SlideShare a Scribd company logo
1 of 4
Download to read offline
Vedavyas. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Authentication in Android Smart Phones Using Gestures and
Security Pin
Vedavyas. M1, Kumara Swamy. P2
1(

M.Tech in CSE Dept , SR Engineering College Warangal, ANDHRA PRADESH, INDIA)
Assistant Professor in CSE Dept, SR Engineering College Warangal, ANDHRA PRADESH, INDIA)

2(

Abstract
Due to the innovations in Mobile technologies, Gestures play an important role for the Authentication in the
mobile devices. With increasing popularity of the Authentications, the security risks are also growing and that is
evident in the incidents of UnAuthentication in terms of various kinds. Therefore it is essential to have a mobile
based Authentication system for security. Gestures allow users to interact with your app by manipulating the
screen objects you provide. Security systems are rapidly being developed, as well as solutions such as remote
control systems. However, even with these solutions, major problems could still result after a mobile device is
lost. In this thesis, we present our upgraded Lock Screen system, which is able to support authentication for the
user’s convenience and provide a good security system for smartphones. We also suggest an upgraded
authentication system for Android smartphones.
KeyWords: - Gestures, Intents, Shared Preferences, Intent, Home Launchers

I. INTRODUCTION

II. RELATED WORK

The devices most often used for IT services
are changing from PCs and laptops to smart phones
and tablets. These devices need to be small for
increased portability. These technologies are
convenient, but as the devices start to contain
increasing amounts of important personal information,
better security is required. Security systems are
rapidly being developed, as well as solutions such as
remote control systems. However, even with these
solutions, major problems could still result after a
mobile device is lost. In this thesis, we present our
upgraded Lock Screen system, which is able to
support authentication for the user's convenience and
provide a good security system for smart phones. We
also suggest an upgraded authentication system for
Android smart phones.
ADW Launcher is Home Screen launcher to
change the screen. This paper is to review the various
studies that have explored the technical and legal
issues associated with change the home screen of
particular user. Users can download Home Launchers
from the Android Market; the most commonly used
ones are ADW Launcher, Launcher Pro, and GO
Launcher. These systems provide convenience but not
good security.
Mobile technologies and learning is primarily
considered personal portable technologies. This
review advocates an activity-focused perspective on
the use of mobile technologies authentication for user.
Reference to both emerging trends in mobile
technology and learning research, we speculate on the
future of mobile technologies and learning the
implications this will have.

The Gestures Authentication in Android page flow
1. Dialog -> Save Email -> Shared Preferences
2. Enter Gesture -> Add and Edit Gestures -> Save
in Spells.xml
3. User Mode -> Keep Signature using gestures ->
Limited Access to Apps
4. Admin Mode -> Keep Signature using gestures
-> Can Access to all Apps ->Add permission to
user
5. Email-> Signature and the Code

www.ijera.com

III. PROPOSED WORK
1.

We will analyze the problems with the current
Home Launchers, Lock Screens and suggest an
upgraded authentication system for Android smart
phones.
2. The recorded pattern is send for the user mail id
for future assistance
3. We present our upgraded Lock Screen system,
which is able to support authentication for the
user’s convenience and provide a good security
system for smart phones.
Gestures are defined by binary resources
which can be created with an example program from
the Android SDK. In your activity you can load
Gestures via Gesture Lib. From Raw Resource (). If a
gesture
is
detected
then
the
method
"onGesturePerformedListener" is called. For this the
activity
must
implement
the
interface
"OnGesturePerformedListener" and must register
itself at the GestureOverlayView with the method
"add On Gesture Performed Listener ()".

678 | P a g e
Vedavyas. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681
Android shows the gestures in yellow for recognized
gestures and a ligher yellow for not recognized
gestures.
You
can
turn
this
off,
via
setGestureColor(Color.TRANSPARENT)
or
setUncertainGestureColor(Color.TRANSPARENT)
on the GestureOverlayView.
If you create the gesture in the Android
simulator via the program "GestureBuilder". You can
create several gestures with the same name. That may
help you to determine the right one. If you create an
Android Emulator for Android 1.6 this application
will be preinstalled on your device. Make sure to
create a device with sdcard otherwise you cannot save
gestures. All gestures will be saved in a file
called gestures on your emulator.
You can copy the gestures from the emulator
via the adb onto your local machine via the command:
./adb pull /sdcard/gestures ~/test
The gesture file must be copied into your
application under "res/raw". Afterwards it can be used
in your GestureOverlayView.

