First prize of the 2014 Qilu software competition smartphone application-anti-theft star, 2014 Qilu

Source: Internet
Author: User

First prize of the 2014 Qilu software competition smartphone application-anti-theft star, 2014 Qilu

CAT/CAT sharing, must be excellent

This is the android file of this cat that participated in the Qilu software competition for 14 years. You are welcome to exchange and learn.

Material address: http://download.csdn.net/detail/u013357243/8558913
Original address: http://blog.csdn.net/u013357243? Viewmode = contents
Video address:
Http://player.youku.com/player.php/sid/XODIzNjI3Nzcy/v.swf

Project Personnel

Yi Nai Yu Wang Li Heng Li Zhi Li Baozhong

Project Thesis

Smart Phone development-anti-theft stars
Yi Nai Yu Wang Li Heng Li Zhi Li Baozhong
(Binzhou University, Binzhou 256600)

Summary
The software is targeted at mobile phone theft. The software consists of two modules: the local control module and the remote control module.
The local control module includes mobile phone anti-theft settings, mobile phone distress, one-click lock screen, password reset, alarm music disabled, and one-click Uninstall software.
Remote control includes remote control of alert ringtones, remote control of lock screen, remote acquisition of mobile phone GPS longitude and latitude, open Baidu map to get mobile phone location, remote control of mobile phone dialing, remote control of formatting mobile phone.

Keywords
Android; anti-theft; control; lock screen; alarm; positioning; Software Design

1. Project Background
This software is a mobile app. Now there are more and more smartphone users, and the number of pickpockets is also expanding. They are dedicated to some good smart phones, taking public transportation, shopping ...... You don't even know when it was, but remember the phone that was carried in your pocket or in your bag was missing. It would be a little better if the phone is stolen, however, if a thief uses your phone address book or text message to lie to your relatives and friends or obtain some important information, you may lose more than just a smartphone. Some children's shoes, if there are other hobbies like Edison's, when some privacy photos are put on the mobile phone, will you worry that unscrupulous thieves will put them on the internet? At this time, how to prevent your smartphone from being stolen is almost a required course.
Installing an easy-to-use anti-theft app for your Android mobile phone not only makes it possible for you to find your mobile phone through text messages, positioning, and other methods, even if you cannot find your phone in the worst case, You can remotely control the destruction of various data on your phone. In this way, even if a thief steals your mobile phone, he will not take away the important data from your mobile phone, reducing your losses to a minimum.
In this scenario, our mobile phone anti-theft software is born on the scene, a good anti-theft software can improve the possibility of your mobile phone theft recovery. If your phone is lost, you don't need to find it. Now, your phone is lost. You can use security numbers and other mobile phones to locate your phone and determine where your phone is, you can also format your phone to make your phone and data more secure.

2. Overall System Structure
The software is designed for mobile phone theft. The software consists of two modules: the local control module and the remote control module.
The local control module includes mobile phone anti-theft settings, mobile phone distress, one-click lock screen, password reset, alarm music disabled, and one-click Uninstall software.
Remote control includes remote control of alert ringtones, remote control of lock screen, remote acquisition of mobile phone GPS longitude and latitude, open Baidu map to get mobile phone location, remote control of mobile phone dialing, remote control of formatting mobile phone. 1:

