Secret Lock - Anti Theft: Integration of App Locker & Detection of Theft Using User Pattern

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056

Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

SECRET LOCK ANTI THEFT: INTEGRATION OF APP LOCKER &


DETECTION OF THEFT USING USER PATTERN
Kavitha.G1, KongaraDevipriya2, SivaSankari.S3, Deepa.J4
1Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
2 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
3 Student, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu
4Assistant Professor, Department of Computer Science, Panimalar Institute of Technology, Chennai, Tamil Nadu

---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - This paper presents the various methods to dependableness by asking participants to answer their own
secure or lock the mobile using user authentication. User will questions. Our experimental results affirm that the private
add multiple apps into our application for the secured access. queries associated with motion sensors, calendar, app
At the time of registration, our application can frame a group instalment, and a part of legacy app usage history (e.g.,
of normal queries along with the user runtime verification as phone calls) have the most effective memorability for users
per the planned system. If the mobile is robbed, there's only a as well as the highest strength to attacks.
pair of choices, either to alter the SIM card or to hold identical This paper proposes a new approach to theft detection
SIM card and check out to use the apps. If SIM card is with the use of user patterns with a Global Positioning
modified then naturally GPS, Voice recorder & Camera are System (GPS) along with Short Message Service (SMS)
initiated, so Location and Audio uplink are sent as SMS to the properties which helps in tracking the snatched mobile. The
backup number of the user, and photograph is mailed. If he method used is the SVM (Support Vector Machine) for User
tries to use the private apps then system can question the user Identification property.
with five random queries (three from traditional queries and a
pair of from user runtime pattern). If not licensed then 2. BACKGROUND AND RELATED WORK
camera, GPS & Voice recorder is initiated and sent to the first
user to track. Cognitive passwords are based on personal facts, interests
and opinions that are probably to be simply recalled by a
Key Words: Authentication, SIM card, GPS, Location Tracing, user and suggests their use as a method to overcome the
Audio uplink, SMS, Runtime pattern, Track dilemma of passwords that are either difficult to remember
or that can easily be guessed. Passwords are selected by
1. INTRODUCTION users, giving them a higher degree of recall than traditional
system generated or user-selected passwords. User
Many net applications give secondary authentication authentication through cognitive passwords is an extension
strategies, i.e., secret queries (or parole recovery questions), of traditional password usage. It suggests the use of fact and
to reset the account parole once a users login fails. However, opinion-based cognitive data, that is known only to the user,
the answers to several such secret queries will be simply as an authentication mechanism [1]. Recall and guessing
guessed by a colleague or exposed to a trespasser that has rates for conventional, cognitive, and word association
access to public on-line tools (e.g., on-line social networks); passwords were compared using 86 Massey University
furthermore, a user could forget her/his answers long when undergraduates. Respondents completed a questionnaire
making the private queries. Todays prevalence of covering all three parole types, returning two weeks later for
smartphones has granted us new opportunities to watch and a recall test. Each respondent also nominated a significant
perceive however the private knowledge collected by other parent, partner, etc. who tried to predict the
smartphone sensors and apps will ease to produce respondents answers.
personalized secret queries without violating the users On average, cognitive items produced the highest recall
privacy concerns. rates (80%) but the guessing rate was also high (39.5%).
This paper present a Secret-Question based Word associations produced low predicting rates (7%) but
Authentication system, known as Secret-QA, that makes a response words were poorly recalled (39%) Nevertheless,
collection of secret queries on basic of peoples smartphone both cognitive items and word associations showed
sufficient promise as password techniques to warrant
usage. We expand a model on Android smartphones, and
further investigation [3]. They study was a partial replication
evaluate the safety of the private queries by asking the
and extension of earlier research [7,8] on two such
acquaintance/intruder who participates in our user study to
techniques, using cognitive items and word associations. The
guess the answers with and without the support of on-line
cognitive items were similar to those used by Zviran and
tools; in the meantime, we observe the queries
Haga [1].