IV. PROBLEM DEFINITION
AND ASSUMPTIONS
Authentication is essential in Mobiles. How
can we provide the authentication for the mobile
devices? Because the biometric is work properly with
the mobile devices which use android. How can we
manage the Employees in an organization in a
compact way? The problem of Authentication is
solved by using gestures instead of the biometric and
the compact version of employees can be managed by
using the Employee details. In Employee details look
for employees by name, view their details, add them to
your contacts, and see their manager and direct
reports, as well as call, text, or email them.

v. GESTURES DETECTION ALGORITHM
A. Creating a View : Gesture View
An easy way to get a Canvas object to
drawing on is by overriding the onDraw() method of a
View object. Conveniently, this method has a single
parameter: the Canvas object. Drawing a Bitmap
graphic on a Canvas object is as easy as calling the
drawBitmap() method of the Canvas object.

www.ijera.com

GestureListener object as specific gesture or other
motion callbacks. The GestureListener object, a class
we implement, receives these calls for specific
gestures that the GestureDetector recognizes and
allows us to react to them as we see fit (in this case, to
move a graphic around within our PlayAreaView).
Although the GestureDetector handles the detection of
certain motions, it doesn’t do anything specific with
them nor does it handle all types of gestures.

Fig.2 Shows GestureView Constructor
C. Connecting to a Gesture Detector
GestureDetector object receives the motion
data it needs to do its gesture recognizing magic.
GestureDetector object called gestures to receive
events.

Fig.3 Shows Gesture Detection Object

D. Implementing the Gesture Listener
In order to react to the events recognized by
the GestureDetector class, we need to implement the
GestureListener class. The motion events we are most
interested in are double taps and gestures of any kind.
To listen for these types of motion events, our
GestureListener class must implement both the
OnGestureListener
and
OnDoubleTapListener
interfaces.

Fig.4 shows Gesture Listener

Fig.1 Shows How to create a Gesture View
B. Configuring the Gesture View
A GestureDetector is an Android class that
can take motion events, do some mathematical magic
to determine what they are, and then delegate calls to a
www.ijera.com

E. Handling Motion Events
A scroll event occurs when the user touches the screen
and then moves their finger across it. This gesture is
also known as a drag event. This event comes in
through
the
onScroll()
method
of
the
OnGestureListener interface.

679 | P a g e
Vedavyas. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681

www.ijera.com

Each and every Employee will have a particular
signature. Based on the signature the employee login.
The Employee signatures are added by the Admin.
b.

User Login

Fig.5 Shows onScroll()
F. Shared Preferences
The Shared Preferences class provides a
general framework that allows you to save and
retrieve persistent key-value pairs of primitive data
types. You can use Shared Preferences to save any
primitive data: Booleans, floats, ints, longs, and
strings. This data will persist across user sessions
(even if your application is killed).
Shared preferences are not strictly for saving
"user preferences," such as what ringtone a user has
chosen. If you're interested in creating user
preferences for your application, Preference Activity,
which provides an Activity framework for you to
create user preferences, which will be automatically
persisted (using shared preferences).
To get a Shared Preferences object for your
application, use one of two methods:
 getSharedPreferences() - Use this if you need
multiple preferences files identified by name,
which you specify with the first parameter.
 getPreferences() - Use this if you need only one
preferences file for your Activity. Because this
will be the only preferences file for your Activity,
you don't supply a name.
To write values:
1. Call edit() to get a SharedPreferences.Editor.
2. Add
values
with
methods
such
as putBoolean() andputString().
3. Commit the new values with commit()
To read values, use SharedPreferences methods such
as getBoolean() and getString()..

