Android Password based Door Opener System
نویسندگان
چکیده
منابع مشابه
SpanDex: Secure Password Tracking for Android
This paper presents SpanDex, a set of extensions to Android’s Dalvik virtual machine that ensures apps do not leak users’ passwords. The primary technical challenge addressed by SpanDex is precise, sound, and efficient handling of implicit information flows (e.g., information transferred by a program’s control flow). SpanDex handles implicit flows by borrowing techniques from symbolic execution...
متن کاملFoot-operated door opener to eliminate the door handle as a source of contamination
AIM As door handles represent a transmission route for viruses and micro-organisms, a door opening and closing mechanism should be developed without manual operation. METHOD To solve the problem, a device for opening the door with the help of a foot pedal was built into the door leaf. RESULTS The design enables mechanical opening of the door with a foot pedal without manual operation. Subse...
متن کاملAndroid Based ECG Monitoring System
This document presents the development of a low power and portable ECG monitoring device based on MSP430 microcontroller and an Android Phone. This work is done in order to provide a reliable solution for cardiovascular patients who can help them analyze their ECG easily. There are many implementations of ECG monitoring devices at present but most of them are built using custom integrated ics. ...
متن کاملAndroid Based Children Tracking System
2088 ISSN:2278 – 7798 All Rights Reserved © 2015 IJSETR Abstract— In this paper children tracking system based on android terminals is proposed. Recently, all over the world crime against the children in the age of 14 to 17 years is more popular. Parent’s always worry about their children whenever they are outside from the home. In this paper, the proposed system consists of two sides out of th...
متن کاملSecuring Business’s Front Door – Password, Token, and Biometric Authentication
Human authentication is the security task whose job is to limit access to computer networks and physical locations only to those with authorization. This is done by equipping authorized users with passwords or tokens, or using their biometrics. However, due to human limitations, these are often used poorly, thus weakening security, or they are secure but so inconvenient as to be circumvented. T...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IJARCCE
سال: 2017
ISSN: 2278-1021
DOI: 10.17148/ijarcce.2017.65115