Android Security -Permission Scanner,Application Locker,Services Locker,Smart Alarm According to Geo-Fencing

Introduction

Mobile phone usage is growing day by day. Unlike the situation a decade ago, today, people feel handicapped and uncomfortable without their mobile device close at hand. There have been great advances in mobile computing. People can download apps that help them socialize, keep fit, get directions, transact, shop, and much more. Smartphone are in its teething time and have an influential approach in almost everyone's life. Each one of us has cravings to click pictures, record videos, SMS, and inclination towards the growing Social Media networks. But the vital question is whether our data is safe and if it is not, what if it falls into wrong hands? The fear of having our data being mishandled by someone would also invade us. The major concern is privacy that requires to be prioritized

The application caters to enhance the quality of data security and have full control over the privacy of your phone. And access can be granted only to the list of authorized people who can have a reach of the data residing inside the phone. This Android security app allows user many kinds of locks to protect their data. Usually once our phone is stolen, it is very difficult to find the location. The probable solution to this problem has been provided by the researcher in his project, where she would facilitate the user with the concept of smart alarm

People are using smart phones for an increasing number of activities and often store sensitive data, such as email, calendars, contact information, and passwords, on the devices. There are millions of mobile applications available in app stores that make our simple life simpler

Amidst all the great things that have been accomplished in the mobility space, there is a global community of hackers who have been watching the mobiles closely. They use newer and bolder techniques to hack the mobile and applications, so app developers need to be cautious. With the increasing number of technologically rich mobile applications hitting the market, mobile phones have become the new target for hackers. The number and sophistication of attacks on mobile phones is increasing, and countermeasures are slow to catch up. Security leaks and confidential data disclosure from web and mobile apps are quite common today. Unfortunately, many Smartphone users do not recognize these security risks and issues. Many users fail to enable the security software that comes with their phones, and they believe that surfing the internet on their phones is as safe as or safer than surfing on their computers. Social networking keep a wealth of personal information. Recent innovations in mobile commerce have enabled users to conduct many transactions from their Smartphone such as purchasing goods and applications over wireless networks, redeeming coupons and tickets, banking, processing point-of-sale payments, and even paying at cash registers. Many users may consider mobile phone security to be less important than the security of their PCs, but the consequences of attacks on mobile phones can be just as severe.

Malicious software can make a mobile phone a member of a network of devices that can be controlled by an attacker. Malicious software can also send device information to attackers and perform other harmful commands. As a result, mobile phones are becoming more and more valuable as targets for attack

The major problems which are identified by the developer by observing the current situation and by analyzing existing system are as follows

• Security risks in transfer of data through SMS. According to researches done, it is found that there is a constant rise in the rate of data theft due to mishandling of phones whenever the phone falls into an intruder's hands.

• Data wiping is not just a mere concept but is an unavoidable issue that might risk the chances of the loss of data from cell phones when someone theft your cell phone.

• Without security app, the risk may be increased that an attacker could successfully distribute malware such as viruses, Trojans, spyware, and spam to lure users into revealing passwords or other confidential information.

• Difficult to track intruder location when mobile phone is stolen.

• Unknown calls and messages are coming into our phone repeatedly.

OBJECTIVE OF THE SYSTEM

The main objective of the project is to develop an android security mobile application which gives protection against the major threats that mobile applications are susceptible to like malicious software viruses, theft and loss.

• To develop a secure app that would provide ease to its users in providing an improvised level of privacy in securing private data.

• To implement different kinds of locks like Application Locker and Service Locker to give protection.

• To allow user automated disabled USB debugging and application install from unknown sources

• To enable users to filter messages and blocking calls.

• Permit users to safely remote lock or wipe the data when lost or stolen Android device

• To facilitate the user with an application, that satisfies to be free of errors, easily to manage, secure, consistent and robust.

• To trigger a remote alarm to make your phone ring loudly when out of virtual fence. And give the current location if mobile phone is out of fence as locations monitored and tracked through GPS.