V. IMPLEMENTATION
A. Admin
a. Add Gesture
The admin has the permission to add the
Gesture signature of all the Employees and can view
all the details of the employee.

Fig. 7 Login of the User
If the Employee Login Gesture Signature is
correct then the Employee will be redirected to the
next page where the employee can view the other
employee details along with their details and their
manager.
c. On/Off Broadcast receiver
The Lock Screen consists of activities, so it is
included in the Home Launcher application package.
The Screen receives the “On/Off Broadcast Receiver”
so it is processed with Intent from Screen-On,
activating the Lock Screen Activity.
d. Lock Screen Activity
The Lock Screen Activity consists of
Password settings and, to unlock the screen, a
password must first be entered. After setting the
password, two options are available: a user can either
enter the password or shake the mobile phone. The
User mode can be entered by entering the password;
the Guest mode can be entered by using the
acceleration sensor (shaking).
e. User Mode and Guest Mode
Binding the Home key is different in Guest
mode than it is in User mode. If the Home key button
is entered in the Lock Screen, the Guest mode is
automatically entered and the user can only use a few
allowable applications.

Fig.6 Adding the Signature
www.ijera.com

f. Email pattern to mail
In the Home Launcher application, there are
five slides and declared icons with widgets. The user
can make widgets, icons, folders, and setting slides
through various kinds of touches (touch, long-click,
680 | P a g e
Vedavyas. M et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681

www.ijera.com

drag, home button, and menu button). If there are any
changes or User/Guest processes, Home Launcher reorganizes the view.

VI. CONCLUSION
A In this thesis, we analyzed the problems in
current HomeLaunchers’ Lock Screens and suggested
improving the authentication systems for Android
smartphones. By dividing the mode of entry into the
authentication system, we improved the user’s
convenience and security power. Android is being
installed in tablets and many other IT devices that
require good security systems. The use of our
improved authentication system ensures protection of
personal information.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]

[7]

ADW
Launcher,
AnderWeb,
http://jbthemes.com/anderweb/
LauncherPro, http://www.launcherpro.com/
Go
Launcher,
Go
Dev
Team,
http://www.goforandroid.com/
DAI-Labor, “Malicious Software for
Smartphones,” Technical Report, 2008.
Ken Dunham, “Mobile Malware Attacks and
Defense,” SYNGRESS 2009, 2009
Android Security Overview, Android open
source
project,
http://source.android.com/tech/security/index
.html
Atrix, Motorola, http://www.motorola.com

M.Vedavyas received the B.Tech
Degree in Computer Science &
Engineering
from
Ganpathy
Engineering College, A.P, India.
Currently doing M.tech in Computer
Science & Engineering at SR Engineering College,
Warangal, India.
P.Kumara swamy he has 8 Years of
Teaching Experience. His areas of interest are
Information security. He has published papers in
International Journal, International Conference
and National Conference and attended nearly 5
National Workshops/FDP/Seminars etc.

www.ijera.com

681 | P a g e

More Related Content

What's hot

Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)NikitaRajbhoj
 
Media Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureMedia Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureIRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordIJERA Editor
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
Gloves And Goggles Part 2
Gloves And Goggles Part 2Gloves And Goggles Part 2
Gloves And Goggles Part 2shellsbells32
 
Using Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by Intel
Using Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by IntelUsing Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by Intel
Using Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by IntelPrincipled Technologies
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET-  	  Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET-  	  Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET- Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET Journal
 
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORMDMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORMcsandit
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...IDES Editor
 

What's hot (20)

Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)Nikita rajbhoj(a 50)
Nikita rajbhoj(a 50)
 
Media Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand GestureMedia Player with Face Detection and Hand Gesture
Media Player with Face Detection and Hand Gesture
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
AUGMENTED REALITY
AUGMENTED REALITYAUGMENTED REALITY
AUGMENTED REALITY
 
Swarm ai
Swarm aiSwarm ai
Swarm ai
 
Nikppt
NikpptNikppt
Nikppt
 
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical PasswordDatabase Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
 
