SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1320
SECRET LOCK – ANTI THEFT: INTEGRATION OF APP LOCKER &
DETECTION OF THEFT USING USER PATTERN
Kavitha.G1, KongaraDevipriya2, SivaSankari.S3, Deepa.J4
1Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
2 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
3 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
4Assistant Professor, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper presents the various methods to
secure or lock the mobile using user authentication. User will
add multiple apps into our application for the secured access.
At the time of registration, our application can frame a group
of normal queries along with the user runtime verification as
per the planned system. If the mobile is robbed, there's only a
pair of choices, either to alter the SIM card or to hold identical
SIM card and check out to use the apps. If SIM card is
modified then naturally GPS, Voice recorder & Camera are
initiated, so Location and Audio uplink are sent as SMS to the
backup number of the user, and photograph is mailed. If he
tries to use the private apps then system can question theuser
with five random queries (three from traditional queriesanda
pair of from user runtime pattern). If not licensed then
camera, GPS & Voice recorder is initiated and sent to the first
user to track.
Key Words: Authentication,SIMcard,GPS,LocationTracing,
Audio uplink, SMS, Runtime pattern, Track
1. INTRODUCTION
Many net applications give secondary authentication
strategies, i.e., secret queries (or parole recovery questions),
to reset the account parole once a user’sloginfails.However,
the answers to several such secret queries will be simply
guessed by a colleague or exposed to a trespasser that has
access to public on-line tools (e.g., on-line social networks);
furthermore, a user could forget her/his answers long when
making the private queries. Today’s prevalence of
smartphones has granted us newopportunitiestowatchand
perceive however the private knowledge collected by
smartphone sensors and apps will ease to produce
personalized secret queries without violating the users’
privacy concerns.
This paper present a Secret-Question based
Authentication system, known as “Secret-QA”, that makes a
collection of secret queries on basic of people’s smartphone
usage. We expand a model on Android smartphones, and
evaluate the safety of the private queries by asking the
acquaintance/intruder who participates inouruserstudyto
guess the answers with and without the support of on-line
tools; in the meantime, we observe the queries’
dependableness by asking participants to answer their own
questions. Our experimental results affirm that the private
queries associated with motion sensors, calendar, app
instalment, and a part of legacy app usage history (e.g.,
phone calls) have the most effective memorability for users
as well as the highest strength to attacks.
This paper proposes a new approach to theft detection
with the use of user patterns with a Global Positioning
System (GPS) along with Short Message Service (SMS)
properties which helps in tracking the snatched mobile. The
method used is the SVM (Support Vector Machine) for User
Identification property.
2. BACKGROUND AND RELATED WORK
Cognitive passwordsarebasedonpersonal facts,interests
and opinions that are probably to be simply recalled by a
user and suggests their use as a method to overcome the
dilemma of passwords that are either difficult to remember
or that can easily be guessed. Passwords are selected by
users, giving them a higher degree of recall than traditional
system generated or user-selected passwords. User
authentication through cognitive passwords is an extension
of traditional password usage. It suggests the use of fact and
opinion-based cognitive data, that is known only to theuser,
as an authentication mechanism [1]. Recall and guessing
rates for conventional, cognitive, and word association
passwords were compared using 86 Massey University
undergraduates. Respondents completed a questionnaire
covering all three parole types,returningtwo weekslater for
a recall test. Each respondent also nominated a “significant
other” parent, partner, etc. who tried to predict the
respondent’s answers.
On average, cognitive items produced the highest recall
rates (80%) but the guessing rate was also high (39.5%).
Word associations produced low predicting rates (7%) but
response words were poorly recalled (39%) Nevertheless,
both cognitive items and word associations showed
sufficient promise as password techniques to warrant
further investigation [3]. They studywasa partial replication
and extension of earlier research [7,8] on two such
techniques, using cognitiveitemsandwordassociations. The
cognitive items were similar to those used by Zviran and
Haga [1].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1321
Face-Cloak, a design that protects user privacy on a social
networking site by shielding a user’s personal information
from the site and from other users that weren't expressly
authorized by the user. It improves usability and deploy-
ability of solution [7]. A method of personalizing cognitive
passwords to each user, to close this loophole, and check its
performance against rigid cognitive passwords [8]. A
framework for designing user authentication systems with
challenge questions that includes privacy, security, and
usability criteria for evaluating a candidate challenge-
question system. The proposed challenge-question system
for improving user credentials is based on this framework.
User Identification and Recovery—are related to user
authentication. Prior to obtaining a password or other
credential for later account access, a user is typically
identified by the account manager. The passwordsupportsa
user’s further secure access. However, if a user loses or
forgets his or her parole, there must be a form of user
recovery, which could involve repetition of the original
identification process. It offers a candidate framework for
designing challenge-question systems, providing a
classification for various question and answer types and
discuss how they should meet certain privacy, security, and
usability criteria [2].
Authentication mechanisms designed it to reduce
vulnerability to statistical guessing attacks, responses could
be penalized in proportion to their popularity. This could
limit attackers to two or three popular answers [4]. Two
such major factors are web browser and GPS services. Both
of these functionalitiesarealreadyimplementedbutareonly
in the hands of makers not in the hands of users due to
proprietary problems, the system doesn’t allow the user to
use the mobile hardware directly. From the available GIS
processing tools in Android we can realize all three kinds of