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1320
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

Face-Cloak, a design that protects user privacy on a social using user pattern. Meanwhile, we check the attack
networking site by shielding a users personal information robustness of using a mixture of many lightweight questions
from the site and from other users that weren't expressly (true/false, multiple-choice) than using the blank-fillings, to
authorized by the user. It improves usability and deploy- strike a balanced trade-off between security (and/or
ability of solution [7]. A method of personalizing cognitive reliability) and usability.
passwords to each user, to close this loophole, and check its
performance against rigid cognitive passwords [8]. A 3. ARCHITECTURE
framework for designing user authentication systems with
challenge questions that includes privacy, security, and The key design is hierarchy based structure that has been
usability criteria for evaluating a candidate challenge- confirmed to be adept in app locker and theft detection. This
question system. The proposed challenge-question system technique will take benefit of all ancient techniques for
for improving user credentials is based on this framework. securing and protecting the mobile using many styles of
User Identification and Recoveryare related to user paroles. During this system, to show that the private queries
authentication. Prior to obtaining a password or other associated with motion sensors, last charged time, call log
credential for later account access, a user is typically and additionally the queries based on gallery photos. We are
identified by the account manager. The password supports a implementing this application as phone theft detection and
users further secure access. However, if a user loses or hindrance of necessary apps access. Furthermore, theyre
forgets his or her parole, there must be a form of user high dependability and security and that they can easily
recovery, which could involve repetition of the original track the mobile. They can automatically start voice recorder
identification process. It offers a candidate framework for and image capturing. The architecture of the proposed
designing challenge-question systems, providing a system is illustrated in figure 1
classification for various question and answer types and
discuss how they should meet certain privacy, security, and
usability criteria [2].
Authentication mechanisms designed it to reduce
vulnerability to statistical guessing attacks, responses could
be penalized in proportion to their popularity. This could
limit attackers to two or three popular answers [4]. Two
such major factors are web browser and GPS services. Both
of these functionalities are already implemented but are only
in the hands of makers not in the hands of users due to
proprietary problems, the system doesnt allow the user to
use the mobile hardware directly. From the available GIS
processing tools in Android we can realize all three kinds of
LBS services as a mobile can be configured as a server and
for that we can also use the SQLite database [6].
We explored the Android Operating System (OS) and
software development setting and evaluated several of its
capabilities by constructing a working application. This
application collected speed and location data from the Global
Positioning System (GPS) receiver, used the Google Maps Fig-1: Architecture Diagram
Application Programming Interface (API). It combines both
the GPS data and google search services [5]. A quasi- 3.1. METHODOLOGIES
interferometric technique is for measuring the flight times of
signals broadcast by global system for mobile In Proposed system to enhance the performance of the
communication [9]. Enabling end users to easily app we use four methodologies like
communicate sensitive data online was a significant i) SVM (Support Vector Machine)
milestone in the development of todays net, and, arguably, a ii) GPS (Global Positioning System)
necessary condition for its explosive growth [10]. iii) SMS (Short Message Service)
Such existing proposals serve as a good dawn of using iv) E-mail
ones short-term activities to form secret queries as well as
trying different question types. Since the smart phone has i) SVM (Support Vector Machine)
become ones most indivisible device of recording his life,
this paper presents a user authentication system Secret-QA Support Vector Machine (SVM) is a directed machine
to study on how ones short-term historyalmost all types learning algorithmic rule which might be used for both
of ones activities wise to the smartphonecan benefit the classification or regression challenges. However, its largely
safety and reliability of private queries and theft detection
used in classification issues. During this algorithmic rule, we
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1321
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

plot each data item as a point in n-dimensional space (where Each of the satellites is in an orbit that enables a receiver
n is number of features you have) with the worth of each to detect a minimum of four of the operational satellites. The
feature being the value of a particular coordinate. Then, satellites send microwave signals to a receiver wherever the
we do classification by finding the hyper-plane that separate built-in computer uses these signals to work out your precise
the two classes very well (look at the below distance from each of the four satellites and then
snapshot). triangulates your precise position on the planet to the closest
few meters based on these distances. The Method of
measuring the gap from satellite to GPS receiver is based on
timed signals.

iii) SMS (Short Message Service)

SMS (Short Message Service) and also usually mentioned


as a "text message". With a SMS, youll send a message of up
to 160 characters to another device. Longer messages can
automatically be separate into many parts. Most cell phones
support this kind of text messaging.

iv) E-mail

Electronic mail, or email, is a technique of exchanging


digital messages between people using digital devices like
Fig-2: Support Vectors in SVM computers, tablets and mobile phones.