GRAS
GRASGRAS
GRAS
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
Gloves And Goggles Part 2
Gloves And Goggles Part 2Gloves And Goggles Part 2
Gloves And Goggles Part 2
 
Using Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by Intel
Using Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by IntelUsing Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by Intel
Using Sectra Pathology Viewer with the Microsoft Surface Pro 3 powered by Intel
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
Published_Papers
Published_PapersPublished_Papers
Published_Papers
 
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET-  	  Enhanced Look Based Media Player with Hand Gesture RecognitionIRJET-  	  Enhanced Look Based Media Player with Hand Gesture Recognition
IRJET- Enhanced Look Based Media Player with Hand Gesture Recognition
 
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORMDMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
DMIA: A MALWARE DETECTION SYSTEM ON IOS PLATFORM
 
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
A Novel Scheme for Mutual Authentication and Cheating Prevention in Visual Cr...
 

Viewers also liked (20)

Dh36649653
Dh36649653Dh36649653
Dh36649653
 
Dr36712714
Dr36712714Dr36712714
Dr36712714
 
Dv36730734
Dv36730734Dv36730734
Dv36730734
 
Cv36581586
Cv36581586Cv36581586
Cv36581586
 
D362130
D362130D362130
D362130
 
Cs36565569
Cs36565569Cs36565569
Cs36565569
 
Cx36595601
Cx36595601Cx36595601
Cx36595601
 
Ct36570573
Ct36570573Ct36570573
Ct36570573
 
Bt36430432
Bt36430432Bt36430432
Bt36430432
 
By36454458
By36454458By36454458
By36454458
 
Bz36459463
Bz36459463Bz36459463
Bz36459463
 
Bw36444448
Bw36444448Bw36444448
Bw36444448
 
De36636639
De36636639De36636639
De36636639
 
Dl36675677
Dl36675677Dl36675677
Dl36675677
 
Dd36630635
Dd36630635Dd36630635
Dd36630635
 
Dj36661666
Dj36661666Dj36661666
Dj36661666
 
Df36640644
Df36640644Df36640644
Df36640644
 
Dg36645648
Dg36645648Dg36645648
Dg36645648
 
Makalah ip
Makalah ipMakalah ip
Makalah ip
 
Dk36667674
Dk36667674Dk36667674
Dk36667674
 

Similar to Dm36678681

Mobile Application Development -Lecture 09 & 10.pdf
Mobile Application Development -Lecture 09 & 10.pdfMobile Application Development -Lecture 09 & 10.pdf
Mobile Application Development -Lecture 09 & 10.pdfAbdullahMunir32
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorIRJET Journal
 
Synapseindia android application development tutorial
Synapseindia android application development tutorialSynapseindia android application development tutorial
Synapseindia android application development tutorialSynapseindiappsdevelopment
 
Synapseindia android apps development tutorial
Synapseindia android apps  development tutorialSynapseindia android apps  development tutorial
Synapseindia android apps development tutorialSynapseindiappsdevelopment
 
Android studio feature
Android studio featureAndroid studio feature
Android studio featurexvier3453
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websitesMike Taylor
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
Assistance Application for Visually Impaired - VISION
Assistance Application for Visually  Impaired - VISIONAssistance Application for Visually  Impaired - VISION
Assistance Application for Visually Impaired - VISIONIJSRED
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureeSAT Publishing House
 
I03402059063
I03402059063I03402059063
I03402059063theijes
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphicalKamal Spring
 
Real-time Text Audio to Video PPT Converter Tablet App
Real-time Text Audio to Video PPT Converter Tablet AppReal-time Text Audio to Video PPT Converter Tablet App
Real-time Text Audio to Video PPT Converter Tablet AppMike Taylor
 
Android tutorial for beginners-traininginbangalore.com
Android tutorial for beginners-traininginbangalore.comAndroid tutorial for beginners-traininginbangalore.com
Android tutorial for beginners-traininginbangalore.comTIB Academy
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
 

Similar to Dm36678681 (20)

Mobile Application Development -Lecture 09 & 10.pdf
Mobile Application Development -Lecture 09 & 10.pdfMobile Application Development -Lecture 09 & 10.pdf
Mobile Application Development -Lecture 09 & 10.pdf
 