LBS services as a mobile can be configured as a server and
for that we can also use the SQLite database [6].
We explored the Android Operating System (OS) and
software development setting and evaluated several of its
capabilities by constructing a working application. This
application collected speedandlocationdata fromtheGlobal
Positioning System (GPS) receiver, used the Google Maps
Application Programming Interface (API). It combines both
the GPS data and google search services [5]. A quasi-
interferometric technique is formeasuringtheflighttimesof
signals broadcast by global system for mobile
communication [9]. Enabling end users to easily
communicate sensitive data online was a significant
milestone in the development of today’s net, and,arguably,a
necessary condition for its explosive growth [10].
Such existing proposals serve as a good dawn of using
one’s short-term activities to form secret queries as well as
trying different question types. Since the smart phone has
become one’s most indivisible device of recording his life,
this paper presents a user authentication system Secret-QA
to study on how one’s short-term history—almost all types
of one’s activities wise to the smartphone—can benefit the
safety and reliability of private queries and theft detection
using user pattern. Meanwhile, we check the attack
robustness of using a mixture of many lightweightquestions
(true/false, multiple-choice) than using the blank-fillings,to
strike a balanced trade-off between security (and/or
reliability) and usability.
3. ARCHITECTURE
The key design is hierarchy based structure that has been
confirmed to be adept in app locker and theftdetection.This
technique will take benefit of all ancient techniques for
securing and protecting the mobile using many styles of
paroles. During this system, to show that the private queries
associated with motion sensors, last charged time, call log
and additionally the queries based on gallery photos. We are
implementing this application as phone theft detection and
hindrance of necessary apps access. Furthermore, they’re
high dependability and security and that they can easily
track the mobile. Theycanautomatically start voice recorder
and image capturing. The architecture of the proposed
system is illustrated in figure 1
Fig-1: Architecture Diagram
3.1. METHODOLOGIES
In Proposed system to enhance the performance of the
app we use four methodologies like
i) SVM (Support Vector Machine)
ii) GPS (Global Positioning System)
iii) SMS (Short Message Service)
iv) E-mail
i) SVM (Support Vector Machine)
Support Vector Machine (SVM) is a directed machine
learning algorithmic rule which might be used for both
classification or regression challenges. However, it’s largely
used in classification issues. During this algorithmicrule,we
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1322
plot each data item as a point in n-dimensional space(where
n is number of features you have) with the worth of each
feature being the value of a particular coordinate. Then,
we do classification by finding the hyper-planethatseparate
the two classes very well (look at the below
snapshot).
Fig-2: Support Vectors in SVM
ii) GPS (Global Positioning System)
GPS (Global Positioning System) is a network of orbiting
satellites that send exact details of their position in space
back to earth. The signals are obtained by GPS receivers,like
navigation devices and are used to calculate the precise
position, speed and time at the vehicles location. There are
three components to a GPS system: a constellation of
between 24 and 32 solar-powered satellites orbiting the
earth in orbits at an altitude of roughly 20000 kilometers, a
master control station and four control and monitoring
stations (on Hawaii, Ascension Islands, Diego Garcia and
Kawajale) and GPS receivers.
A GPS receiver uses trilateration(a morecomplexversion
of triangulation) to determine its position on the surface of
the earth by timing signals from three satellites within the
Global Positioning System. The GPS is a network of satellites
that orbit the earth and send a signal to GPS receivers
providing exact details of the receiver's location, the time of
day, and also the speed the device is moving in connectionto
the three satellites.
Fig-3: Trilateration in GPS
Each of the satellites is in an orbit that enables a receiver
to detect a minimum of four of the operational satellites. The
satellites send microwave signals to a receiver wherever the
built-in computer usesthese signalstowork outyour precise
distance from each of the four satellites and then
triangulates your precisepositionontheplanettotheclosest
few meters based on these distances. The Method of
measuring the gap from satellite to GPS receiver is based on
timed signals.
iii) SMS (Short Message Service)
SMS (Short Message Service) and also usually mentioned
as a "text message". With a SMS, you’ll send a message of up
to 160 characters to another device. Longer messages can
automatically be separate into many parts. Most cell phones
support this kind of text messaging.
iv) E-mail
Electronic mail, or email, is a technique of exchanging
digital messages between people using digital devices like
computers, tablets and mobile phones.
3.2. MODULES
The design of the proposed system consisting of four
modules based on the function accomplished:
a) User Registration with Standard Questions
b) Server
c) Runtime Analysis
d) Phone Theft Analysis
a) User Registration with Standard Questions
The Application Initial PagecontainstheUserRegistration
method. We’ll produce the User Login Page by Button and
Text Field Class in the Android.WhereasmakingtheAndroid
Application, we have to style the page by dragging the tools
like Button, Text field, and Radio Button. Once we designed
the page we have to write down the codes for each class.
Once we produce the complete mobile application, it’ll
generated as Android Platform Kit (APK) file. This APK file
are going to be put in within the User’s Mobile as an
Application. Using this APK user are going to be registering
with the server by adding alternative mobile number &
Email ID. User’s IMSI number is additionally capturedbythe
server and also register the standardquestionsandanswers.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1323
Fig-4: Screenshot of Registration Page
Fig-5: Screenshot of Registration Process
Fig-6: Screenshot of 1st Static Question
Fig-7: Screenshot of 2nd 3rd & 4th Static Questions
b) Server
The Server will communicate with their Mobile by GPRS
(General Packet Radio Service) and GPS (Global Positioning
System). User will be initially registering withtheserverand
server can track the user with user’s IMSI (International
Mobile Subscriber Identity) number. Server additionally
preserve last activities of the mobile like last charge time,
