You are on page 1of 9

Securing Computer Folders Through Mobile Phone

Final year project

Guided by :Ms. Raina Rawal

Presented by :Surbhi Aren & Shipra Singh

Problem Statement
- Data Security means protecting a database from destructive forces and the unwanted actions of unauthorised users. - Ever wondered what happens when people have password of your PC and reads through your personal and professional documents or some other important stuff? Protect it.

Flow Chart

Entity- Relationship Diagram

Data Flow Diagram

Software & Hardware Requirements


Software Requirements : - Operating System: Windows 7/ Windows XP/ Vista - Development: .Net framework 2.0, SQL Server 2008 R2 Hardware Requirements : - Simple Mobile phone. - A system with internet connection facility.

Functionality
Module 1 Create an account Module 2 If account already exists, sign-in Module 3 Users number changed

Work Plan
1.Write an interface to discover that internet connection/devices. Expected time duration 1month 2. Design the modules Expected time duration 1month 3. Functionalizing the modules Expected time duration 3 month

Conclusion: If somebody else logs by your user name, he/she wont be able to know the security code and users data remains safe and at the same time user will know that someone else is trying to access there data.

References
1. Towards Opportunistic Data Dissemination in Mobile Phone Sensor Network - Viet-Duc Le, Hans Scholten and Paul Havinga. 2. A WPAN Platform Design in Mobile Phone Considering Application Development and Usability, I.-H. Kim, G.-M. Jeong, E.-C. Park, K.-D. Chung. 3. Traffic Control by Bluetooth Enabled Mobile Phone, G. Manikandan and S. Srinivasan. 4. Cryptography Based E-Commerce Security: A Review, Shazia Yasin, Khalid Haseeb, Rashid Jalal Qureshi. 5. Applied Cryptography and cryptanalysis, Surbhi Aren.

You might also like