Anti-theft system

Smart phone development of intelligent anti-theft system
Zhu

Peng Zhang Yue Wu Jindi  (Binzhou University, Binzhou
, 256600 ) One is the local control module and the other is the remote control module.
The control module of this machine includes: mobile phone anti-theft settings, mobile phone for help, one-key lock screen, password reset, close alarm music, one-key uninstall software.
There are remote control, remote control of alarm ringtones, remote control of lock screen, remote control of mobile phone GPS latitude and longitude, open Baidu map to get mobile phone location, remote control of mobile phone dialing, remote control of mobile phone format.

Keywords : Android; anti -
theft; control; lock screen; alarm; positioning; software design Start with a smartphone, take the bus, go shopping...you don't even know when the phone you still remember in your pocket or in your bag disappeared. If only the phone is stolen, it is a little better, but if the thief uses your phone address book or text message to deceive your relatives and friends or obtain some important information, you may lose more than a smartphone. Simple. If some children's shoes still have some hobbies like Mr. Guanxi, when you put some private photos in your mobile phone, will you worry that unscrupulous thieves will put them online for you if you lose your mobile phone? So at this time, how to prevent your smartphone from being stolen has almost become a required course. Install a useful anti-theft app for your Android phone, which not only makes it possible for you to find your phone through text messages, location, etc., even if you can't find your phone in the worst case, you can also destroy it through remote control. All kinds of data in the mobile phone. In this way, even if the thief steals your mobile phone, the important data in your mobile phone will not be stolen, and your loss will be minimized.




In this situation, our mobile phone anti-theft software comes into being. A good anti-theft software can improve the possibility of your mobile phone being stolen and retrieved. In the past, if you lost your mobile phone, you basically don't need to look for it. Now that you have lost your mobile phone, you can get your mobile phone location through your security number and other mobile phones to determine where your mobile phone is. You can also format your mobile phone so that your Mobile phones and data are more secure.

2 Overall structure of the system
The software is located in mobile phone anti-theft, the software is divided into two major modules, one is the local control module, the other is the remote control module.
The control module of this machine includes: mobile phone anti-theft settings, mobile phone for help, one-key lock screen, password reset, close alarm music, one-key uninstall software.
There are remote control, remote control of alarm ringtones, remote control of lock screen, remote control of mobile phone GPS latitude and longitude, open Baidu map to get mobile phone location, remote control of mobile phone dialing, remote control of mobile phone format. As shown in Figure 1:













Figure 1: Overall system structure
3 Main functions 3.1
Mobile phone anti-theft module
The security of your mobile phone, please do not leak it at will.
3.1.1. Mobile phone anti-theft function;
enter the mobile phone anti-theft function interface, and set the mobile phone functions according to the prompts, such as setting security number, setting sim card binding, setting access to super authority, choosing to set contacts, enabling anti-theft function, etc. After the setting is completed, you can operate the
2.1.2, mobile phone help function;
if you are in danger outdoors, you can choose this function, this function will send a help message to your bound security mobile phone, and then your friends can use the control terminal GPS Positioning to locate you, we not only anti-theft your mobile phone, but also protect your security
3.1.3, one-key lock screen function;
Is it necessary to press the screen lock button frequently when using the mobile phone? Some mobile phones may even be broken in less than a year. In order to better maintain your mobile phone, we have specially set this function. Click the screen to lock the screen directly, so you no longer have to worry about the lock screen key of your phone.
3.1.4. Password reset function;
sometimes, due to carelessness and carelessness, I accidentally forget my mobile phone password, what should I do? Don't worry, you only need to click here, you can reset the phone status with the security question, from now on, you don't have to worry about forgetting the password again.
3.1.5. Turn off the music function;
sometimes the mobile phone can’t be found. I use the security mobile phone to let my mobile phone report the music, but what should I do if it still rings when I find it? Click here, you can turn off the music for you, so you don't have to worry about it.
3.1.6. Click me to uninstall the function;
if you think our software is not good, or you don't like to use it, it will be very troublesome to uninstall in general, you need to deactivate it in the settings, but with this function, you only need to click to enter password to uninstall the software.
3.2 Mobile phone lost module
The main function of this module is to control your lost mobile phone. For example, if your mobile phone is lost, you can control your mobile phone by entering your lost mobile phone number, your lost mobile phone password, and your mobile phone password. Therefore, entering the phone lost module requires you to enter a password.
3.2.1 Control the alarm bell function;
if you can't find your mobile phone, you may forget where you put it. You only need to use someone else's mobile phone to enter this module and click on him to make your lost mobile phone sound the alarm music. If your mobile phone is stolen , and then the thief changed the card for you. At this time, the background of the mobile phone will automatically send a SIM card change alarm SMS to your bound security number. At this time, you can know the mobile phone number through SMS. Of course, the mobile phone number will be automatically displayed in the number box of the lost mobile phone number when entering the lost mobile phone module.
3.2.2. Remote screen lock function;
when the mobile phone is lost, you can choose this function to control your mobile phone to automatically lock the screen, and the lock screen password is your mobile phone password.
3.2.3. Remote GPS function;
when the mobile phone is lost, you can choose this function to control your mobile phone to turn on the GPS, and return it to you in the form of SMS, you can get the location of your mobile phone by opening Baidu Maps.
3.2.4. Turn on the map function;
when you get the lost GPS latitude and longitude coordinates of the mobile phone, you can choose this function, and it can be displayed in Baidu Map in a friendly form. You can find it through the map display location and control the alarm bell and other functions back to the phone.
3.2.5. Remote dialing function;
when the mobile phone is lost, you can choose this function, you can control your mobile phone to dial the security number, and answer the call with the security number to get the nearby voice of the thief.
3.2.6. Remote formatting function;
when the mobile phone is lost, if you have private information on your mobile phone and you do not want to be seen by others, choose this function, it can let your mobile phone format directly with one key.