Android Application For Decentralized Family Locator
Android Application For Decentralized Family LocatorAndroid Application For Decentralized Family Locator
Android Application For Decentralized Family Locator
 
Synapseindia android application development tutorial
Synapseindia android application development tutorialSynapseindia android application development tutorial
Synapseindia android application development tutorial
 
Synapseindia android apps development tutorial
Synapseindia android apps  development tutorialSynapseindia android apps  development tutorial
Synapseindia android apps development tutorial
 
Android studio feature
Android studio featureAndroid studio feature
Android studio feature
 
Password security system for websites
Password security system for websitesPassword security system for websites
Password security system for websites
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
Assistance Application for Visually Impaired - VISION
Assistance Application for Visually  Impaired - VISIONAssistance Application for Visually  Impaired - VISION
Assistance Application for Visually Impaired - VISION
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
Detect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructureDetect and immune mobile cloud infrastructure
Detect and immune mobile cloud infrastructure
 
I03402059063
I03402059063I03402059063
I03402059063
 
Shoulder surfing resistant graphical
Shoulder surfing resistant graphicalShoulder surfing resistant graphical
Shoulder surfing resistant graphical
 
I018145157
I018145157I018145157
I018145157
 
Real-time Text Audio to Video PPT Converter Tablet App
Real-time Text Audio to Video PPT Converter Tablet AppReal-time Text Audio to Video PPT Converter Tablet App
Real-time Text Audio to Video PPT Converter Tablet App
 
Android tutorial for beginners-traininginbangalore.com
Android tutorial for beginners-traininginbangalore.comAndroid tutorial for beginners-traininginbangalore.com
Android tutorial for beginners-traininginbangalore.com
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Dm36678681

