SlideShare a Scribd company logo
Secopy Mobile security system that
Identify persons by name or Id card
registered in the systems . The web
application is responsive to all devices.
Secopy Mobile check Software
Project Alpha
John Osundwa
Browsing members is divided in 3 catecories Male ,Female and Blacklisted all this option can only be
accesed by authorize users.

Verification by Name key in
You can verify a person by Name which maps
 Id number
 Photo
 All personal details of the subject by security personnel via mobile device
verification by id number
You can verify a person by ID NO. which maps
 Id number
 Photo
 All personal details of the subject by security personnel via mobile device
other features Control panel
 Member registration
 Upload and edit photos
 Inbuilt camera snap shot
 File manager
Requirements
This system is a multiplatform web application that can run on many
devices. Smart phones ,tablets, computers e.t.c.
We require the following:-
 Webserver with Lamp in Linux or Xampp windows server
 Web browsers Firefox, Safari ,Google ,Opera and more
 Mysql Database
 Php 5x to 7
 Apache
TESTED SUCCESSFULY ON
Android devices
Nokia
Linux Centos 6.3 Destop pc
Windows 7 laptop,desktop

More Related Content

What's hot

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
Raja Kiran
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
Rozell Sneede
 
Spyware
SpywareSpyware
Synopsis
SynopsisSynopsis
Synopsis
vaishuadigiri
 
Spyware
SpywareSpyware
Spyware
Babur Rahmadi
 
anroid based call history
anroid based call historyanroid based call history
anroid based call history
mallareddy
 
Mobile App to Store Call Log
Mobile App to Store Call LogMobile App to Store Call Log
Mobile App to Store Call Log
Mphasis
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
Osama Ghandour Geris
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?
Sphere Soc
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
New Hire Content - BlueJeansF2
New Hire Content - BlueJeansF2New Hire Content - BlueJeansF2
New Hire Content - BlueJeansF2
Carin Klock McKinney
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
Jatin Kumar
 
Ppt123
Ppt123Ppt123
Ppt123
Faiz Khan
 
Authentication
AuthenticationAuthentication
Authentication
Kelan Theriault
 
Computer virus
Computer virusComputer virus
Computer virus
Ishita Gupta
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
Soft Tech Geeks
 
Spyware
SpywareSpyware
Spyware
Farheen Naaz
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
Sina Manavi
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security Checklist
Gabriel Friedlander
 

What's hot (20)

Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
4 a module virus and spyware
4 a module virus and spyware4 a module virus and spyware
4 a module virus and spyware
 
Spyware
SpywareSpyware
Spyware
 
Synopsis
SynopsisSynopsis
Synopsis
 
Spyware
SpywareSpyware
Spyware
 
anroid based call history
anroid based call historyanroid based call history
anroid based call history
 
Mobile App to Store Call Log
Mobile App to Store Call LogMobile App to Store Call Log
Mobile App to Store Call Log
 
Types of viruses
Types of virusesTypes of viruses
Types of viruses
 
How to find a violation on the mobile device?
How to find a violation on the mobile device?How to find a violation on the mobile device?
How to find a violation on the mobile device?
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
New Hire Content - BlueJeansF2
New Hire Content - BlueJeansF2New Hire Content - BlueJeansF2
New Hire Content - BlueJeansF2
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
Ppt123
Ppt123Ppt123
Ppt123
 
Authentication
AuthenticationAuthentication
Authentication
 
Computer virus
Computer virusComputer virus
Computer virus
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
Spyware
SpywareSpyware
Spyware
 
Android Hacking + Pentesting
Android Hacking + Pentesting Android Hacking + Pentesting
Android Hacking + Pentesting
 
Small Business Cyber Security Checklist
Small Business Cyber Security ChecklistSmall Business Cyber Security Checklist
Small Business Cyber Security Checklist
 

Viewers also liked

ashik best
ashik bestashik best
ashik best
ashik chy
 
Posición del Movimiento Progresista presentada por el Senador Ricardo Monreal
Posición del Movimiento Progresista presentada por el Senador Ricardo MonrealPosición del Movimiento Progresista presentada por el Senador Ricardo Monreal
Posición del Movimiento Progresista presentada por el Senador Ricardo Monreal
AmloSi
 
Presentacion
Presentacion Presentacion
Presentacion
troymcclure
 
Invasión de carril
Invasión de carrilInvasión de carril
Invasión de carril
Cspi Periciales
 
응급영상 II (웹 교육용)(2부)
응급영상 II (웹 교육용)(2부)응급영상 II (웹 교육용)(2부)
응급영상 II (웹 교육용)(2부)
jeongjoo
 