3 Main innovations
1. Automatic alarm for SIM card replacement.
2. Remote GPS positioning.
3. The map shows the location of the phone.
4. Remotely control the mobile phone to dial the security number.
5. Remotely format the phone.
6. Remote control phone lock screen.
7, remote control mobile phone alarm.

4 Technical points
4.1 Android program structure and running process
The first layer of Android's project folder includes: "src", "Android Library", "assets", "res" directory and AndroidMainifest.xml file, placed in "\src" "in the main program, program class (class), placed in "\res" are resource files (Resource Files), such as program ICON icons, layout files (\layout) and constants (value).
The main class of the Android program, its content is similar to the general java program format. The main class inherits from the Activity class. In the main class, the onCreate() method is generally overridden. In this method, setContentView() is used to set the layout to be displayed by the Activity.
There are three types of Android applications, namely: front-end Activity (Foreground Activity), background services (Background Services), interval execution Activity (Intermittent Activity). The front-end activity is the basic part of the Activity application and runs in the front-end program of the mobile phone; the background service program may be the invisible system service (System Service), system Broadcast (broadcast information) and Receiver (receiver); Similar process (Threading), Notification Manager, etc.
Once the application is executed, it will follow the sequence shown in Figure 3. If you need to write a program in an Activity, the default common entry points are onCreate (Activity) and onStart (Service). The two methods onResume() and onPause() are the life cycle of the Activity during the running process after onCreate. When the program loses the front-end focus or is closed, the onPause() state of the Activity will be triggered; when the application is awakened again, the will return to the OnResume() state.
Figure 2: The logical structure of the program
Figure 3: The basic program flow of android



4.2 Baidu map used in Mars coordinates
The mobile phone map service refers to a location service related to the user's location through WAP or client software on the user's mobile phone to find the location information of oneself and friends, query surrounding information, and plan traffic routes. The mobile map provides you with a convenient and practical handheld map. Within the small size of the mobile phone screen, you can inquire about food, play, and travel all-round city information, find the location of yourself and your friends, and find road information. Become your portable guide, travel around the city easily, without worries.
Our application is based on Baidu Statistics API, and integrates Baidu Map API, so as to realize the application of Baidu title map.
The Mars coordinate problem appeared in the application of map technology.
Mars Coordinates: The national secret plug-in, also called encryption plug-in or biasing or SM module, is actually an artificial biasing process for the real coordinate system. According to the algorithm of a few lines of code, the real coordinates are encrypted into false coordinates, and This offset is not linear, so the offset situation will be different everywhere. The encrypted coordinates are also often referred to as the Mars coordinate system. To solve this problem, we got a solution technique from an open source website. Then, based on the ModifyOffset class, I implemented my own solution, but if you want to go public and operate, you need to apply for the corresponding permission from the corresponding department of the country.