Figure 1: Overall System Structure
3 main functions
3.1 mobile phone anti-theft Module
The first time you enter the mobile phone anti-theft module, you need to set the mobile phone password and password protection questions. Here, you must remember the password and password security. The password is related to the security of your mobile phone. Do not disclose it at will.
3.1.1 mobile phone anti-theft function;
Go to the mobile phone anti-theft function page and set the mobile phone function as prompted. For example, set a security number, Set SIM card binding, set super permissions, select set contacts, and enable the anti-theft function. After the configuration is complete, you can operate
2.1.2. Mobile phone distress function;
If you are outdoors in danger, you can select this function. This function will send a distress message to your bound Security mobile phone. Then, your friends can locate you by GPS at the control end, we not only protect your mobile phone, but also protect your security.
3.1.3 one-click lock screen function;
Do I need to press the lock button frequently when I use a mobile phone? Some mobile phones may even press the lock button less than a year later. To better maintain your mobile phone, we have set this function, click the screen to lock the screen directly, so that you no longer worry about the lock key of your mobile phone.
3.1.4. Password Reset function;
What should I do if I forget my cell phone password accidentally due to carelessness? Don't worry. You just need to click here to reset the mobile phone status with the password protection problem. From then on, you no longer have to worry about remembering the password.
3.1.5. Disable the music function;
Sometimes the mobile phone cannot be found. I use a secure mobile phone to report music to my mobile phone, but what should I do if I find it? Click here to help you close the music.
3.1.6. Click "Uninstall;
If you think our software is not good or you do not like it, it will be very troublesome to uninstall it. You need to cancel the activation in settings, but this function is available, you only need to click the password to uninstall the software.
3.2 lost mobile phone Module
The main function of this module is to control your lost mobile phone. For example, if your mobile phone is lost, you can enter your lost mobile phone number and your lost mobile phone password, you can also use the phone password to control your phone. Therefore, you need to enter the password when you enter the lost module on your mobile phone.
3.2.1 control the alarm function;
If the phone cannot be found, you may have forgotten where to put it. You only need to use another person's mobile phone to enter this module and click it to enable alarm music on your lost mobile phone, if your mobile phone is stolen and the thief gives you a card swap, the background of the mobile phone will automatically send a SIM card change alert message to your bound security number. Then you can know the mobile phone number through text message. Of course, the mobile phone number will be automatically displayed in the phone number box when the module is lost.
3.2.2 remote screen lock function;
When your mobile phone is lost, you can select this function to control the automatic lock screen of your mobile phone. The lock screen password is your mobile phone password.
3.2.3 remote GPS functions;
When the mobile phone is lost, you can select this function to control your mobile phone to turn on GPS and return it to you via SMS. You can open Baidu map to get the location of your mobile phone.
3.2.4 enable the map function;
When you get the GPS latitude and longitude coordinates lost by the mobile phone, you can select this function to display them in a friendly way in Baidu map, you can retrieve your mobile phone by using the Map Display location and alarm control functions.
3.2.5 remote dialing;
When a mobile phone is lost, you can select this function to control your mobile phone to call a security number. Then, you can use the security number to answer the question and get the nearby voice of the thief.
3.2.6. Remote formatting;
If your mobile phone contains private information when it is lost and you do not want it to be seen by others, you can use this function to format your mobile phone with one click.

3 main innovations
Automatic Alarm for SIM card replacement.
Remote GPS positioning.
The location of the mobile phone is displayed on the map.
Remote Control of mobile phone dialing security number.
Format the phone remotely.
Remote Control of cell phone lock.
Remote Control of mobile phone alarms.

4 Technical Points
4.1 structure and running process of the Android Program
The first layer of the Android project folder includes: "src", "Android Library", "assets", "res" directory, and AndroidMainifest. xml Files are stored in the main program and program class in "\ src", and the Resource Files in "\ res ), such as the program ICON, layout file (\ layout), and constant (value ).
The main class of the Android program. Its content is similar to the general java program format. The main class inherits from the Activity class. Generally, the onCreate () method is rewritten in the main class. In this method, setContentView () is used to set the layout of the Activity to be displayed.
There are three types of Android applications: front-end Activity (Foreground Activity), Background Service (Background Services), and Intermittent Activity ). A front-end activity is a basic component of an Activity application and runs in a mobile phone frontend program. The background Service program may be an invisible System Service or Broadcast message) it is similar to the Receiver for executing Activity at intervals such as Threading and Notification Manager.
Once an application is executed, it is executed in the order shown in Figure 3. If you need to write a program in the Activity, the onCreate (Activity) focus is the common entry point by default) and onStart (Service ). OnResume () and onPause () methods are the life cycle of the Activity running after onCreate. When the program loses the front-end focus or is disabled, the onPause () Status of the Activity is triggered; when the application is awakened again, it will return to the OnResume () state.
Figure 2: Logical Structure of a program
Figure 3: basic program process of android

4.2 Baidu map used in Mars coordinates
Mobile phone map service refers to the user's mobile phone through the HYPERLINK "http://baike.baidu.com/view/7319.htm" \ t" http://baike.baidu.com/view/_blank" WAP method or client software method, it is a location service related to user location for finding the location information of yourself and friends, querying the surrounding information, and planning traffic routes. HYPERLINK's "Hangzhou \ t" http://baike.baidu.com/view/_blank" mobile phone map provides you with a convenient and practical handheld map, in the small square inch of the "Hangzhou \ t" mobile phone screen of HYPERLINK, you can search for food, play, and city information, locate yourself and your friends, and find the road information, and become your portable HYPERLINK "Hangzhou \ t" http://baike.baidu.com/view/_blank" Wizard to easily access the city, no worries
Our application is based on Baidu statistics API and integrated with Baidu map API to implement Baidu question map application.
In the use of map technology, the Mars coordinate problem occurs.
Mars coordinates: The National Security plug-in, also known as the encryption plug-in or the addition of partial or SM modules, is actually a human bias processing for the real coordinate system, according to several lines of code algorithm, the real coordinates are encrypted into false coordinates, and this offset is not linear, so the offset conditions vary across regions. The encrypted coordinates are also known as the Mars coordinate system. To solve this problem, we have obtained a solution from the open source website. Then, based on the ModifyOffset class, the solution is implemented. However, if you want to go public for operation, you need to apply for permissions from the corresponding national departments.