last call, etc.,
Fig-8: Screenshot of Runtime Process
Fig-9: Screenshot of Pin Setting
c) Runtime Analysis
In this module, we will style the run time analysis. Once
your mobile is snatched, sniper cangetaccesstoyourmobile
and try to get access to your application. At the time, our
application can raise some set of queries based on run time
patterns. So, a sniper unable to answer the queries.
Fig-10: Screenshot of Invalid Pin
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1324
Fig-11: Screenshot of 1st Question after Invalid Pin
Fig-12: Screenshot of 2rd Question after Invalid Pin
Fig-13: Screenshot of 4th Question after Invalid pin
Fig-14: Screenshot of 5th Question after Invalid Pin
d) Phone Theft Analysis
In this module, we are going to produce phone theft
analysis. At the time of registration, user register the
standard queries. If the phone is snatched, camera is
initiated and photo is taken so anonymous person is
captured by the android application. This photo is
uploaded to the main server. Once the photo is uploaded to
the server, that link is captured and send as SMS alert to the
alternate number of the first user. Apart from the photo
capturing event anonymous person’s voice is also recorded
for better recognition of that person. Once the audio is
captured that file is sent as E-mail to the first user’s E-mail
Id. Original user will transfer that audio file and might hear
the voice of the anonymous person.
Fig-15: Screenshot of SMS Alert to Alternate Number
Fig-16: Screenshot of E-mail Alert to first user
4. RESULT
In the flimsy, “UnderstandingSmartphone Sensorand App
Data for Enhancing the Security of Secret Questions”present
a Secret-Question based Authentication system, referred to
as “Secret-QA”, We produce a group of queries based on the
data associated with sensors and apps, that show the users’
short activities and smart phone usage. During this system,
the private queries associated with motion sensors, last
charged time and a part of legacy apps (call) have the most
effective performance in terms of memorability and the
attack resilience.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1325
In our paper, “Secret Lock - Anti Theft: Integration of App
Locker and Detection of Theft using User Patterns”
we offer all the options afforded in ourbasepaperysimilarly
our app can raise the private queries associatedwithmotion
sensors, last charged time, call log and additionally the
queries based on gallery photos. This App will help to
improve the protection of secret queries without violating
the users and make a group of queries based on the data
related to sensors and apps, that show the users’ short
activities and smart phone usage except this the most
thought concerned is
1. ANTI THEFT, the process of pursuing our mobile
once it’s being snatched by someone.
2. It simply captures the image in addition to it can
record the voice of the one that ever try and use the
data that is locked by thisapp.Apartfromrecording
and taking the image, it will simply transfer it
within the server and send the link to the E-mail id
and to the alternate number.
Hereby, it’s very clear that this paper has several advanced
features than the opposite papers and it provides higher
performance and have a most chance to catchthesniperand
it helps the mobile user to feel secured and preserve their
own privacy.
5. CONCLUSION
In this paper, we tend to commenced a Secret-Question
based Authentication system, known as “Secret-QA”, and
conduct a user study to grasp what proportion the private
knowledge collected by smart phone sensors and apps
will help in improving the safety of secret queries without
violating the users’ privacy. We produce a group of queries
based on the data associated with sensors and apps, that
show the users’ short activities and smart phone usage. We
tend to measure the dependability of those queriesbyasking
participants to answer these question, furthermore as
launching the acquaintance/stranger guessing attacks with
and without the help of on-line tools, and that we are
considering establishing a probabilistic model based on
a large scale of user knowledge to characterize the safety of
the private queries In our experiment, the set of secret
queries which are associated with motion sensors, last
charged time, call log and additionally the queries based on
gallery photos have the best performance in terms
of memorability and the attack resilience, which outplaythe
conventional secret-question based approaches that are
created based on a user’s long history/information.
6. FUTURE ENHANCEMENT
In the future system, Android Application is
developed within which user’s Hand Waving Pattern is
recorded & continual the above action for more times until
the Application registers user’s Pattern.
REFERENCES
[1] M. Zviran and W. J. Haga, “User authentication by
cognitive passwords: an empirical assessment,” in
Information Technology, 1990.’Next Decade in
Information Technology’, Proceedings of the 5th
Jerusalem Conference on (Cat. No. 90TH0326-9). IEEE,
1990, pp. 137–144.
[2] M. Just, “Designing and Evaluating Challenge-Question
Systems” in IEEE Security & Privacy, IEEE, 2004, pp. 32-
39.
[3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective
computer security: Cognitive and associative
passwords,” in Computer-Human Interaction, 1996.
Proceedings., Sixth Australian Conference on. IEEE,
1996, pp. 304–305.
[4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret.
measuring the security and reliability of authentication
via secret questions,” in S & P., IEEE. IEEE, 2009, pp.
375–390.
[5] J. Whipple, W. Arensman, and M. S. Boler, “A public
safety application of GPS-enabled smartphones and the
android operating system,” in Proc. IEEE Int. Conf. Syst.,
Man Cybernet., 2009, pp. 2059–2061.
[6] S. Kumar, M. A. Qadeer, and A. Gupta, “Location based
services using android (lbsoid),” in Proc. IEEE Int. Conf.
Internet Multimedia Services Ar chit. Appl.,2009,pp.1–
5.
[7] W. Luo, Q. Xie, and U. Hengartner, “Face Cloak: An
architecture for user privacyonsocial networkingsites,”
in Proc. Int Conf. Computer. Sci. Eng., IEEE, 2009, vol. 3,
pp. 26–33.
[8] Liar Lazaro, Omer Tsiolkovsky, Chanan Glezer, Moshe
Zviran, “Personalized cognitive passwords: an
exploratory assessment”, in InformationManagement&
Computer Security, Vol. 19 No. 1, 2011 pp. 25-41.
[9] R. Faragher and P. Duffett-Smith, “Measurements of the
effects of multipath interference on timing accuracyina
cellular radiopositioningsystem,”Radar,SonarNavigat.,
IET, vol. 4, no. 6, pp. 818–824, Dec. 2010.
[10] J. Clark and P. van Oorschot, “Soc: Ssl and https:
Revisiting past challenges and evaluating certificate
trust model enhancements,” in Proc. IEEE Symp.
Security Privacy, May 2013, pp. 511–525.

