psf (incomplete)

15
STUDENT ID: TP028092 INTAKE ID: UC3F1504SE STUDENT NAME: Lim Keng Liang A. Project Title NFC Login Application for Computer Devices B. Brief description on project background. (i.e. problem context, rationale, description problem area, nature of challenge) Problem Context In this era of technology, it is safe to say that every household and office has a desktop or personal computer, whether for work or entertainment purposes. A developing country is no exception of having such devices, which includes cities that are growing tremendously every year. A household computer has multiple functions, depending on the necessities of the user. A computer is usually unique to either one or a limited set of owners, meaning only a few select people can access his/her computer at a given time. Thus, a security system is usually implemented in each personal computer to ensure safeguard of information and privacy is kept to a maximum. Many times we’ve been hearing news of corporate data being stolen or “hacked” by cyber criminals. They can even bypass even the most of complex of firewalls to

Upload: lim-keng-liang

Post on 18-Aug-2015

221 views

Category:

Documents


1 download

TRANSCRIPT

STUDENT ID:TP028092INTAKE ID: UC3F1504SESTUDENT NAME: Lim Keng LiangA Pr!e"# Ti#$e NFC Login Application for Computer Devices% %rie& 'e("ri)#in n )r!e"# *a"+gr,n'-.i-e- )r*$em "n#e/#0 ra#ina$e0 'e("ri)#in )r*$em area0 na#,re & "1a$$enge2Pr*$em Cn#e/#In this era of technology, it is safe to say that every household and office has a desktop or personal computer, whether for work or entertainment purposes A developing country is no e!ception of having such devices, which includes cities that are growing tremendously every year A household computer has multiple functions, depending on the necessities of the user A computer is usually uni"ue to either one or a limited set of owners, meaning only a few select people can access his#her computer at a given time $hus, a security system is usually implemented in each personal computer to ensure safeguard of information and privacy is kept toa ma!imum %any times we&ve 'een hearing news of corporate data 'eing stolen or (hacked) 'ycy'er criminals $hey can even 'ypass even the most of comple! of firewalls to retrieve sensitivedata that can 'e used malicious purposes $his can 'e dangerous and disruptive, especially if the data is used for 'lackmail or e!tortion 3a#ina$eAs such, a system is proposed to com'ine 'oth the secure ways of using NFC as a login system and replacing it with the traditional manual keystrokes on a computer In this system, a NFC supported mo'ile phone dou'les as an access card to a personal computer, making it secure and hassle*free, with the users not needing to memori+e passwords and saves time It is easy to use, as a user is not re"uired to carry multiple keycards for different functions as it can all 'e em'edded into the mo'ile phoneTangi*$e %ene&i#(* ,ptimal security and a'le to safeguard data from unauthori+ed users* -assle free login system where users only re"uire an Android device to access their personal computer* A'le employers to keep track of employee&s work hours via ./0 activation when logged onto a computer 1work*place only2* A'le parents to keep track of their children&s login hours via ./0 1commercial and home use2In#angi*$e %ene&i#(4 0aves times for manual login system4 3ser satisfaction, ./0 can 'e handy for emergency situations etc4Fast and professionalism if implemented in a professional working environmentNa#,re & C1a$$engeIn the NFC Login Application pro4ect, there will 'e several challenges that will 'e indicated in order to 4ustify the difficulty of the pro4ect development $he first challenge is the development of the mo'ile application itself, which is used as a (key*card) of sorts to access the computer A user*friendly interface design has to come to mind, also it has to 'e easily accessed on the mo'ilephone itself5 otherwise it would defeat the purpose of the development of this technology $he second challenge is the development of the server*side computer application, which keeps track of the fre"uency of the logins on a computer or multiple computers 6oth mo'ile and computer applications should 'e user*friendly and appeal to users of various age groups $he third challenge is the implementation of the ./0 functionality into the application when a user uses it to log onto a computer C %rie& 'e("ri)#in & )r!e"# *!e"#i5e(-.i-e- (")e & )r)(a$ an' 'e$i5era*$e(2Aim($he aim of this application is to implement a safe login system with the NFC feature, creating a secure login mechanism that not only promotes information security 'ut also is simple and user friendly in order to help reshape computer security6*!e"#i5e(* $o implement a hassle free login system, where users only re"uire an Android Device to access their personal computer* $o provide optimal security and safeguard data from unauthori+ed users* $o 'e fast and efficient in a professional working environmentDe$i5era*$e( .Cre7Main2$he NFC Login application, 'uilt into an application on an Android smartphone, will allow usersto login on to their workplace or personal computer at any given time, with a much safer alternative as keystrokes are unnecessary and no one can steal your password away from you Cre F,n"#ina$i#ie(* Allows users to login onto a computer with the tap of the screen of the Android smartphone when the app is running* Allows server application to 'e notified when a user has logged in, complete with timestamp and location provided via ./0* Allows monitoring of connectivity in a professional working environmentEn1an"emen#(* Allows user to receive notifications when a computer isn&t ena'ling login, or when an appis mis'ehaving* Allows users to stay logged in for a specific amount of days A prompt will allow users toremem'er their identification on a computer, provided that it isn&t turned off * $e!t message notification if a user is logged in onto somewhere else with their account informationS)e"ia$ Fea#,re(4 7ecords time elapsed when logged in4 Display computers linked under this system in a virtual map representation on the server side computerD %rie& 'e("ri)#in & #1e re(,r"e( nee'e' *8 #1e )r)(a$-.I-e- 1ar'9are0 (are0 a""e(( # in&rma#in 7 e/)er#i(e0 ,(er in5$5emen# e#"-2:ar'9are$he minimum hardware re"uirements of the development environment to create the specified pro4ect are as follows: 8. 1-0/A9:;m'ps2