ii) GPS (Global Positioning System) 3.2. MODULES

GPS (Global Positioning System) is a network of orbiting The design of the proposed system consisting of four
satellites that send exact details of their position in space modules based on the function accomplished:
back to earth. The signals are obtained by GPS receivers, like a) User Registration with Standard Questions
navigation devices and are used to calculate the precise b) Server
position, speed and time at the vehicles location. There are c) Runtime Analysis
three components to a GPS system: a constellation of d) Phone Theft Analysis
between 24 and 32 solar-powered satellites orbiting the
earth in orbits at an altitude of roughly 20000 kilometers, a a) User Registration with Standard Questions
master control station and four control and monitoring
stations (on Hawaii, Ascension Islands, Diego Garcia and The Application Initial Page contains the User Registration
Kawajale) and GPS receivers. method. Well produce the User Login Page by Button and
A GPS receiver uses trilateration (a more complex version Text Field Class in the Android. Whereas making the Android
of triangulation) to determine its position on the surface of Application, we have to style the page by dragging the tools
the earth by timing signals from three satellites within the like Button, Text field, and Radio Button. Once we designed
Global Positioning System. The GPS is a network of satellites the page we have to write down the codes for each class.
that orbit the earth and send a signal to GPS receivers Once we produce the complete mobile application, itll
providing exact details of the receiver's location, the time of generated as Android Platform Kit (APK) file. This APK file
day, and also the speed the device is moving in connection to are going to be put in within the Users Mobile as an
the three satellites. Application. Using this APK user are going to be registering
with the server by adding alternative mobile number &
Email ID. Users IMSI number is additionally captured by the
server and also register the standard questions and answers.

Fig-3: Trilateration in GPS

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1322
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

b) Server

The Server will communicate with their Mobile by GPRS


(General Packet Radio Service) and GPS (Global Positioning
System). User will be initially registering with the server and
server can track the user with users IMSI (International
Mobile Subscriber Identity) number. Server additionally
preserve last activities of the mobile like last charge time,
last call, etc.,

Fig-4: Screenshot of Registration Page

Fig-8: Screenshot of Runtime Process

Fig-5: Screenshot of Registration Process

Fig-9: Screenshot of Pin Setting

c) Runtime Analysis

In this module, we will style the run time analysis. Once


your mobile is snatched, sniper can get access to your mobile
and try to get access to your application. At the time, our
Fig-6: Screenshot of 1st Static Question application can raise some set of queries based on run time
patterns. So, a sniper unable to answer the queries.

Fig-7: Screenshot of 2nd 3rd & 4th Static Questions Fig-10: Screenshot of Invalid Pin
2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1323
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

d) Phone Theft Analysis

In this module, we are going to produce phone theft


analysis. At the time of registration, user register the
standard queries. If the phone is snatched, camera is
initiated and photo is taken so anonymous person is
captured by the android application. This photo is
uploaded to the main server. Once the photo is uploaded to
the server, that link is captured and send as SMS alert to the
alternate number of the first user. Apart from the photo
capturing event anonymous persons voice is also recorded
for better recognition of that person. Once the audio is
captured that file is sent as E-mail to the first users E-mail
Fig-11: Screenshot of 1st Question after Invalid Pin Id. Original user will transfer that audio file and might hear
the voice of the anonymous person.

Fig-12: Screenshot of 2rd Question after Invalid Pin


Fig-15: Screenshot of SMS Alert to Alternate Number

Fig-13: Screenshot of 4th Question after Invalid pin


Fig-16: Screenshot of E-mail Alert to first user

4. RESULT

In the flimsy, Understanding Smartphone Sensor and App


Data for Enhancing the Security of Secret Questions present
a Secret-Question based Authentication system, referred to
as Secret-QA, We produce a group of queries based on the
data associated with sensors and apps, that show the users
short activities and smart phone usage. During this system,
the private queries associated with motion sensors, last
charged time and a part of legacy apps (call) have the most
Fig-14: Screenshot of 5th Question after Invalid Pin effective performance in terms of memorability and the
attack resilience.