FUNCTIONALITIES OF THE SYSTEM

Permission Scanner

This feature would let the end user to secure all apps with the Pin No. so that any remote user attempt will failed to open the App. In this module, Permission scanner scans permission for all the installed application, for that, it need to get the list of all the installed application. We can access all installed App from the appList stores after that for each item in the list permission are fetched and the details for these permissions. With each installed application an indication is displayed to show the danger level for that app and user could uninstall the application by long pressing on the name

Settings Checker

Some time user enable the USB Debugging and application install from unknown sources that may leads to get android phone tempered by the hacker or any other Service and unsecured App. To fix this problem, system has a module to for setting Checker. Settings Checker scans the Device's settings, using the Settings. Secure API provided by Android. It can be used to fetch settings for different parameters, check if USB Debugging is enabled, similarly if Application install from unknown sources is permitted. Settings Checker also has a background service, implemented using Android's Alarm Manager class, which performs automated checks at regular time intervals. By default, the interval is set to 1 Day. It can be changed in the settings to a Week, Fortnight or a Month. if the service scans and finds that any of the setting is not set to its optimal value, it fires a notification. Upon clicking this notification, the user is taken to the Settings Checker fragment, wherein he can fix the respective settings.

Broadcast Receivers

This feature would allow the user to the broadcast receivers are used to keep check on the malicious activities, for example unaware message sending, premium calls, execution of harmful USSDs etc. These Broadcast receiver includes
• Call Recepter
• SMS Recepter
• . OutgoingSMSRecepter
Call Recepter: is used to intercept incoming and outgoing calls. Every call that is placed by any application is passed through this receiver and then it checks if the called number meets the requirement set by the user i.e. if the number is saved in users contact details or is not present in the user’s blacklist. User could access the preferences regarding call blocker in the settings. Any call not meeting the requirement is logged in the Call logs and is shown in the blocker logs, with the reason for the blocking.
SMS Recepter: It does pretty much the same but with messages. The receiver can only handle received messages, for outgoing messages another service is used because the Android mechanism for outgoing SMSs are different. In case of calls the calls could be blocked or cancelled but for messages its different and specially with outgoing messages. There is no way yet known which could be used to alter the content of outgoing messages, or better block them. The Incoming SMS are deemed malicious and is reported to the user, if the message content contains numbers that are not saved in the contact list of user.
Outgoing SMS Recepter: checks if the outgoing SMS is sent by the user or if the message is sent by some other application. If latter is true a notification is generated giving the application name which sent the message, also the content of the message it sent.

Application Locker

Application locker does just what the title suggests. The locker interface is simple and it displays the list of all the installed application. With each application there is toggle button which lets user to lock or unlock the particular application. The mechanism is simple as is, a database table is created which store the package name of all the locked application and is empty if no application is locked. The heart and soul of application locker is the background service that keeps track of all the application that is launched. This service is sticky and need to be run always in the background. We get the list of most recently executed app and get the top most element of the list it is determined whether the application launched is locked or not. If locked the password activity is launched.

Services Locker

When Hacker trying to hack the android smart device they try to set on wifi, Bluetooth and other method to access the mobile device so it is most important to stop these attacks. To implement this we implement the Service Lockers. Services Locker's implementation involves a listener for each of the services. For ex. Wi-Fi StateReceiver for Wi-Fi. This receiver listens to change in state of the Device's Wi-Fi. If there is a change (User switches on/off the Wi-Fi), This App password prompt is shown, and the service is returned to it's previous state. For ex, if the user switches ON Wi-Fi, Password prompt will be shown, and Wi-Fi will be disabled by the command.

Smart Alarm According to Geo-Fencing

Geo-fencing is the most resource intensive service, it controls the device lock, and wiping of data. Moreover, it asks you to enable GPS for better location tracking. The class that does most of the work is GPS Trackerclass, this class gets the current device location from the GPS or network provider whichever is available. Using the location GeoFencing service keeps track of the device, if it is still inside the virtual fence or moved out of it. After the service is started the location is queried every 10 seconds. That’s not too much battery draining but also not losing the timely location tracking that’s needed. When Smart phone is stolen and make start from remote location using the Geo Fencing device location the App will determined that is device found to be out of the fence, it checks the location 3 more times and when it confirms the phone is out of the fence, it activates the alarming sound using Alarm Manager. Similarly, current location is sent to a secure number set by user enables the feature. As this service requires a working GPS, a prompt is made if GPS is unavailable and unless user enables the GPS the service is inaccessible. A secure number is required to enable the service to get location and Device Administrator privilege is also must.

Special Offer: Only Rs. 3500 with source code and support to run software in your system using remoting

© 2019 Saini Technologies. All rights reserved | Design by SainiTechnologies.com