2014 Qilu Software Competition smart phone application First prize--anti-theft star

Source: Internet
Author: User
Tags md5 encryption

Cat Share, must boutique

This is the cat 14 to participate in the Qilu software competition Android works, you are welcome to Exchange learning

Material code Address: Upload later
Original address: Http://blog.csdn.net/u013357243?viewmode=contents
Video address:
http://player.youku.com/player.php/sid/XODIzNjI3Nzcy/v.swf

Project personnel

Sanayu Wang Yu Li Heng Richilli

Project Papers

Smart phone development-anti-theft star
Sanayu Wang Yu Li Heng Richilli
(Binzhou College, Binzhou, 256600)

Summary
Software positioning in the mobile phone burglar, the software is divided into two modules, one is the local control module, the other is a remote control module.
The machine control module has: Mobile phone anti-theft settings, mobile phone for help, a key lock screen, password reset, turn off alarm music, one-click Uninstall software.
Remote control, remote control alarm ringtone, remote control lock screen, remote access to GPS latitude and longitude, open Baidu map to get mobile phone location, remote control phone dialing, remote control format mobile phone.

Keywords
Android, anti-theft, control, lock screen, alarm, positioning, software design

1 Project Background
The software for mobile phone application software, now more and more smart phone users, thieves and pickpockets team is also expanding, they specifically targeted some good smart phone, take the bus, shopping ... You don't even know when you remember the phone that was in your pocket or in your bag that was missing. It's a little bit better if it's just the phone being stolen, but if the thief cheats your relatives or friends or gets some important information through your phone address book or text message, you're probably losing more than just a smart phone. Some children's shoes if there are some of the teacher's hobby, put some privacy photos in the phone, when the phone lost you will worry about unscrupulous thieves will put you on the Internet? So at this point, how to prevent your smartphone from being stolen is almost a required course.
Install a good anti-theft app for your Android phone, not only can you find your phone by SMS, location, etc., even if it is the worst case you can not find your phone will be able to remotely control the destruction of various data on the phone. This way the thief steals your phone and steals important data from your phone, minimizing your losses.
In this scenario, our mobile phone anti-theft software is born, a good anti-theft software can improve your mobile phone stolen the possibility of recovery. The original when the phone lost, basically do not look for, now the mobile phone is lost, you can pass the security number, other mobile phone to get your phone location, determine where your phone, and can also format the phone, so that your phone, data are more secure.

2 system Overall structure
The software is located in the mobile phone burglar, the software is divided into two major modules, one is the local control module, the other is a remote control module.
The machine control module has: Mobile phone anti-theft settings, mobile phone for help, a key lock screen, password reset, turn off alarm music, one-click Uninstall software.
Remote control, remote control alarm ringtone, remote control lock screen, remote access to GPS latitude and longitude, open Baidu map to get mobile phone location, remote control phone dialing, remote control format mobile phone. 1 is shown below:

Figure 1: Overall system structure
3 main functions
3.1 Mobile phone anti-theft module
The first time to enter the mobile phone anti-theft module needs to set the phone password and security questions answer, here you have to keep in mind the password and secret insurance, the password is related to the safety of your phone, please do not divulge.
3.1.1, mobile phone anti-theft function;
Enter the mobile phone anti-theft function interface, according to the prompt to set up phone functions, such as setting security number, set up SIM card binding, set to get Super permissions, choose Settings Contact, anti-theft function, etc. Setup is complete, you can manipulate
2.1.2, mobile phone help function;
If you are in danger outdoors, you can choose this feature to send a help message to your secured phone, and your friends can locate you via the control-side GPS location, and we will not only protect your phone, but also keep you safe.
3.1.3, one key lock screen function;
In peacetime when using mobile phone lock screen button is often pressed, some mobile phone even a year not to lock screen key is broken, here in order to better maintain your mobile phone, we set this feature, click the screen can be directly lock screen, so you no longer for the phone's lock screen key troubles.
3.1.4, password reset function;
Sometimes because of carelessness, careless, careless to forget the password of their mobile phone, how to do? Don't worry, you just need to point here, with the security problem can reset the status of the phone, from now on, no longer worrying to remember the password.
3.1.5, turn off the music function;
Sometimes mobile phone can not find, with a secure phone to make their own mobile phone newspaper music, but found him still rang how to do? Click here, can help you to turn off the music, absent-minded also need not worry about.
3.1.6, point me uninstall function;
If you think our software is not good, or do not like to use, the general uninstall will be very troublesome, you need to go to the settings to deactivate, but there is this feature, you just need to click enter the password, you can uninstall the software.
3.2 Cell phone lost module
The main function of this module is to control your lost phone, such as your mobile phone lost, you can enter your lost mobile phone number and your lost phone password, as well as the phone's password to control your phone. Therefore, entering the phone loses the module requires you to enter a password.
3.2.1 Control alarm function;
If the phone can not be found, may forget to put where, just need you to use someone else's mobile phone into this module and then click on him can let your lost phone sounded alarm music, if your phone was stolen, and then the thief to change your card, the phone backstage will automatically give you the security number of the binding to send a SIM card change alarm SMS. Then you can know the mobile phone number by text message, of course, this time the mobile phone number will automatically appear to enter the cell phone lost the module entered when the Number box lost.
3.2.2, Remote lock screen function;
When the phone is lost, you can choose this function, you can control your phone auto lock screen, lock screen password for your phone password.
3.2.3, remote GPS function;
When the phone is lost, you can choose this function, control your phone to turn on the GPS, and return to you by SMS, you can open Baidu map to get your phone location.
3.2.4, open map function;
When you get the missing GPS latitude and longitude coordinates, you can choose this function, which can be displayed in a friendly way in the Baidu map, you can use the map display location and control alarm and other functions to retrieve the phone.
3.2.5, remote dialing function;
When the phone is lost, you can choose this function, you can control your mobile phone to dial the security number, with a security number to receive the thief's nearby voice.
3.2.6, remote Format function;
When the phone is lost, if you have privacy information in your phone, you do not want to be seen by others, choose this feature, he can make your phone directly with a key format.