More Related Content

What's hot

Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)CSCJournals
 
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...1crore projects
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication SystemIRJET Journal
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolIJERD Editor
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationKumar Goud
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDIJNSA Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...eSAT Publishing House
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET Journal
 
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALSECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALcscpconf
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeCSCJournals
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computingeSAT Publishing House
 

What's hot (20)

Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
 
Kg2417521755
Kg2417521755Kg2417521755
Kg2417521755
 
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...
 
Generic Authentication System
Generic Authentication SystemGeneric Authentication System
Generic Authentication System
 
M-Pass: Web Authentication Protocol
M-Pass: Web Authentication ProtocolM-Pass: Web Authentication Protocol
M-Pass: Web Authentication Protocol
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Ijsrdv8 i10355
Ijsrdv8 i10355Ijsrdv8 i10355
Ijsrdv8 i10355
 
Ijeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web applicationIjeee 51-57-preventing sql injection attacks in web application
Ijeee 51-57-preventing sql injection attacks in web application
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
 
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORDAN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
AN EFFICIENT IDENTITY BASED AUTHENTICATION PROTOCOL BY USING PASSWORD
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...Count based hybrid graphical password to prevent brute force attack and shoul...
Count based hybrid graphical password to prevent brute force attack and shoul...
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
Survey mobile app
Survey mobile appSurvey mobile app
Survey mobile app
 
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
IRJET - Cross-Site Scripting on Banking Application and Mitigating Attack usi...
 
