Sie sind auf Seite 1von 6

SHORTENED TITLE SUBTITLE, LESS THAN 50 CHARACTERS

Incognito This
Securing Mobile Devices Internationally
Abroad
Trisha Rose
Joshua Moatz
University of Advancing Technology
Initial Inception Date: January 23rd, 2014 Completion Date: February 9th, 2014

SHORTENED TITLE SUBTITLE, LESS THAN 50 CHARACTERS

Abstract
The goal of most mobile devices is to keep the customer engaged and connected with all of
those around that said individual. So it comes to know surprise that there are those same
individuals out there that want to exploit these same devices to deal damage to the user. With
that said, it became apparent that a project like this needed to be conducted. The project began
with three simple but powerful objectives: protect, secure and function properly. The goal here
was to create a tiny mobile system security application that would function similar to powerful
security systems found in place on a laptop or desktop computer.
To obtain this goal, the PCDA Cycle 7 Step Process was used to help achieve what was
requested. The first three steps include: identify area for improvement, define current situation,
and analyze current situation. The fourth step helped develop the improvement theory while
step five implements the best strategies. Finally, step six and seven helped put the project in
motion for completion by monitoring results which allowed to finalize the issue by adjusting,
standardizing, or planning further. The end result allowed for the creation of the application
known as Incognito Protection voice activated mock location software that utilizes a users
mobile device and effectively creates Mock Locations using a list of places of the owners
choosing.nswers to the following questions in the Abstract (250 words or less):
a. What were the goals and objectives of the project?
b. What were the methods by which the project was completed?
c. What was created?
Keywords
Mobile, Security, Protection, Virus, Networking, Applications, Devices, Administration,
Permissions, Technology

Background Information and Prior Art


In early 2013, Edward Snowden revealed to the world that the United State Government
controlled agency, the National Security Agency (N.S.A), had indeed in fact spy on its nations
citizens through the means of technology. That technology included cell phones, laptops, and
some cases even television sets. This led to a divided nation and world as later revelations
included that the N.S.A had not just limited the spying to possible terrorists but instead on a
global scale of whoever, whenever. This revelation sparked an intense conversation about the
idea of privacy through technology and how one could protect themselves on the devices they
use. This included talks on virus or anti-penetration software.

SHORTENED TITLE SUBTITLE, LESS THAN 50 CHARACTERS

The first prospect to study was the Norton Mobile Security model provided by Symantec. It
seems to be the best model on the market at the moment, however, it was very noticeable that
system could be improved upon in several ways. The first application that jumped out was
dubbed The Scream Alarm. It would produce an alarm for the user of the device to find their
phone if it is deemed lost. This application ironically scream no to the idea presented above. If
ones phone is lost, one would not be able to find their phone using this scream application if
they are at home and left their phone at the store. It just brings unwanted attention. Secondly
the application becomes useless if Norton Mobile Security already supports remote lock, which
prevents strangers from accessing the phone or tablet. However, most mobile devices now
come already equipped with security password locks. This sort of takes away from the users
freedom to protect their own phones without the help of the company. Lastly, in fine print in the
copyright section, the device is mainly used for android devices unless otherwise specified for
iPhones or iPads. Limitation should never exist. (Copyright 2014 Symantec Corporation).1
Antivirus Security from AVG Mobile Communication presented a more simplistic option. The
program offers the following:
Scans apps, settings, files, and media in real time
Enable finding/locating your stolen or lost phone through google maps
Lock/wipe your device to protect your privacy
Kill tasks that slow your device
Browse the web safely and securely
Monitor battery, storage and data package
However, despite this protections amazing features, there is one glaring problem: it is only
meant for android devices. The service is offered through Google Play and works with Google
Maps, so it is safe to say that the service is mainly used through only google type devices as
well. This seriously limits the market use and hampers the power of product. (Google
Corporation 2014).2
The purpose of the Lock Proof Protection project is to address the mistakes these two fine
corporations created with their projects and create a successor program with added features
from what both companies have done correctly. In addition, the program will not be hampered
by being only one select technology but on all of them dealing with mobile GPS location
security. Both companies have the right idea when it comes to finding the lost phone through the
location of a mapping system online. However, it still requires the user to find a location to
access the internet from in order to find their phone and then it will permit a loud noise for
locating that phone; pretty much drawing more attention towards it. It would be more plausible to
create an application that once that keeps the phone in the users hands and focuses more on
the effects of how one can prevent being cyber stalked rather than focusing on issues of just
mere theft.
Known as Incognito This again a voice activated mock location software that utilizes a users
mobile device and effectively creates Mock Locations using a list of places of the owners
choosing. Usually this list is compiled by using the Check In feature. The Check In feature

SHORTENED TITLE SUBTITLE, LESS THAN 50 CHARACTERS

allows the mobile device to save a GPS location of the users current whereabouts. It is then
added to the Archive List as a possible candidate for the future Mock Location list. This
system will revolutionize the industry in a big way made applicable to the right people.

