP)
2. Robotics
3. Linux Based Projects
4. Developement on FPGA / VLSI
5. Android
6. Mobile Applications
7. Website Developement
8. Database Design and Applicatios
9. MS ASP.Net, C# .Net, VB.Net, VC++ .net
10.JAVA / Advance - Java Projct
11.Big Data Hadoop
12.PHP
Embedpark Innovations pvt ltd, Bangalore has a dedicated total Developement & solutions in the Industry.
For further IEEE Projects details about Embedded System , VLSI, Android, Dot net, JAVA for IEEE 2013-14 Projects,
Source code+Documents+Review Document Slides+Softwares+Explanation+Execution
Feel free to contact the concerned person mentioned below:
Contact:Name: Naveen Kumar
Address: Embedpark Innovations Pvt.Ltd, #20/233, Manandi Towers, 9th Main Road, Above ING Vysya Bank, 2nd floor , Jayanagar 3rd block Bangalore, India-560011
Contact: 9886733705 / 9886289694

Design and Implementation of Improved Authentication System for Android Smartphone Users ABSTRACT: The devices most often used for IT services are changing from PCs and laptops to smart phones and tablets. These devices need to be small for increased portability. These technologies are convenient, but as the devices start to contain increasing amounts of important personal information, better security is required. Security systems are rapidly being developed, as well as solutions such as remote control systems. However, even with these solutions, major problems could still result after a mobile device is lost. In this thesis, we present our upgraded Lock Screen system, which is able to support authentication for the user's convenience and provide a good security system for smart phones. We also suggest an upgraded authentication system for Android smart phones.

ARCHITECTURE:

EXISTING SYSTEM: Slide Lock: This is a Lock Screen provided by Android and IOS and it is a “touch– horizontal slide” form of screen. It does not serve as a security system and necessitates extra security applications. Glass Lock: This is a Lock Screen based on the Android OS and is provided on Samsung devices. It works the same as a Slide Lock can be dragged in all directions. It is like putting a glass on the screen. Keypad Lock: This scheme requires a four-digit password, so it provides key space from 0 to 9999. Repetitive input touching of the smartphone is required, presenting an inconvenience factor. Pattern Lock: This is well matched with the user interface. There are nine dots on the screen, each of which can be touched and dragged one dot at a time (redundancy input is not available) to make a password. Accordingly, it provides approximately one million (= 9P4 + 9P5 + 9P6 + 9P7 + 9P8 + 9!) of key space. It reduces repetitive touching and provides for easy dragging. However, if users enter an easy pattern for convenience, there is weak security power; if users enter a more complicated pattern, the scheme will not be comfortable to use. Finger Scan: Atrix smartphone, made by Motorola, supplies a finger scanning system, which provides both good convenience and good security without touchdragging. Overlapping processes on the screen and low speed are the main problems in this system.

DISADVANTAGES OF EXISTING SYSTEM: • It does not serve as a security system and necessitates extra security applications. • Repetitive input touching of the smartphone is required, presenting an inconvenience factor. • If users enter an easy pattern for convenience, there is weak security power; if users enter a more complicated pattern, the scheme will not be comfortable to use. • Overlapping processes on the screen and low speed are the main problems PROPOSED SYSTEM: This Lock Screen is shown in Figure. Redundancy input (re-touching the circle) is allowed and when the circle is touched more than once, it changes color (maximum of seven times) so that the user can identify the correct input. In our demonstration video, we allowed 20 inputs and were able to make over one quadrillion passwords. In the Home Launcher, the Guest mode can be entered by shaking the mobile phone. In the Guest mode, there are a limited number of apps allowed along with the Dockbar, in which we cannot use the Appdrawer button; we can only use the buttons that are freed by the user’s setting.

ADVANTAGES OF PROPOSED SYSTEM: The Lock Screen consists of activities, so it is included in the Home Launcher application package. The Screen receives the “On/Off Broadcast Receiver” so it is processed with Intent from Screen-On, activating the Lock Screen Activity. The Lock Screen Activity consists of Password settings and, to unlock the screen, a password must first be entered. After setting the password, two options are available: a user can either enter the password or shake the mobile phone. Binding the Home key is different in Guest mode than it is in User mode. Comparing our system to the Pattern Lock and number password systems, the Pattern Lock has about one million key spaces, the number password system has

about 10,000 key spaces, and our Lock Screen system has about ten million (6^9 = 10077696) key spaces. It can also be made larger by increasing the number of repetitive touches. MODULES: Device Background module Configuration module Lock screen module Sending pattern in Mail module MODULES DESCRIPTION: Device Background Our work reveals to identify user interaction with the phone, making calls, incoming calls and SMS and giving access to answer incoming call while screen is locked by our application. We also utilized a low level system resource than expensive sensors by consuming the resource when no other application accessing ie out application will require resource when device screen is off, which ultimately decrease the power consumption ie battery. Our device, which is a mobile smartphone, contains contacts, mails, and SMS as private information of the user. Encouraging results in protected user privacy and secure their data. Configuration First of all the user should configure their lock screen pattern, based on Redundancy input (re-touching the circle), user is allowed and when the circle is touched more than once, it changes color (maximum of seven times) so that the

user can identify the correct input. Then the user can save the pattern he/she defined in the configuration screen Lock Screen The Screen receives the “On/Off Broadcast Receiver” so it is processed with Intent from Screen-On, activating the Lock Screen Activity. When the user click on the circle each time the color of circle will change, after entered the pattern user clicks Unlock button, and collect the pattern information is compared with the already configured pattern by user, if the pattern is match, then the screen allows user to enter into his mobile functionality, otherwise the message will be appear as wrong pattern. Sending pattern in Mail module If the user forget is password, he can’t access his phone, without giving correct pattern he already configured, so the pattern is send in mail to the mail id given by the user at the time of configuration. SYSTEM MODELS HARDWARE REQUIREMENT CPU type : Intel Pentium 4 Clock speed : 3.0 GHz Ram size : 512 MB Hard disk capacity : 40 GB

Monitor type : 15 Inch color monitor Keyboard type : Mobile : internet keyboard ANDROID MOBILE SOFTWARE REQUIREMENT O p er a t in g S y s t em : An d r o i d L an g u a g e : A N D R O I D S DK 2 .3 Back End : SQLite D o cu m en ta ti o n : Ms-Office REFERENCE: Fukuoka-shi, "Design and Implementation of Improved Authentication System for Android Smartphone Users", IEEE International Conference on Advanced Information Networking and Applications Workshops, 2012.

Add a comment

Related presentations

Related pages

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone ... which is able to support authentication for the user's ...
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone Users 2012 IEEE PROJECT | TO GET THIS PROJECT CONTACT: JP ...
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone Users ... authentication system for Android smartphones.
Read more

Design and Implementation of Improved Authentication ...

design and implementation of improved authentication system for android smartphone users —anshita agrawal 1
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone Users Shin, Kwang Il; Park, Ji Soo; Lee, Jae Yong; Park, Jong Hyuk ...
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone Users. ... We also suggest an upgraded authentication system for Android ...
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone ... System for Android Smartphone Users ...
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone Users on ResearchGate, the professional network for scientists.
Read more

Design and Implementation of Improved Authentication ...

Design and Implementation of Improved Authentication System for Android Smartphone Users. ... of Improved Authentication System for Android ...
Read more