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTALSECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
SECURITY ANALYSIS ON PASSWORD AUTHENTICATION SYSTEM OF WEB PORTAL
 
Classification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision TreeClassification of Malware Attacks Using Machine Learning In Decision Tree
Classification of Malware Attacks Using Machine Learning In Decision Tree
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
Single sign on mechanism for distributed computing
Single sign on mechanism for distributed computingSingle sign on mechanism for distributed computing
Single sign on mechanism for distributed computing
 

Similar to Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern

A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxSarvaniShettigar
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using SmartphonesIRJET Journal
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240Sakshi Jain
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Securityijtsrd
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationIRJET Journal
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login SessionIRJET Journal
 
Running head Project Plan .docx
Running head Project Plan                                        .docxRunning head Project Plan                                        .docx
Running head Project Plan .docxtoltonkendal
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesIRJET Journal
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationPeter Choi
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET Journal
 
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityKamal Spring
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemIJSRD
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 

Similar to Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern (20)

A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGA SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Graphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptxGraphical Password Authentication ppt.pptx
Graphical Password Authentication ppt.pptx
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
IRJET- Autobiographical Fallback Authentication using Smartphones
IRJET-  	  Autobiographical Fallback Authentication using SmartphonesIRJET-  	  Autobiographical Fallback Authentication using Smartphones
IRJET- Autobiographical Fallback Authentication using Smartphones
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
NDSS_submission_240
NDSS_submission_240NDSS_submission_240
NDSS_submission_240
 
Three Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern SecurityThree Step Multifactor Authentication Systems for Modern Security
Three Step Multifactor Authentication Systems for Modern Security
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Graphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image SegmentationGraphical Password Authentication using Image Segmentation
Graphical Password Authentication using Image Segmentation
 
Continuous User Identity Verification through Secure Login Session
 	  Continuous User Identity Verification through Secure Login Session 	  Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
 
Running head Project Plan .docx
Running head Project Plan                                        .docxRunning head Project Plan                                        .docx
Running head Project Plan .docx
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
Women's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning TechniquesWomen's Maltreatment Redressal System based on Machine Learning Techniques
Women's Maltreatment Redressal System based on Machine Learning Techniques
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
 
Keystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management SystemKeystroke Dynamics Authentication with Project Management System
Keystroke Dynamics Authentication with Project Management System
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...Call Girls in Nagpur High Profile
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 

Recently uploaded (20)

High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
High Profile Call Girls Nashik Megha 7001305949 Independent Escort Service Na...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 

Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1320 SECRET LOCK – ANTI THEFT: INTEGRATION OF APP LOCKER & DETECTION OF THEFT USING USER PATTERN Kavitha.G1, KongaraDevipriya2, SivaSankari.S3, Deepa.J4 1Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu 2 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu 3 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu 4Assistant Professor, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - This paper presents the various methods to secure or lock the mobile using user authentication. User will add multiple apps into our application for the secured access. At the time of registration, our application can frame a group of normal queries along with the user runtime verification as per the planned system. If the mobile is robbed, there's only a pair of choices, either to alter the SIM card or to hold identical SIM card and check out to use the apps. If SIM card is modified then naturally GPS, Voice recorder & Camera are initiated, so Location and Audio uplink are sent as SMS to the backup number of the user, and photograph is mailed. If he tries to use the private apps then system can question theuser with five random queries (three from traditional queriesanda pair of from user runtime pattern). If not licensed then camera, GPS & Voice recorder is initiated and sent to the first user to track. Key Words: Authentication,SIMcard,GPS,LocationTracing, Audio uplink, SMS, Runtime pattern, Track 1. INTRODUCTION Many net applications give secondary authentication strategies, i.e., secret queries (or parole recovery questions), to reset the account parole once a user’sloginfails.However, the answers to several such secret queries will be simply guessed by a colleague or exposed to a trespasser that has access to public on-line tools (e.g., on-line social networks); furthermore, a user could forget her/his answers long when making the private queries. Today’s prevalence of smartphones has granted us newopportunitiestowatchand perceive however the private knowledge collected by smartphone sensors and apps will ease to produce personalized secret queries without violating the users’ privacy concerns. This paper present a Secret-Question based Authentication system, known as “Secret-QA”, that makes a collection of secret queries on basic of people’s smartphone usage. We expand a model on Android smartphones, and evaluate the safety of the private queries by asking the acquaintance/intruder who participates inouruserstudyto guess the answers with and without the support of on-line tools; in the meantime, we observe the queries’ dependableness by asking participants to answer their own questions. Our experimental results affirm that the private queries associated with motion sensors, calendar, app instalment, and a part of legacy app usage history (e.g., phone calls) have the most effective memorability for users as well as the highest strength to attacks. This paper proposes a new approach to theft detection with the use of user patterns with a Global Positioning System (GPS) along with Short Message Service (SMS) properties which helps in tracking the snatched mobile. The method used is the SVM (Support Vector Machine) for User Identification property. 2. BACKGROUND AND RELATED WORK Cognitive passwordsarebasedonpersonal facts,interests and opinions that are probably to be simply recalled by a user and suggests their use as a method to overcome the dilemma of passwords that are either difficult to remember or that can easily be guessed. Passwords are selected by users, giving them a higher degree of recall than traditional system generated or user-selected passwords. User authentication through cognitive passwords is an extension of traditional password usage. It suggests the use of fact and opinion-based cognitive data, that is known only to theuser, as an authentication mechanism [1]. Recall and guessing rates for conventional, cognitive, and word association passwords were compared using 86 Massey University undergraduates. Respondents completed a questionnaire covering all three parole types,returningtwo weekslater for a recall test. Each respondent also nominated a “significant other” parent, partner, etc. who tried to predict the respondent’s answers. On average, cognitive items produced the highest recall rates (80%) but the guessing rate was also high (39.5%). Word associations produced low predicting rates (7%) but response words were poorly recalled (39%) Nevertheless, both cognitive items and word associations showed sufficient promise as password techniques to warrant further investigation [3]. They studywasa partial replication and extension of earlier research [7,8] on two such techniques, using cognitiveitemsandwordassociations. The cognitive items were similar to those used by Zviran and Haga [1].
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1321 Face-Cloak, a design that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that weren't expressly authorized by the user. It improves usability and deploy- ability of solution [7]. A method of personalizing cognitive passwords to each user, to close this loophole, and check its performance against rigid cognitive passwords [8]. A framework for designing user authentication systems with challenge questions that includes privacy, security, and usability criteria for evaluating a candidate challenge- question system. The proposed challenge-question system for improving user credentials is based on this framework. User Identification and Recovery—are related to user authentication. Prior to obtaining a password or other credential for later account access, a user is typically identified by the account manager. The passwordsupportsa user’s further secure access. However, if a user loses or forgets his or her parole, there must be a form of user recovery, which could involve repetition of the original identification process. It offers a candidate framework for designing challenge-question systems, providing a classification for various question and answer types and discuss how they should meet certain privacy, security, and usability criteria [2]. Authentication mechanisms designed it to reduce vulnerability to statistical guessing attacks, responses could be penalized in proportion to their popularity. This could limit attackers to two or three popular answers [4]. Two such major factors are web browser and GPS services. Both of these functionalitiesarealreadyimplementedbutareonly in the hands of makers not in the hands of users due to proprietary problems, the system doesn’t allow the user to use the mobile hardware directly. From the available GIS processing tools in Android we can realize all three kinds of LBS services as a mobile can be configured