SlideShare una empresa de Scribd logo
1 de 12
A New Design of Wearable Token System
      for Mobile Device Security




          A New Design Of Wearable Token System
                for Mobile Device Security        1
Abstract :
 Mobile Devices provide high level of Convenience
  and Flexibility.

 Vulnerable to theft and loss.

 Noble and Corner
    --- Concept of transient authentication .
    --- ZIA System.

 Effective and Advanced Version is Wearable Token System..



                       A New Design Of Wearable Token System
                             for Mobile Device Security        2
Existing System :

  Login Session


      -- Providing Uname , pswd.


  Authentication Burden

     -- Repeat the same process.



                   A New Design Of Wearable Token System
                         for Mobile Device Security        3
Basic structure of wearable token




        A New Design Of Wearable Token System
              for Mobile Device Security        4
An Application instance of the
                     Wearable Token System …..




                  A New Design Of Wearable Token System
                        for Mobile Device Security        5
Proposed Solution :

 Authentication burden shifted
  from the user to wearable token.




                     A New Design Of Wearable Token System
                           for Mobile Device Security        6
Sequence
Diagram
Module Desc:
A New Design of Wearable Token System..
   Note :This application need the usage of bluetooth dongel(Key setup process) .
            If it support the modification then we can show the real time
            implementation, but in case if it don't support then we have to show
            this application with simulation model in stand alone system.



Module 1 :Design of IGE:
     •    Creates Integrated Graphical Environment for simulate
         the application.

                             A New Design Of Wearable Token System
                                   for Mobile Device Security                      8
2.Module: Key Generation:
   • Generating common sharing key.

   • Shared between token and user wireless device.


3.Module: User Authentication:
   • Mechanism of user authentication.

   • Key will be exchanged when user device comes in the
     range of token.

                       A New Design Of Wearable Token System
                             for Mobile Device Security        9
USER1 comes into Node2 position
Recquirements :
  Minimum H/W Requirements :
   • HDD       : 20 GB
   • RAM       : 1 GB
   • Processor : P4

S/W Recquirements :
   •   Operating System : Windows XP
   •    JRE               : Java1.6
   •   Languages          : mxml,xml,ActionScript
   •   developing tool :Adobe Flex Builder 3
   •   Adobe AIR installer


                         A New Design Of Wearable Token System
                               for Mobile Device Security        11
A New Design Of Wearable Token System
      for Mobile Device Security        12

Más contenido relacionado

Similar a New Wearable Token System Secures Mobile Devices

Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Priyanka Aash
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2Santosh Satam
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoArash Ramez
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightIBM WebSphereIndia
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...AI Frontiers
 
19-f15-mobile-security.pptx
19-f15-mobile-security.pptx19-f15-mobile-security.pptx
19-f15-mobile-security.pptxJhansigali
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesCyber Security Alliance
 
Android studio feature
Android studio featureAndroid studio feature
Android studio featurexvier3453
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great againEric Larcheveque
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouCameronTait3
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSHASHANK WANKHADE
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security ModelMichael Rushanan
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 

Similar a New Wearable Token System Secures Mobile Devices (20)

Key2 share moosecon
Key2 share mooseconKey2 share moosecon
Key2 share moosecon
 
Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)Sacon - IoT Hackfest (Sri Chakradhar K)
Sacon - IoT Hackfest (Sri Chakradhar K)
 
Windows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep DiveWindows Phone 8 Security Deep Dive
Windows Phone 8 Security Deep Dive
 
C0c0n 2011 mobile security presentation v1.2
C0c0n 2011 mobile  security presentation v1.2C0c0n 2011 mobile  security presentation v1.2
C0c0n 2011 mobile security presentation v1.2
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
Security and Mobile Application Management with Worklight
Security and Mobile Application Management with WorklightSecurity and Mobile Application Management with Worklight
Security and Mobile Application Management with Worklight
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Final ppt
Final pptFinal ppt
Final ppt
 
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
Rajarshi Gupta at AI Frontiers : Security is AI’s biggest challenge, AI is Se...
 
19-f15-mobile-security.pptx
19-f15-mobile-security.pptx19-f15-mobile-security.pptx
19-f15-mobile-security.pptx
 
Rebooting the smartcard
Rebooting the smartcardRebooting the smartcard
Rebooting the smartcard
 
ASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devicesASFWS 2011 - Secure software development for mobile devices
ASFWS 2011 - Secure software development for mobile devices
 
Android studio feature
Android studio featureAndroid studio feature
Android studio feature
 
Make the Smartcard great again
Make the Smartcard great againMake the Smartcard great again
Make the Smartcard great again
 
Use GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With YouUse GFA To Make Someone Fall In Love With You
Use GFA To Make Someone Fall In Love With You
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time passwordSecurity for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
 
600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model600.250 UI Cross Platform Development and the Android Security Model
600.250 UI Cross Platform Development and the Android Security Model
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 

New Wearable Token System Secures Mobile Devices

  • 1. A New Design of Wearable Token System for Mobile Device Security A New Design Of Wearable Token System for Mobile Device Security 1
  • 2. Abstract :  Mobile Devices provide high level of Convenience and Flexibility.  Vulnerable to theft and loss.  Noble and Corner --- Concept of transient authentication . --- ZIA System.  Effective and Advanced Version is Wearable Token System.. A New Design Of Wearable Token System for Mobile Device Security 2
  • 3. Existing System :  Login Session -- Providing Uname , pswd.  Authentication Burden -- Repeat the same process. A New Design Of Wearable Token System for Mobile Device Security 3
  • 4. Basic structure of wearable token A New Design Of Wearable Token System for Mobile Device Security 4
  • 5. An Application instance of the Wearable Token System ….. A New Design Of Wearable Token System for Mobile Device Security 5
  • 6. Proposed Solution :  Authentication burden shifted from the user to wearable token. A New Design Of Wearable Token System for Mobile Device Security 6
  • 8. Module Desc: A New Design of Wearable Token System..  Note :This application need the usage of bluetooth dongel(Key setup process) . If it support the modification then we can show the real time implementation, but in case if it don't support then we have to show this application with simulation model in stand alone system. Module 1 :Design of IGE: • Creates Integrated Graphical Environment for simulate the application. A New Design Of Wearable Token System for Mobile Device Security 8
  • 9. 2.Module: Key Generation: • Generating common sharing key. • Shared between token and user wireless device. 3.Module: User Authentication: • Mechanism of user authentication. • Key will be exchanged when user device comes in the range of token. A New Design Of Wearable Token System for Mobile Device Security 9
  • 10. USER1 comes into Node2 position
  • 11. Recquirements : Minimum H/W Requirements : • HDD : 20 GB • RAM : 1 GB • Processor : P4 S/W Recquirements : • Operating System : Windows XP • JRE : Java1.6 • Languages : mxml,xml,ActionScript • developing tool :Adobe Flex Builder 3 • Adobe AIR installer A New Design Of Wearable Token System for Mobile Device Security 11
  • 12. A New Design Of Wearable Token System for Mobile Device Security 12

Notas del editor

  1. CS09
  2. CS09
  3. CS09
  4. CS09
  5. CS09
  6. CS09
  7. CS09
  8. CS09
  9. CS09