Sie sind auf Seite 1von 12

CITY ENGINEERING COLLEGE

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

ShakeUnlock: Securely Transfer Authentication


States Between Mobile Devices
Under the Guidance of Coordinators:
Prof. Manjunath R. Prof. Sowmya Naik,
HOD Dept. of CSE
BY,
PRASHANTH .D (1CE13CS075) RAUSHAN KUMAR (1CE13CS084)
POOJA .M(1CE13CS073) SWAPNA .C (1CE13CS113)
CONTENTS
INTRODUCTION

LITERATURE SURVEY

PROBLEM STATEMENT

1. EXISTING SYSTEM

2. PROPOSED SYSTEM

SYSTEM REQUIREMENT SPECIFICATION

1. HARDWARE REQUIREMENT

2. SOFTWARE REQUIREMENT
INTRODUCTION
Many people already carry multiple mobile devices such as mobile
phones, tablets, and smart watches.

Most of these devices. have access to, process and/or store sensitive
information.

Well-known examples include, but are not limited to, communications (email,
SMS, instant messaging), context information (location), access to non-public
networks (Wi-Fi, VPN), access to payment or identity management applications,
photos, documents, and even health related information (e.g. heart rate).

In addition, with the Bring your own device trend, employees start to store and
process company data on private devices To prevent attackers from gaining access
to data stored on these devices, locking and unlocking mechanisms have been
developed.

While authentication conceptually is divided into knowledge, biometrics, and


token based-authentication.
LITERATURE SURVEY
ISSUES TO BE
AUTHOR TOPIC YEAR ISSUES METHODOLOGY
SOLVED

XYS XYZ 2017 XYZ XYZ XYZ

XYZ XYZ XYZ XYZ XYZ


2017

XYZ XYZ XYZ XYZ XYZ


2017
PROBLEM STATEMENT

1. EXISTING SYSTEM

Existing unlocking approaches (Example Using PIN, password, unlock pattern, or


fingerprint) similar to these it solves not all, but parts of the problem of unlocking
mobile devices during everyday usage.

Fig 1: Unlocking Fig 2: Unlocking using Fig 3: Unlocking


using fingerprint using
pattern pin
Disadvantages of Existing System

Security is less

Efficiency is less
2. Proposed System

We proposed to conjointly shake an un-locked, mobile token device and another


mobile device Still locked to transfer the authentication state from the token
device to the other device and unlock it.

Fig 4: Front Fig 5: Back


Side Side
Advantages of Proposed System

More Secure

More Efficient
System Architecture

Fig 6: Data processing chain used in Shake-Unlock


approach.
SYSTEM REQUIREMENT
SPECIFICATION
1. HARDWARE REQUIREMENT

System : Pentium IV 2.4 GHz.

Hard Disk : 500 GB.

Ram : 4 GB

Any desktop / Laptop system with above configuration or


higher level
2. SOFTWARE REQUIREMENT

Operating system : Windows XP / 7

Coding Language : Java (Jdk 1.7)

Web Technology : Servlet, JSP

Web Server : TomCAT 7.0

IDE : Eclipse Galileo

Database : My-SQL 5.0

UGI for DB : SQLyog

JDBC Connection : Type 4 - Native Drive

Android IDE : ADT Bundle


A N K
TH U
Y O

Das könnte Ihnen auch gefallen