4.3 Customize UI controls modeled
on We made our own innovations on the interface, with the blue sky and prairie as the background, and then gave button controls modeled on the UI of WP8 mobile phones. MagnetView based on ImageView, located under the package of com.laonai.ui;.
This function realizes the function of zooming out in the middle of the click, and the special effect of clicking around, and realizes the gorgeous transformation of the ImageView customized by the mobile phone.
4.4 Security Issues and MD5 Encryption
For the password stored in the mobile phone, we use MD5 encryption. In the algorithm, we use MD5 encryption three times and an algorithm that offsets a number, which fully guarantees that the password will not be cracked.
package com.bzu.mobilesafe.utils;

import java.security.MessageDigest;
import java.security.NoSuchAlgorithmException;

public class Md5Utils {
public static String encode(String password) {

MessageDigest digest;
try {
digest = MessageDigest.getInstance("MD5");
} catch (NoSuchAlgorithmException e) {
// TODO Auto-generated catch block
e.printStackTrace();
// can't reach
return "";
}
byte[] result = digest.digest(password.getBytes());
StringBuffer sb = new StringBuffer();
for (byte b : result) {
int number = b & 0xff - 5;
String str = Integer.toHexString(number);
if (str.length() == 1) {
sb.append("0");
}
sb.append(str);
}
return sb.toString();
}
}


5 Conclusion
    In the era of mobile internet, scientific and technological Continuous improvement makes the replacement of electronic products faster and faster, and mobile phone styles and hardware facilities are constantly being upgraded. At the same time, with the development of mobile phones, the mobile app application market has also shown a skyrocketing growth, which has penetrated into people's daily life. As people rely more and more on mobile phones, mobile phone anti-theft has become the most concerned issue for mobile phone dependents.
   In this context, mobile anti-theft software comes into being. A good anti-theft software can improve the possibility of your mobile phone being stolen and recovered. In the past, if you lost your mobile phone, you basically don't need to look for it. Now that you have lost your mobile phone, you can get your mobile phone location through your security number and other mobile phones to determine where your mobile phone is. You can also format your mobile phone so that your Mobile phones and data are more secure.
   However, due to the limited level of personnel in this group, and it is the first time to do complex programs in android. Various problems were encountered during the development of the program. There must be many undiscovered problems in the final version of the program, and I urge teachers to criticize and correct them.

References
[1] Title of the 11th Qilu Software Design Contest, 2013
[2] "" published by Publishing House 2007
[3] "Photoshop7.0 Chinese Edition" written by Tsinghua University Press 2003
[4] "android sdk" Development Examples Daquan Yu Zhilong, Chen Yuxun, Deng Mingjie, Zheng Mingjie, Chen Xiaofeng, Guo Zhijun, and Wang Shijiang, 2010
[5] "XML Database Technology" by Wan Changxuan, Tsinghua University Press 2005

Instructor Comments:
The software design competition has gone through about two months, from studying each design topic to the final selection of the topic; from learning various software designs From the required knowledge to the subsequent software design, the completion of the work, and the subsequent summary and discussion, I really saw the changes of every member of the team: from being ignorant at the beginning to slowly adapting to the team, everyone Gradually, I realized my position in the whole team clearly, and I was able to realize the same goal of everyone and strive for it, and burst out the stamina of a team. I said that this team must be on the road of this software design competition. A powerhouse.
Since most teams do not have any experience in software design, at the beginning, everyone can only aim for completion. After all, the workload of software design is very large, and it is difficult to follow the software in such a limited time. The design requires a more satisfactory work. Especially in the process of software design, they also encountered many technical problems, and such problems are relatively professional software design problems, but this did not stumped them. Overcoming obstacles one step at a time until the work is completed is exhilarating.
After one and a half months, their works were basically completed, and the rest was the finishing work of the software. Everyone did not despise every step in the software design process, completing the code, completing the realization of the function, and beautifying the work. During the entire software development process, I truly saw the students' amazing self-learning ability, and was amazed by the whimsy and whimsy that the students kept emerging. I am very grateful to Qilu Software Design Competition for providing such a good platform for the students, so that they can show their strength well, and also make them see their potential, and lay a good foundation for future employment and entrepreneurship!

Contact information:
    (1) Mailing address: Binzhou College, Binzhou City, Shandong Province
    (2) Tel: 17862008310
(3) E-mail: [email protected]
    (4)QQ号:853971302












[color=red]
[/size][/color]

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=326984868&siteId=291194637