3 Key Innovation points
SIM card Replacement automatic alarm.
Remote GPS positioning.
The map shows the phone's location.
Remotely control your phone to dial a security number.
Remotely format your phone.
Remote control of the phone lock screen.
Remote control of phone alarms.

4 Technical Essentials
4.1 The structure and operation of the Android program
the first layer of the Android project folder includes: "src", "Android Library", "Assets", "res" Directories and Androidmainifest.xml files, placed in "\SRC" is the main program, program Class (Class), placed in the "\res" is a resource file (Resource files), such as the program icon icons, layout files (\ Layout) and constant (value).
The main class of the Android program, which is similar in content to the generic Java program format. The main class inherits from the activity class, in which the OnCreate () method is generally overridden in the main class, where Setcontentview () is used to set the layout of the activity to be displayed. There are three types of Android applications: front-end activity (Foreground activity), background service (Background services), interval execution activity (intermittent Activity). Front-end activity is an essential part of the activity application, running in the phone's front-end program, which may be the invisible system service, System broadcast (broadcast information), and receiver (receiver) Interval execution activity is a similar process (threading), Notification Manager, and so on.
Once the application is executed, it will follow the sequence of processes shown in figure three, and if you need to write programs in the Activity, the default entry points are the Focus OnCreate (Activity) and OnStart (Service). The two methods of Onresume () and OnPause () are the life cycle of activity after oncreate, which triggers the onpause () State of activity when the program loses its front-end focus or is closed; will return to the Onresume () state.
Figure II: The logical Structure of the program
Figure III: Android Basic program flow

4.2 Baidu map using Martian coordinates
mobile phone map business refers to the user on the phone through HYPERLINK "http://baike.baidu.com/view/7319.htm" \ T "http://baike.baidu.com/ View/_blank "WAP mode or client software approach, find yourself, friends location information, query the surrounding information, planning the traffic route of a location related to the user location business. HYPERLINK "http://baike.baidu.com/view/1794872.htm" \ T "Http://baike.baidu.com/view/_blank" mobile map provides you with a handy and practical handheld map, HYPERLINK "http://baike.baidu.com/view/1810278.htm" \ T "http://baike.baidu.com/view/_blank" phone screen This small square between, you can inquire about food, play , complete city information, find yourself and friends ' location, find road information, and become your portable HYPERLINK "http://baike.baidu.com/view/793650.htm" \ T "http://baike.baidu.com/ View/_blank "guide, easy to swim the city, no worries.
Our application is based on Baidu Statistics API, and integrates the use of Baidu Map API, so as to achieve the application of Baidu graph. The problem of Mars coordinates appears in the application of the
map technology.
Mars coordinates: National security plug-ins, also known as encryption plug-ins or add-on or SM module, in fact, the real coordinate system for artificial bias processing, according to a few lines of code algorithm, the real coordinates are encrypted into a false coordinates, and this is not a linear bias, so the migration around the situation will be different. The encrypted coordinates are often called the Mars coordinate system. To solve this problem, we got a solution from the open source website. Then based on the Modifyoffset class, the implementation of their own solutions, but if you want to market operations, but also to the relevant departments of the State to apply for appropriate authority.