Cegedim event gesundheitskommunikation-jan_2014
Cegedim event gesundheitskommunikation-jan_2014Cegedim event gesundheitskommunikation-jan_2014
Cegedim event gesundheitskommunikation-jan_2014
Markus Meier
 
COMO SERÁ EL NUEVO ARTE BORRÍ
COMO SERÁ EL NUEVO ARTE BORRÍCOMO SERÁ EL NUEVO ARTE BORRÍ
COMO SERÁ EL NUEVO ARTE BORRÍ
Reynaldo Charres Vargas
 
Swami Dayanand Saraswati - His Life and Teachings
Swami Dayanand Saraswati - His Life and TeachingsSwami Dayanand Saraswati - His Life and Teachings
Swami Dayanand Saraswati - His Life and Teachings
vimlapwr
 
Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)
Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)
Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)
Lakeside A/S
 
Danmarks potentiale som cirkulær økonomi
Danmarks potentiale som cirkulær økonomiDanmarks potentiale som cirkulær økonomi
Danmarks potentiale som cirkulær økonomi
Plastindustrien
 
економічні аспекти професії економіст
економічні аспекти професії економістекономічні аспекти професії економіст
економічні аспекти професії економіст
Valia Komisarenko
 
La cartografía geológico-geotécnica en los proyectos de carreteras
La cartografía geológico-geotécnica en los proyectos de carreterasLa cartografía geológico-geotécnica en los proyectos de carreteras
La cartografía geológico-geotécnica en los proyectos de carreteras
Guzmán Fuente Puente
 
Monitoring of patient in intensive care unit (ICU)
Monitoring of patient in intensive care unit (ICU)Monitoring of patient in intensive care unit (ICU)
Monitoring of patient in intensive care unit (ICU)
Raj Mehta
 
Aparatos de alumbrado
Aparatos de alumbradoAparatos de alumbrado
Aparatos de alumbrado
Jose Quintana
 
De la idea al negocio
De la idea al negocioDe la idea al negocio
De la idea al negocio
Clamilopez
 

Viewers also liked (15)

ashik best
ashik bestashik best
ashik best
 
Posición del Movimiento Progresista presentada por el Senador Ricardo Monreal
Posición del Movimiento Progresista presentada por el Senador Ricardo MonrealPosición del Movimiento Progresista presentada por el Senador Ricardo Monreal
Posición del Movimiento Progresista presentada por el Senador Ricardo Monreal
 
Presentacion
Presentacion Presentacion
Presentacion
 
Invasión de carril
Invasión de carrilInvasión de carril
Invasión de carril
 
응급영상 II (웹 교육용)(2부)
응급영상 II (웹 교육용)(2부)응급영상 II (웹 교육용)(2부)
응급영상 II (웹 교육용)(2부)
 
Cegedim event gesundheitskommunikation-jan_2014
Cegedim event gesundheitskommunikation-jan_2014Cegedim event gesundheitskommunikation-jan_2014
Cegedim event gesundheitskommunikation-jan_2014
 
COMO SERÁ EL NUEVO ARTE BORRÍ
COMO SERÁ EL NUEVO ARTE BORRÍCOMO SERÁ EL NUEVO ARTE BORRÍ
COMO SERÁ EL NUEVO ARTE BORRÍ
 
Swami Dayanand Saraswati - His Life and Teachings
Swami Dayanand Saraswati - His Life and TeachingsSwami Dayanand Saraswati - His Life and Teachings
Swami Dayanand Saraswati - His Life and Teachings
 
Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)
Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)
Lakeside arkitekturnetværk - Et kig på pace layered strategies (2015Q4)
 
Danmarks potentiale som cirkulær økonomi
Danmarks potentiale som cirkulær økonomiDanmarks potentiale som cirkulær økonomi
Danmarks potentiale som cirkulær økonomi
 
економічні аспекти професії економіст
економічні аспекти професії економістекономічні аспекти професії економіст
економічні аспекти професії економіст
 
La cartografía geológico-geotécnica en los proyectos de carreteras
La cartografía geológico-geotécnica en los proyectos de carreterasLa cartografía geológico-geotécnica en los proyectos de carreteras
La cartografía geológico-geotécnica en los proyectos de carreteras
 
Monitoring of patient in intensive care unit (ICU)
Monitoring of patient in intensive care unit (ICU)Monitoring of patient in intensive care unit (ICU)
Monitoring of patient in intensive care unit (ICU)
 