  • 1. Vedavyas. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Authentication in Android Smart Phones Using Gestures and Security Pin Vedavyas. M1, Kumara Swamy. P2 1( M.Tech in CSE Dept , SR Engineering College Warangal, ANDHRA PRADESH, INDIA) Assistant Professor in CSE Dept, SR Engineering College Warangal, ANDHRA PRADESH, INDIA) 2( Abstract Due to the innovations in Mobile technologies, Gestures play an important role for the Authentication in the mobile devices. With increasing popularity of the Authentications, the security risks are also growing and that is evident in the incidents of UnAuthentication in terms of various kinds. Therefore it is essential to have a mobile based Authentication system for security. Gestures allow users to interact with your app by manipulating the screen objects you provide. Security systems are rapidly being developed, as well as solutions such as remote control systems. However, even with these solutions, major problems could still result after a mobile device is lost. In this thesis, we present our upgraded Lock Screen system, which is able to support authentication for the user’s convenience and provide a good security system for smartphones. We also suggest an upgraded authentication system for Android smartphones. KeyWords: - Gestures, Intents, Shared Preferences, Intent, Home Launchers I. INTRODUCTION II. RELATED WORK The devices most often used for IT services are changing from PCs and laptops to smart phones and tablets. These devices need to be small for increased portability. These technologies are convenient, but as the devices start to contain increasing amounts of important personal information, better security is required. Security systems are rapidly being developed, as well as solutions such as remote control systems. However, even with these solutions, major problems could still result after a mobile device is lost. In this thesis, we present our upgraded Lock Screen system, which is able to support authentication for the user's convenience and provide a good security system for smart phones. We also suggest an upgraded authentication system for Android smart phones. ADW Launcher is Home Screen launcher to change the screen. This paper is to review the various studies that have explored the technical and legal issues associated with change the home screen of particular user. Users can download Home Launchers from the Android Market; the most commonly used ones are ADW Launcher, Launcher Pro, and GO Launcher. These systems provide convenience but not good security. Mobile technologies and learning is primarily considered personal portable technologies. This review advocates an activity-focused perspective on the use of mobile technologies authentication for user. Reference to both emerging trends in mobile technology and learning research, we speculate on the future of mobile technologies and learning the implications this will have. The Gestures Authentication in Android page flow 1. Dialog -> Save Email -> Shared Preferences 2. Enter Gesture -> Add and Edit Gestures -> Save in Spells.xml 3. User Mode -> Keep Signature using gestures -> Limited Access to Apps 4. Admin Mode -> Keep Signature using gestures -> Can Access to all Apps ->Add permission to user 5. Email-> Signature and the Code www.ijera.com III. PROPOSED WORK 1. We will analyze the problems with the current Home Launchers, Lock Screens and suggest an upgraded authentication system for Android smart phones. 2. The recorded pattern is send for the user mail id for future assistance 3. We present our upgraded Lock Screen system, which is able to support authentication for the user’s convenience and provide a good security system for smart phones. Gestures are defined by binary resources which can be created with an example program from the Android SDK. In your activity you can load Gestures via Gesture Lib. From Raw Resource (). If a gesture is detected then the method "onGesturePerformedListener" is called. For this the activity must implement the interface "OnGesturePerformedListener" and must register itself at the GestureOverlayView with the method "add On Gesture Performed Listener ()". 678 | P a g e
  • 2. Vedavyas. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681 Android shows the gestures in yellow for recognized gestures and a ligher yellow for not recognized gestures. You can turn this off, via setGestureColor(Color.TRANSPARENT) or setUncertainGestureColor(Color.TRANSPARENT) on the GestureOverlayView. If you create the gesture in the Android simulator via the program "GestureBuilder". You can create several gestures with the same name. That may help you to determine the right one. If you create an Android Emulator for Android 1.6 this application will be preinstalled on your device. Make sure to create a device with sdcard otherwise you cannot save gestures. All gestures will be saved in a file called gestures on your emulator. You can copy the gestures from the emulator via the adb onto your local machine via the command: ./adb pull /sdcard/gestures ~/test The gesture file must be copied into your application under "res/raw". Afterwards it can be used in your GestureOverlayView. IV. PROBLEM DEFINITION AND ASSUMPTIONS Authentication is essential in Mobiles. How can we provide the authentication for the mobile devices? Because the biometric is work properly with the mobile devices which use android. How can we manage the Employees in an organization in a compact way? The problem of Authentication is solved by using gestures instead of the biometric and the compact version of employees can be managed by using the Employee details. In Employee details look for employees by name, view their details, add them to your contacts, and see their manager and direct reports, as well as call, text, or email them. v. GESTURES DETECTION ALGORITHM A. Creating a View : Gesture View An easy way to get a Canvas object to drawing on is by overriding the onDraw() method of a View object. Conveniently, this method has a single parameter: the Canvas object. Drawing a Bitmap graphic on a Canvas object is as easy as calling the drawBitmap() method of the Canvas object. www.ijera.com GestureListener object as specific gesture or other motion callbacks. The GestureListener object, a class we implement, receives these calls for specific gestures