4.3 Customizing the UI controls modeled after WP8
On the interface we made our own innovations, with the blue sky and the prairie as the backdrop, and then gave the button controls modeled after the WP8 phone UI. Magnetview based on the ImageView, located under the package of Com.laonai.ui;
This function realizes the ImageView of the mobile phone customization, such as the WP8 of the middle-click, and the special effect of the surrounding deflection.
4.4 Security issues and MD5 encryption
To the password stored in the phone, we used the MD5 encryption, in the algorithm used the MD5 three times encryption and offset a number of the algorithm, so that the password is not cracked.

 PackageCom.bzu.mobilesafe.utils;ImportJava.security.MessageDigest;ImportJava.security.NoSuchAlgorithmException; Public  class md5utils {     Public StaticStringencode(String password) {MessageDigest Digest;Try{Digest = Messagedigest.getinstance ("MD5"); }Catch(NoSuchAlgorithmException e) {//TODO auto-generated catch blockE.printstacktrace ();//Can ' t reach            return ""; }byte[] result = Digest.digest (Password.getbytes ()); StringBuffer SB =NewStringBuffer (); for(byteB:result) {intNumber = B &0xFF-5; String str = integer.tohexstring (number);if(str.length () = =1) {Sb.append ("0");        } sb.append (str); }returnSb.tostring (); }}

5 Conclusion
In the era of mobile interconnection, the continuous improvement of science and technology, making the replacement of electronic products faster and faster, mobile phone style and hardware facilities are constantly upgrading. At the same time, with the mobile phone development of mobile app market, it also shows an explosion of growth, deep into people's daily life. As people rely more and more on mobile phones, mobile phone theft has become a more and more concern for mobile phone dependence.
In this context, mobile phone anti-theft software is born, a good anti-theft software can improve your mobile phone stolen the possibility of recovery. The original when the phone lost, basically do not look for, now the mobile phone is lost, you can pass the security number, other mobile phone to get your phone location, determine where your phone, and can also format the phone, so that your phone, data are more secure.
However, due to the limited level of personnel, and is the first time to do the Android complex procedures. In the process of the development of the program encountered a variety of problems. In the final version of the program there must be a lot of problems that have not yet been found, please teachers to criticize correct.

Reference documents
[1] qilu Software Design Competition 11th session title, 2013
[2] "Publishing house 2007"
[3] "Photoshop7.0 Chinese version" should be diligent in Tsinghua University Press 2003
[4] "Android SDK development paradigm Daquan" Yu Zhirong Chen Yushun Dengmingjie Zheng Mingjie Chen Xiaofeng Guo Jinjun, Wang Shijiang adaptation 2010
[5] "XML database Technology" Changxiang Tsinghua University Press 2005

Instructor Comments:
The software design competition has undergone about two months, from the study of each design topic to the final choice of topics, from learning all kinds of software design needs knowledge to the subsequent start of software design, completion of the work until later summary discussion, I really see the team of every member of the change: from the beginning of the mengmengdongdong to slowly adapt to the team, everyone has gradually clearly recognized their position in the whole team, so as to be able to recognize the same goal and fight for it, burst out a team of stamina power, I said this team must be the software design competition on the way to a strong team.
Since most of the team did not have any experience in software design, at the beginning of all can only be done for the purpose, after all, the workload of software design is very large, in such a limited time in accordance with the software design requirements to make a more satisfactory work out. Especially in the software design process, they also encountered a lot of technical difficulties, and such difficult problems are more professional software design problems, but this did not baffle them, through consulting experts or access to relevant information, they step-by-step to overcome the difficulties until the completion of the work, the whole process is encouraging.
After 1.5 months of time, their work is basically completed, the rest is the end of the software, we do not despise every step of the software design process, the completion of the code, the completion of the implementation of the function, the artwork beautification. Throughout the software development process, I really saw the students ' amazing self-study ability, and they were amazed at the wonderful ideas that the students were constantly springing up. Thank you very much for the Qilu Software Design competition to provide students with such a good platform, so that they can show their strength, but also make them see their potential, for the future employment and entrepreneurship lay a good foundation!

Contact information:
(1) Mailing address: Binzhou College, Binzhou, Shandong Province
(2) Tel: 18366879731
(3) E-mail:[email protected]
(4) QQ number: 1764541256

Mobile phone anti-theft

Native control Module

Remote Control Module

Mobile phone anti-theft settings

Remote Control Alarm Ringtones

Remote Control lock Screen

Remote control of formatted phone

Remote Control phone dialing

Remote access GPS latitude and longitude of mobile phone

Open Baidu Map Get phone location

One-click Uninstall software

Password reset

Turn off alarm Music

One Button lock screen

Phone call for help

Learning Communication

PS: If you want to talk with a cat and learn, you can add me qq:1764541256, or Znycat

2014 Qilu Software Competition smart phone application First prize--anti-theft star

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.