1,754 research outputs found

    Survey and Analysis of Android Authentication Using App Locker

    Full text link
    Android Smart phones have gained immense popularity over the years and is undoubtedly more popular than other operating system phones. Following the similar lines android wear was introduced. Steadily android wear is making its way into our daily lives. It helps keep track of the sleep you have, helps you reach fitness goals, keeps track of phone and helps users have easy authentication. Due to the usage of smart lock which enables phone to be unlocked as long as connected to the android wear, this leads to almost no security on both the ends as android wear before Android 5.0 has no lock. We aim to produce the existing authentication methods in android phones and wear and the threats that plague both kinds of devices. As authentication is one of the major building blocks of security, through research we aim at designing a system for android phones which will be able to protect the sensitive data on devices which will be at risk through smart lock using encryption techniques. In this proposed system, the user would be able to decide which applications are needed to be secured when he is using smart lock. This application will enable lock for those user chosen applications as soon as the smart phone device is connected to android wear and similarly disables the lock when connection is disabled between the devices and communication between devices is made secure using encryption algorithms. This application does not interfere with easy phone authentication which users demand but it makes sure data is protected and users are authenticated with the help of multiple authentication layering

    From Palm to Arm

    Get PDF
    The number of people diagnosed with diabetes is increasing at an alarming rate. However, strong evidence shows that health information technology has improved medical outcomes, especially within the field of diabetes research. This thesis investigates how to motivate people with diabetes to perform self-management activities with the help of a smartwatch application. The work is grounded in a literature review, discovering how people manage diabetes with smartwatches today and the lack of existing motivational features on existing solutions. As a result, a system design of a smartwatch application is presented, including a graphical user interface (UI). The system aims to manage and monitor the essential diabetes metrics: nutrition, blood glucose, and physical activity while generating motivation through goal setting. In addition, the presented system is oriented on a standalone architecture, removing the need to pair a smartphone to the smartwatch and introducing novel features for smartwatch diabetes management. Finally, a proof of concept is implemented using Android studio to solidify the systems requirements. Furthermore, a descriptive analysis of a survey presents that among people with diabetes, simplicity is the most crucial factor in smartwatch applications. Based on this, the presented UI is evaluated according to the simplicity of other systems and the impact the motivational features have on the system’s complexity. Then, the potential of a standalone architecture for diabetes management is discussed. Finally, it is concluded that goal-setting features should be more widely used among smartwatch applications due to their low impact on the application. The future work of the thesis is to test the system on people with diabetes. Both to evaluate the system useability scale and observe the impact goal-setting has on performing diabetes self-management. Furthermore, in this thesis, it is assumed that there is a communication channel between diabetes devices and the smartwatch. This must be further investigated with the next generation of diabetes devices

    Assisting Children Action Association Through Visual Queues and Wearable Technology

    Get PDF
    Autism Spectrum Disorder makes it difficult to for a child communicate, have social interactions and go through daily life. Visual cues are often used to help a child associate an image with an event. With technology becoming more and more advanced, we now have a way to remind a child of an event with wearable technology, such as a watch. This new technology can help a child directly with the Visual Scheduling Application and various other applications. These applications allow children and their families to be easily able to keep track of the events on their schedule and notify them when an event occurs. With the Autism Management Platform and related website, a parent can easily create events to help a child throughout the day. The child can associate an image with events, allowing for a clearer understanding of what to do when an event occurs. Wearable technology has become a new way to interact with the user in a very unobtrusive manner. With this new technology, we can help associate a visual event to a child’s schedule and interrupt when needed to help make the child’s life easier on a daily basis

    Indoor Positioning for Monitoring Older Adults at Home: Wi-Fi and BLE Technologies in Real Scenarios

    Get PDF
    This paper presents our experience on a real case of applying an indoor localization system formonitoringolderadultsintheirownhomes. Sincethesystemisdesignedtobeusedbyrealusers, therearemanysituationsthatcannotbecontrolledbysystemdevelopersandcanbeasourceoferrors. This paper presents some of the problems that arise when real non-expert users use localization systems and discusses some strategies to deal with such situations. Two technologies were tested to provide indoor localization: Wi-Fi and Bluetooth Low Energy. The results shown in the paper suggest that the Bluetooth Low Energy based one is preferable in the proposed task

    The Feasibility of Wearables in an Enterprise Environment and Their Impact on IT Security

    Get PDF
    This paper is intended to explore the usability and feasibility of wearables in an enterprise environment and their impact on IT Security. In this day and age, with the advent of the Internet of Things, we must explore all the new technology emerging from the minds of the new inventors. This means exploring the use of wearables in regards to their benefits, limitations, and the new challenges they pose to securing computer networks in the Federal environment. We will explore the design of the wearables, the interfaces needed to connect them, and what it will take to connect personal devices in the Federal enterprise network environment. We will provide an overview of the wearable design, concerns of ensuring the confidentiality, integrity, and availability of information and the challenges faced by those doing so. We will also review the implications and limitations of the policies governing wearable technology and the physical efforts to enforce them

    Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications

    Get PDF
    The ongoing popularity of health and fitness applications catalyzes the need for exploring forensic artifacts produced by them. Sensitive Personal Identifiable Information (PII) is requested by the applications during account creation. Augmenting that with ongoing user activities, such as the user’s walking paths, could potentially create exculpatory or inculpatory digital evidence. We conducted extensive manual analysis and explored forensic artifacts produced by (n = 13) popular Android mobile health and fitness applications. We also developed and implemented a tool that aided in the timely acquisition and identification of artifacts from the examined applications. Additionally, our work explored the type of data that may be collected from health and fitness web platforms, and Web Scraping mechanisms for data aggregation. The results clearly show that numerous artifacts may be recoverable, and that the tested web platforms pose serious privacy threats

    Mobile Application for Emergencies Management

    Get PDF
    The Bachelor Thesis presented in this document is based in the development of an application for Android devices oriented to everyone. The main objective of the application is to notify users about situations of emergency that happen near their location. The first of the principal functions of the application allows users to notify about situations witnessed considered as emergencies through an interface that allows the creation of voice messages that are sent to a server that will store them to notify other users. The second principal function of the application is being able to notify any emergency situation happening near the user. To do so, users are able to see a list of all emergencies near them, having the possibility to see in a map the exact location of each of the them. The server with which the communication is established has the responsibility to check that the emergencies sent by users are trustful by means of a sentimental analysis of the text sent through an external API provided by MeaningCloud. This analysis is carried out with the objective of assuring that the message is not sent with dishonest purposes. In addition, once the message truthfulness is verified, the text is analyzed in search of keywords with which it can be identified with a particular type of emergency. Moreover, all the data stored in the database is not only obtained from messages sent by users, it also includes emergencies sent directly from the official twitter account of the DGT (Dirección General de Tráfico) that are obtained by means of the Twitter API. The report includes an analysis of the tools and platforms used to develop the system. Some of these resources are the client-server paradigm, Android Studio, programming languages like Java for Android, Python or MySQL and, external APIs provided by MeaningCloud or Twitter. Finally, also the different parts in which the system is divided is described in depth, including the way in which they have been developed along with the decisions taken during their development.Ingeniería Informátic
    • …
    corecore