4.3 customize the UI control modeled on WP8
We made our own innovations on the interface, taking the blue sky and the prairie as the background, and then gave the button control modeled after the WP8 mobile phone UI. MagnetView Based on ImageView is located under the package of com. laonai. ui.
This feature allows you to zoom in and out of the middle of the WP8 click, and click the special effect of the four sides to achieve the gorgeous change of the custom ImageView of the mobile phone.
4.4 security issues and MD5 Encryption
We use MD5 encryption for the password stored in the mobile phone, and use the MD5 three-step encryption and one-digit offset algorithm in the algorithm, which fully ensures that the password is not cracked.

package com.bzu.mobilesafe.utils;import java.security.MessageDigest;import java.security.NoSuchAlgorithmException;public class Md5Utils {    public static String encode(String password) {        MessageDigest digest;        try {            digest = MessageDigest.getInstance("MD5");        } catch (NoSuchAlgorithmException e) {            // TODO Auto-generated catch block            e.printStackTrace();            // can't reach            return "";        }        byte[] result = digest.digest(password.getBytes());        StringBuffer sb = new StringBuffer();        for (byte b : result) {            int number = b & 0xff - 5;            String str = Integer.toHexString(number);            if (str.length() == 1) {                sb.append("0");            }            sb.append(str);        }        return sb.toString();    }}

5 conclusion
In the era of mobile Internet, the continuous improvement of science and technology makes the electronic product upgrading faster and faster, and the style and hardware of mobile phones are constantly upgrading. At the same time, the mobile app market, which is accompanied by mobile phone development, has also seen a skyrocketing growth, reaching people's daily lives. As people rely more and more on mobile phones, mobile phone anti-theft has become the most important issue for mobile phone users.
In this context, the mobile phone anti-theft software is designed to improve the possibility of mobile phone theft and retrieval. If your phone is lost, you don't need to find it. Now, your phone is lost. You can use security numbers and other mobile phones to locate your phone and determine where your phone is, you can also format your phone to make your phone and data more secure.
However, due to the limited level of personnel in this group, it was the first time to develop complex android programs. Various problems have been encountered during program development. In the final version of the program, there must also be many issues that have not yet been discovered. Please criticize and correct them.

References
[1] title of the 11th Qilu software design competition, 2013
[2] Press 2007
[3] The Chinese version of Photoshop7.0 should be followed by Tsinghua University Press 2003
[4] "android sdk development example Daquan" Yu zhilong Chen yixun Deng mingjie Zheng mingjie Chen Xiaofeng Guo qijun Wang shijiang adapted 2010
[5] xml database technology is often selected by Tsinghua University Press 2005.

Instructor comment:
The Software Design Competition took about two months, from researching each design question to finally selecting the question; from learning the knowledge required for various software design, to starting software design, finishing the work, and then summarizing and discussing it, I really saw the changes of every team member: from the first ignorance to the gradual adaptation of the team, everyone gradually clearly understands their position in the entire team, and even can recognize and strive for the same goal of everyone, with the strength of a team, I said this team must be on the way to this software design competition.
Since most teams do not have any experience in software design, at the beginning, we can only do it for the purpose. After all, the workload of software design is huge, in such a limited period of time, it is difficult to make satisfactory works according to the software design requirements. Especially in the software design process, they also encountered many technical difficulties, and these problems are professional software design problems, but they are not hard to beat them, it is encouraging to consult experts or consult relevant materials to overcome the difficulties step by step until the work is completed.
After one and a half months, their work has basically been completed, and the rest is the final work of the software, so that everyone does not despise every step in the software design process, complete code, implement functions, and beautify the work. Throughout the software development process, I actually saw the amazing self-learning ability of the students, and I was amazed by the students' emerging whimsy. I am very grateful to the Qilu software design competition for providing such a good platform for students to demonstrate their strength and their potential, lay a good foundation for future employment and entrepreneurship!

Contact information:
(1) Mailing address: Binzhou College, Binzhou City, Shandong Province
(2) Tel: 18366879731
(3) E-mail: znycat2013@163.com
(4) QQ No.: 1764541256.

Mobile phone theft prevention

Local Control Module

Remote Control Module

Mobile phone anti-theft settings

Remote alert ringtones

Remote control lock screen

Remote Control of mobile phone formatting

Remote Control of mobile phone dialing

Remote Acquisition of mobile phone GPS longitude and latitude

Open Baidu map to get mobile phone location

One-click Software Uninstall

Password Reset

Disable alarm music

One-click lock screen

Mobile phone for help

Learning and communication

Ps: if you want to communicate with cats and cats, you can add qq: 1764541256 or znycat.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.