Aparatos de alumbrado
Aparatos de alumbradoAparatos de alumbrado
Aparatos de alumbrado
 
De la idea al negocio
De la idea al negocioDe la idea al negocio
De la idea al negocio
 

Similar to Secopy project A

Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
NoNameCon
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
blusmurfydot1
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
jasonlan
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
Brent Muir
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
Tyler Shields
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
Bee_Ware
 
Mobile Application Testing
Mobile Application TestingMobile Application Testing
Mobile Application Testing
Ramakrishna Telapolu
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
Tjylen Veselyj
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
jasonlan
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
Krisshhna Daasaarii
 
iPhone and iPad Security
iPhone and iPad SecurityiPhone and iPad Security
iPhone and iPad Security
Simon Guest
 
LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
InfraVision
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
Axle-IT
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
Sergey Kochergan
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
GTestClub
 
Mobile Programming LLC sample Case Studies
Mobile Programming LLC sample Case StudiesMobile Programming LLC sample Case Studies
Mobile Programming LLC sample Case Studies
Mobile Programming LLC
 
How to-choose-spy-app
How to-choose-spy-appHow to-choose-spy-app
How to-choose-spy-app
spyguy.club
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
Mohammad Khreesha
 
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
Kamal Spring
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
STO STRATEGY
 

Similar to Secopy project A (20)

Stephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposedStephanie Vanroelen - Mobile Anti-Virus apps exposed
Stephanie Vanroelen - Mobile Anti-Virus apps exposed
 
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
IT109 Microsoft Windows 7 Operating Systems Unit 07 lesson 10
 
Simplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23finalSimplify Security And Device Management Final Pres10 23final
Simplify Security And Device Management Final Pres10 23final
 
Mobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring BudgetMobile Forensics on a Shoestring Budget
Mobile Forensics on a Shoestring Budget
 
IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?IQT 2010 - The App Does That!?
IQT 2010 - The App Does That!?
 
Les 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobilesLes 10 risques liés aux applications mobiles
Les 10 risques liés aux applications mobiles
 
Mobile Application Testing
Mobile Application TestingMobile Application Testing
Mobile Application Testing
 
Mobile security services 2012
Mobile security services 2012Mobile security services 2012
Mobile security services 2012
 
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
Top 10 Security Concerns of Windows Mobile (and how to Overcome them)
 
Mobile App Security Testing -2
Mobile App Security Testing -2Mobile App Security Testing -2
Mobile App Security Testing -2
 
iPhone and iPad Security
iPhone and iPad SecurityiPhone and iPad Security
iPhone and iPad Security
 
LANDesk Mobility Manager
LANDesk Mobility ManagerLANDesk Mobility Manager
LANDesk Mobility Manager
 
Mobility manager 90
Mobility manager 90Mobility manager 90
Mobility manager 90
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Security testing of mobile applications
Security testing of mobile applicationsSecurity testing of mobile applications
Security testing of mobile applications
 
Mobile Programming LLC sample Case Studies
Mobile Programming LLC sample Case StudiesMobile Programming LLC sample Case Studies
Mobile Programming LLC sample Case Studies
 
How to-choose-spy-app
How to-choose-spy-appHow to-choose-spy-app
How to-choose-spy-app
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 
Understandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing securityUnderstandingphone sensor and app data for enhancing security
Understandingphone sensor and app data for enhancing security
 
(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013(Pptx) yury chemerkin hacker_halted_2013
(Pptx) yury chemerkin hacker_halted_2013
 

Secopy project A

  • 1. Secopy Mobile security system that Identify persons by name or Id card registered in the systems . The web application is responsive to all devices. Secopy Mobile check Software Project Alpha John Osundwa
  • 2. Browsing members is divided in 3 catecories Male ,Female and Blacklisted all this option can only be accesed by authorize users.
  • 3.  Verification by Name key in You can verify a person by Name which maps  Id number  Photo  All personal details of the subject by security personnel via mobile device
  • 4. verification by id number You can verify a person by ID NO. which maps  Id number  Photo  All personal details of the subject by security personnel via mobile device other features Control panel  Member registration  Upload and edit photos  Inbuilt camera snap shot  File manager
  • 5.
  • 6. Requirements This system is a multiplatform web application that can run on many devices. Smart phones ,tablets, computers e.t.c. We require the following:-  Webserver with Lamp in Linux or Xampp windows server  Web browsers Firefox, Safari ,Google ,Opera and more  Mysql Database  Php 5x to 7  Apache TESTED SUCCESSFULY ON Android devices Nokia Linux Centos 6.3 Destop pc Windows 7 laptop,desktop