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1324
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072

In our paper, Secret Lock - Anti Theft: Integration of App REFERENCES


Locker and Detection of Theft using User Patterns
we offer all the options afforded in our base papery similarly [1] M. Zviran and W. J. Haga, User authentication by
our app can raise the private queries associated with motion cognitive passwords: an empirical assessment, in
sensors, last charged time, call log and additionally the Information Technology, 1990.Next Decade in
queries based on gallery photos. This App will help to Information Technology, Proceedings of the 5th
improve the protection of secret queries without violating Jerusalem Conference on (Cat. No. 90TH0326-9). IEEE,
the users and make a group of queries based on the data 1990, pp. 137144.
related to sensors and apps, that show the users short
[2] M. Just, Designing and Evaluating Challenge-Question
activities and smart phone usage except this the most
Systems in IEEE Security & Privacy, IEEE, 2004, pp. 32-
thought concerned is
39.
1. ANTI THEFT, the process of pursuing our mobile [3] J. Podd, J. Bunnell, and R. Henderson, Cost-effective
once its being snatched by someone. computer security: Cognitive and associative
2. It simply captures the image in addition to it can passwords, in Computer-Human Interaction, 1996.
record the voice of the one that ever try and use the Proceedings., Sixth Australian Conference on. IEEE,
data that is locked by this app. Apart from recording 1996, pp. 304305.
and taking the image, it will simply transfer it [4] S. Schechter, A. B. Brush, and S. Egelman, Its no secret.
within the server and send the link to the E-mail id measuring the security and reliability of authentication
and to the alternate number. via secret questions, in S & P., IEEE. IEEE, 2009, pp.
375390.
Hereby, its very clear that this paper has several advanced
[5] J. Whipple, W. Arensman, and M. S. Boler, A public
features than the opposite papers and it provides higher
safety application of GPS-enabled smartphones and the
performance and have a most chance to catch the sniper and
android operating system, in Proc. IEEE Int. Conf. Syst.,
it helps the mobile user to feel secured and preserve their
Man Cybernet., 2009, pp. 20592061.
own privacy.
[6] S. Kumar, M. A. Qadeer, and A. Gupta, Location based
5. CONCLUSION services using android (lbsoid), in Proc. IEEE Int. Conf.
Internet Multimedia Services Ar chit. App l., 2009, pp. 1
In this paper, we tend to commenced a Secret-Question 5.
based Authentication system, known as Secret-QA, and [7] W. Luo, Q. Xie, and U. Hengartner, Face Cloak: An
conduct a user study to grasp what proportion the private architecture for user privacy on social networking sites,
knowledge collected by smart phone sensors and apps in Proc. Int Conf. Computer. Sci. Eng., IEEE, 2009, vol. 3,
will help in improving the safety of secret queries without pp. 2633.
violating the users privacy. We produce a group of queries [8] Liar Lazaro, Omer Tsiolkovsky, Chanan Glezer, Moshe
based on the data associated with sensors and apps, that Zviran, Personalized cognitive passwords: an
show the users short activities and smart phone usage. We exploratory assessment, in Information Management &
tend to measure the dependability of those queries by asking Computer Security, Vol. 19 No. 1, 2011 pp. 25-41.
participants to answer these question, furthermore as [9] R. Faragher and P. Duffett-Smith, Measurements of the
launching the acquaintance/stranger guessing attacks with effects of multipath interference on timing accuracy in a
and without the help of on-line tools, and that we are cellular radio positioning system, Radar, Sonar Navigat.,
considering establishing a probabilistic model based on IET, vol. 4, no. 6, pp. 818824, Dec. 2010.
a large scale of user knowledge to characterize the safety of
the private queries In our experiment, the set of secret [10] J. Clark and P. van Oorschot, Soc: Ssl and https:
queries which are associated with motion sensors, last Revisiting past challenges and evaluating certificate
charged time, call log and additionally the queries based on trust model enhancements, in Proc. IEEE Symp.
gallery photos have the best performance in terms Security Privacy, May 2013, pp. 511525.
of memorability and the attack resilience, which outplay the
conventional secret-question based approaches that are
created based on a users long history/information.

6. FUTURE ENHANCEMENT

In the future system, Android Application is


developed within which users Hand Waving Pattern is
recorded & continual the above action for more times until
the Application registers users Pattern.

2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1325

You might also like