Project Description and Innovation Claim


Incognito This will intend to change the landscape of the mobile in a number of ways. First, it
will function as an always on application even when the device is shut off. It will utilize existing
software and selection multiple locations to be mocked. All these locations will be the users
choosing. The system will compile the all entries into a list and create a continuous cycle of real
but fake locations the user can use to evade their stalker. It will help create a paper trail of
evidence for police to follow once it becomes apparent they are showing up at all the victims
favorite places to visit. Lastly, the system will be universal across all platforms, something many
companies cannot accomplish..

Usage Scenario
Suppose you are shopping at your local retail store. After many hours of shopping, you decide
to add this store to your Mock List. You do this by activating the application and saying Your
Phone Incognito This. Your phone begins to use your GPS Location system to track your
movements and locations you visited. The more locations you add, the more choices you have
to hide in. The phone will continue to send out these realistic but fake locations in order to keep
the user safe and secure.Evaluation Criteria
Provide a description of the criteria you/your team will use to determine the usability or
usefulness of the project you will eventually prototype. Provide as many criteria as required to
assure the quality of the project; each one needs to be expressed in such a way that it is
measurable or observable. Describe the method by which the Evaluation Criteria will be tested.

Project Logic Model


Goal: To develop an enhanced mock location service and effectively shut down mobile stalking.
Activity
1. Incognito This - will establish and install itself as an application on the device but interact
similar to programs found on a computer/laptop.
1. Create a formula that allows the application to install correctly and work efficiently
2. Employ an algorithm that creates this action and establishes protection status
with access password key
2. Anti-penetration/device lock this is to prevent intrusion to the device.
1 Create a program within the application that detects intrusions and defeats them
2 A separate algorithm is established for a set key password to monitor and change the
device slightly if device happens to be penetrated.
1 Permission tasks and key assigned to the application for device user

SHORTENED TITLE SUBTITLE, LESS THAN 50 CHARACTERS

2
3

A third algorithm established for monitored scanning


Show Threat Icons shows the device owner impending threats and ability to scan for
more/remove the ones already on device.

Prototype Implementation
Describe the prototype implementation. Describe the platform on which the system will be built
and provide directions on how to run the prototype. Elaborate on the functionality of the parts
that define your project. Include imagery to illustrate, where appropriate.

Evaluation
PCDA Cycle 7 Step Process
1. Identify the area of improvement
1. Effectively improve security
2. Provide concrete and solid performance qualities
3. Engages in enhancing Mock Location Software
2. Define Current Situation
1. Improving upon existing technology with added features and more secure
techniques
3. Analyze Current Situation
1. In order to achieve goal, we must conduct tests related to that said goal
2. Define a system the works efficiently with the designs we have in mind
3. Execute multiple tests across different device models
4. Develop and Improvement Theory
1. Incognito This System
2. Identify and Confirm System
5. Implement Best Strategies
1. Create the algorithms that determine features
2. Test applications universal across multiple mobile platforms
3. Promote the advanced and new design features
1 Monitor Results
1. Identify what went right and what needs to still be improved
2. Determine how to make the system maintain efficiency
1 Adjust, Standardize, and Plan Further
1. Repeat steps until project runs effectively

Project Completion Assessment


(Complete in PRO483)

SHORTENED TITLE SUBTITLE, LESS THAN 50 CHARACTERS

Provide an in-depth description of the completed assessment of your project, based on the
results of your Evaluation, and the Goals and Objectives you set out to achieve in your Project
Logic Model. Use the Six Thinking Hats (even if you do not mention them explicitly) to help you
write a thorough analysis, describing how well the completed components function (or dont
function) and highlighting the innovative facets of your design. Be clear and honest in
composing this section. This section should conclude with a frank discussion of what steps to
complete next.

Appendices
Use the Appendices, lettered A-Z (Appendix A, Appendix B, etc.) for any pictures, images,
diagrams, charts, graphs, relevant code examples, or other supplemental texts such as game
documents or readme files, that are not included in the meat of the paper. This section will hold
all of your "pre-production" work, design planning, and any raw data from original research.
Include any prior art that was used, such as U.S. Patent Documents, Foreign Patent
Documents, or other sources.

References
Norton Security (2014) - http://buy-static.norton.com/norton/ps/1up_us_en_nms.html?
om_sem_cid=hho_sem_sy:us:ggl:en:e|kw0000010069|25716265996|c&country=US
AVG Security (2014) - https://play.google.com/store/apps/details?id=com.antivirus
PCDA Cycle 7 Step Process - http://www.mcc.edu/aqip/ap_comp_wellness/PDCA_Cycle_7Step_CQI_Process.pdf
http://leanhomebuilding.wordpress.com/2009/12/31/the-anatomy-of-pdca/
http://www2.parkland.edu/businesstraining/documents/ContinuousImprovement.pdf

Das könnte Ihnen auch gefallen