as a server and for that we can also use the SQLite database [6]. We explored the Android Operating System (OS) and software development setting and evaluated several of its capabilities by constructing a working application. This application collected speedandlocationdata fromtheGlobal Positioning System (GPS) receiver, used the Google Maps Application Programming Interface (API). It combines both the GPS data and google search services [5]. A quasi- interferometric technique is formeasuringtheflighttimesof signals broadcast by global system for mobile communication [9]. Enabling end users to easily communicate sensitive data online was a significant milestone in the development of today’s net, and,arguably,a necessary condition for its explosive growth [10]. Such existing proposals serve as a good dawn of using one’s short-term activities to form secret queries as well as trying different question types. Since the smart phone has become one’s most indivisible device of recording his life, this paper presents a user authentication system Secret-QA to study on how one’s short-term history—almost all types of one’s activities wise to the smartphone—can benefit the safety and reliability of private queries and theft detection using user pattern. Meanwhile, we check the attack robustness of using a mixture of many lightweightquestions (true/false, multiple-choice) than using the blank-fillings,to strike a balanced trade-off between security (and/or reliability) and usability. 3. ARCHITECTURE The key design is hierarchy based structure that has been confirmed to be adept in app locker and theftdetection.This technique will take benefit of all ancient techniques for securing and protecting the mobile using many styles of paroles. During this system, to show that the private queries associated with motion sensors, last charged time, call log and additionally the queries based on gallery photos. We are implementing this application as phone theft detection and hindrance of necessary apps access. Furthermore, they’re high dependability and security and that they can easily track the mobile. Theycanautomatically start voice recorder and image capturing. The architecture of the proposed system is illustrated in figure 1 Fig-1: Architecture Diagram 3.1. METHODOLOGIES In Proposed system to enhance the performance of the app we use four methodologies like i) SVM (Support Vector Machine) ii) GPS (Global Positioning System) iii) SMS (Short Message Service) iv) E-mail i) SVM (Support Vector Machine) Support Vector Machine (SVM) is a directed machine learning algorithmic rule which might be used for both classification or regression challenges. However, it’s largely used in classification issues. During this algorithmicrule,we
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1322 plot each data item as a point in n-dimensional space(where n is number of features you have) with the worth of each feature being the value of a particular coordinate. Then, we do classification by finding the hyper-planethatseparate the two classes very well (look at the below snapshot). Fig-2: Support Vectors in SVM ii) GPS (Global Positioning System) GPS (Global Positioning System) is a network of orbiting satellites that send exact details of their position in space back to earth. The signals are obtained by GPS receivers,like navigation devices and are used to calculate the precise position, speed and time at the vehicles location. There are three components to a GPS system: a constellation of between 24 and 32 solar-powered satellites orbiting the earth in orbits at an altitude of roughly 20000 kilometers, a master control station and four control and monitoring stations (on Hawaii, Ascension Islands, Diego Garcia and Kawajale) and GPS receivers. A GPS receiver uses trilateration(a morecomplexversion of triangulation) to determine its position on the surface of the earth by timing signals from three satellites within the Global Positioning System. The GPS is a network of satellites that orbit the earth and send a signal to GPS receivers providing exact details of the receiver's location, the time of day, and also the speed the device is moving in connectionto the three satellites. Fig-3: Trilateration in GPS Each of the satellites is in an orbit that enables a receiver to detect a minimum of four of the operational satellites. The satellites send microwave signals to a receiver wherever the built-in computer usesthese signalstowork outyour precise distance from each of the four satellites and then triangulates your precisepositionontheplanettotheclosest few meters based on these distances. The Method of measuring the gap from satellite to GPS receiver is based on timed signals. iii) SMS (Short Message Service) SMS (Short Message Service) and also usually mentioned as a "text message". With a SMS, you’ll send a message of up to 160 characters to another device. Longer messages can automatically be separate into many parts. Most cell phones support this kind of text messaging. iv) E-mail Electronic mail, or email, is a technique of exchanging digital messages between people using digital devices like computers, tablets and mobile phones. 3.2. MODULES The design of the proposed system consisting of four modules based on the function accomplished: a) User Registration with Standard Questions b) Server c) Runtime Analysis d) Phone Theft Analysis a) User Registration with Standard Questions The Application Initial PagecontainstheUserRegistration method. We’ll produce the User Login Page by Button and Text Field Class in the Android.WhereasmakingtheAndroid Application, we have to style the page by dragging the tools like Button, Text field, and Radio Button. Once we designed the page we have to write down the codes for each class. Once we produce the complete mobile application, it’ll generated as Android Platform Kit (APK) file. This APK file are going to be put in within the User’s Mobile as an Application. Using this APK user are going to be registering with the server by adding alternative mobile number & Email ID. User’s IMSI number is additionally capturedbythe server and also register the standardquestionsandanswers.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1323 Fig-4: Screenshot of Registration Page Fig-5: Screenshot of Registration Process Fig-6: Screenshot of 1st Static Question Fig-7: Screenshot of 2nd 3rd & 4th Static Questions b) Server The Server will communicate with their Mobile by GPRS (General Packet Radio Service) and GPS (Global Positioning System). User will be initially registering withtheserverand server can track the user with user’s IMSI (International Mobile Subscriber Identity) number. Server additionally preserve last activities of the mobile like last charge time, last call, etc., Fig-8: Screenshot of Runtime Process Fig-9: Screenshot of Pin Setting c) Runtime Analysis In this module, we will style the run time analysis. Once your mobile is snatched, sniper cangetaccesstoyourmobile and try to get access to your application. At the time, our application can raise some set of queries based on run time patterns. So, a sniper unable to answer the queries. Fig-10: Screenshot of Invalid Pin