that the GestureDetector recognizes and allows us to react to them as we see fit (in this case, to move a graphic around within our PlayAreaView). Although the GestureDetector handles the detection of certain motions, it doesn’t do anything specific with them nor does it handle all types of gestures. Fig.2 Shows GestureView Constructor C. Connecting to a Gesture Detector GestureDetector object receives the motion data it needs to do its gesture recognizing magic. GestureDetector object called gestures to receive events. Fig.3 Shows Gesture Detection Object D. Implementing the Gesture Listener In order to react to the events recognized by the GestureDetector class, we need to implement the GestureListener class. The motion events we are most interested in are double taps and gestures of any kind. To listen for these types of motion events, our GestureListener class must implement both the OnGestureListener and OnDoubleTapListener interfaces. Fig.4 shows Gesture Listener Fig.1 Shows How to create a Gesture View B. Configuring the Gesture View A GestureDetector is an Android class that can take motion events, do some mathematical magic to determine what they are, and then delegate calls to a www.ijera.com E. Handling Motion Events A scroll event occurs when the user touches the screen and then moves their finger across it. This gesture is also known as a drag event. This event comes in through the onScroll() method of the OnGestureListener interface. 679 | P a g e
  • 3. Vedavyas. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681 www.ijera.com Each and every Employee will have a particular signature. Based on the signature the employee login. The Employee signatures are added by the Admin. b. User Login Fig.5 Shows onScroll() F. Shared Preferences The Shared Preferences class provides a general framework that allows you to save and retrieve persistent key-value pairs of primitive data types. You can use Shared Preferences to save any primitive data: Booleans, floats, ints, longs, and strings. This data will persist across user sessions (even if your application is killed). Shared preferences are not strictly for saving "user preferences," such as what ringtone a user has chosen. If you're interested in creating user preferences for your application, Preference Activity, which provides an Activity framework for you to create user preferences, which will be automatically persisted (using shared preferences). To get a Shared Preferences object for your application, use one of two methods:  getSharedPreferences() - Use this if you need multiple preferences files identified by name, which you specify with the first parameter.  getPreferences() - Use this if you need only one preferences file for your Activity. Because this will be the only preferences file for your Activity, you don't supply a name. To write values: 1. Call edit() to get a SharedPreferences.Editor. 2. Add values with methods such as putBoolean() andputString(). 3. Commit the new values with commit() To read values, use SharedPreferences methods such as getBoolean() and getString().. V. IMPLEMENTATION A. Admin a. Add Gesture The admin has the permission to add the Gesture signature of all the Employees and can view all the details of the employee. Fig. 7 Login of the User If the Employee Login Gesture Signature is correct then the Employee will be redirected to the next page where the employee can view the other employee details along with their details and their manager. c. On/Off Broadcast receiver The Lock Screen consists of activities, so it is included in the Home Launcher application package. The Screen receives the “On/Off Broadcast Receiver” so it is processed with Intent from Screen-On, activating the Lock Screen Activity. d. Lock Screen Activity The Lock Screen Activity consists of Password settings and, to unlock the screen, a password must first be entered. After setting the password, two options are available: a user can either enter the password or shake the mobile phone. The User mode can be entered by entering the password; the Guest mode can be entered by using the acceleration sensor (shaking). e. User Mode and Guest Mode Binding the Home key is different in Guest mode than it is in User mode. If the Home key button is entered in the Lock Screen, the Guest mode is automatically entered and the user can only use a few allowable applications. Fig.6 Adding the Signature www.ijera.com f. Email pattern to mail In the Home Launcher application, there are five slides and declared icons with widgets. The user can make widgets, icons, folders, and setting slides through various kinds of touches (touch, long-click, 680 | P a g e
  • 4. Vedavyas. M et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.678-681 www.ijera.com drag, home button, and menu button). If there are any changes or User/Guest processes, Home Launcher reorganizes the view. VI. CONCLUSION A In this thesis, we analyzed the problems in current HomeLaunchers’ Lock Screens and suggested improving the authentication systems for Android smartphones. By dividing the mode of entry into the authentication system, we improved the user’s convenience and security power. Android is being installed in tablets and many other IT devices that require good security systems. The use of our improved authentication system ensures protection of personal information. REFERENCES [1] [2] [3] [4] [5] [6] [7] ADW Launcher, AnderWeb, http://jbthemes.com/anderweb/ LauncherPro, http://www.launcherpro.com/ Go Launcher, Go Dev Team, http://www.goforandroid.com/ DAI-Labor, “Malicious Software for Smartphones,” Technical Report, 2008. Ken Dunham, “Mobile Malware Attacks and Defense,” SYNGRESS 2009, 2009 Android Security Overview, Android open source project, http://source.android.com/tech/security/index .html Atrix, Motorola, http://www.motorola.com M.Vedavyas received the B.Tech Degree in Computer Science & Engineering from Ganpathy Engineering College, A.P, India. Currently doing M.tech in Computer Science & Engineering at SR Engineering College, Warangal, India. P.Kumara swamy he has 8 Years of Teaching Experience. His areas of interest are Information security. He has published papers in International Journal, International Conference and National Conference and attended nearly 5 National Workshops/FDP/Seminars etc. www.ijera.com 681 | P a g e