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1324 Fig-11: Screenshot of 1st Question after Invalid Pin Fig-12: Screenshot of 2rd Question after Invalid Pin Fig-13: Screenshot of 4th Question after Invalid pin Fig-14: Screenshot of 5th Question after Invalid Pin d) Phone Theft Analysis In this module, we are going to produce phone theft analysis. At the time of registration, user register the standard queries. If the phone is snatched, camera is initiated and photo is taken so anonymous person is captured by the android application. This photo is uploaded to the main server. Once the photo is uploaded to the server, that link is captured and send as SMS alert to the alternate number of the first user. Apart from the photo capturing event anonymous person’s voice is also recorded for better recognition of that person. Once the audio is captured that file is sent as E-mail to the first user’s E-mail Id. Original user will transfer that audio file and might hear the voice of the anonymous person. Fig-15: Screenshot of SMS Alert to Alternate Number Fig-16: Screenshot of E-mail Alert to first user 4. RESULT In the flimsy, “UnderstandingSmartphone Sensorand App Data for Enhancing the Security of Secret Questions”present a Secret-Question based Authentication system, referred to as “Secret-QA”, We produce a group of queries based on the data associated with sensors and apps, that show the users’ short activities and smart phone usage. During this system, the private queries associated with motion sensors, last charged time and a part of legacy apps (call) have the most effective performance in terms of memorability and the attack resilience.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1325 In our paper, “Secret Lock - Anti Theft: Integration of App Locker and Detection of Theft using User Patterns” we offer all the options afforded in ourbasepaperysimilarly our app can raise the private queries associatedwithmotion sensors, last charged time, call log and additionally the queries based on gallery photos. This App will help to improve the protection of secret queries without violating the users and make a group of queries based on the data related to sensors and apps, that show the users’ short activities and smart phone usage except this the most thought concerned is 1. ANTI THEFT, the process of pursuing our mobile once it’s being snatched by someone. 2. It simply captures the image in addition to it can record the voice of the one that ever try and use the data that is locked by thisapp.Apartfromrecording and taking the image, it will simply transfer it within the server and send the link to the E-mail id and to the alternate number. Hereby, it’s very clear that this paper has several advanced features than the opposite papers and it provides higher performance and have a most chance to catchthesniperand it helps the mobile user to feel secured and preserve their own privacy. 5. CONCLUSION In this paper, we tend to commenced a Secret-Question based Authentication system, known as “Secret-QA”, and conduct a user study to grasp what proportion the private knowledge collected by smart phone sensors and apps will help in improving the safety of secret queries without violating the users’ privacy. We produce a group of queries based on the data associated with sensors and apps, that show the users’ short activities and smart phone usage. We tend to measure the dependability of those queriesbyasking participants to answer these question, furthermore as launching the acquaintance/stranger guessing attacks with and without the help of on-line tools, and that we are considering establishing a probabilistic model based on a large scale of user knowledge to characterize the safety of the private queries In our experiment, the set of secret queries which are associated with motion sensors, last charged time, call log and additionally the queries based on gallery photos have the best performance in terms of memorability and the attack resilience, which outplaythe conventional secret-question based approaches that are created based on a user’s long history/information. 6. FUTURE ENHANCEMENT In the future system, Android Application is developed within which user’s Hand Waving Pattern is recorded & continual the above action for more times until the Application registers user’s Pattern. REFERENCES [1] M. Zviran and W. J. Haga, “User authentication by cognitive passwords: an empirical assessment,” in Information Technology, 1990.’Next Decade in Information Technology’, Proceedings of the 5th Jerusalem Conference on (Cat. No. 90TH0326-9). IEEE, 1990, pp. 137–144. [2] M. Just, “Designing and Evaluating Challenge-Question Systems” in IEEE Security & Privacy, IEEE, 2004, pp. 32- 39. [3] J. Podd, J. Bunnell, and R. Henderson, “Cost-effective computer security: Cognitive and associative passwords,” in Computer-Human Interaction, 1996. Proceedings., Sixth Australian Conference on. IEEE, 1996, pp. 304–305. [4] S. Schechter, A. B. Brush, and S. Egelman, “It’s no secret. measuring the security and reliability of authentication via secret questions,” in S & P., IEEE. IEEE, 2009, pp. 375–390. [5] J. Whipple, W. Arensman, and M. S. Boler, “A public safety application of GPS-enabled smartphones and the android operating system,” in Proc. IEEE Int. Conf. Syst., Man Cybernet., 2009, pp. 2059–2061. [6] S. Kumar, M. A. Qadeer, and A. Gupta, “Location based services using android (lbsoid),” in Proc. IEEE Int. Conf. Internet Multimedia Services Ar chit. Appl.,2009,pp.1– 5. [7] W. Luo, Q. Xie, and U. Hengartner, “Face Cloak: An architecture for user privacyonsocial networkingsites,” in Proc. Int Conf. Computer. Sci. Eng., IEEE, 2009, vol. 3, pp. 26–33. [8] Liar Lazaro, Omer Tsiolkovsky, Chanan Glezer, Moshe Zviran, “Personalized cognitive passwords: an exploratory assessment”, in InformationManagement& Computer Security, Vol. 19 No. 1, 2011 pp. 25-41. [9] R. Faragher and P. Duffett-Smith, “Measurements of the effects of multipath interference on timing accuracyina cellular radiopositioningsystem,”Radar,SonarNavigat., IET, vol. 4, no. 6, pp. 818–824, Dec. 2010. [10] J. Clark and P. van Oorschot, “Soc: Ssl and https: Revisiting past challenges and evaluating certificate trust model enhancements,” in Proc. IEEE Symp. Security Privacy, May 2013, pp. 511–525.