Post on 09-Feb-2022
camera of device if available and then will be saved
on to the device.’
7. Future Scope
This application can be helpful in organizations
where the owner provide the employees tablets.
For maintaining the security and integrity of data
handle in organizations folder and file like .pdf and
.doc can also locked for guest implemented in
Device policy Manager.
8. Conclusion
In this paper, we presented full smart Android
security over existing System that allows android
users to create two account in phone and access these
account easily without any security fear. And also the
user share their phone with anyone without extra
activities like SIM lock from their DPM application
through our prototype, mobile security applications
installed in the phone easily. The provided security is high level, because you can’t access any function till
you does not enter the correct password.
Our prototype also boosts the performance of mobile
applications by providing face capturing and call
locking resources for admin beneficial, without
draining the device battery.
9. References
[1] "Android.com," Available:
http://www.android.com
[2] W. Enck, M. Ongtang, and P. McDaniel.
Understanding Android security. IEEE Security &
Privacy Magazine,7(1):10–17, 2009. [3] Technical Blog of SaiGeetha dedicated to
Android, http://saigeethamn.blogspot.com/
[4] Daecon, John. 2009. Model-View-Controller
(MVC) Architecture.
[5]Sayed Y Hashimi and SatyaKomatineni, “Pro
Android”, Wiley India Pvt Ltd. (2009)
[6]Android Developers official website,
http://developer.android.com/guide/topics/ui/index.ht
ml
[7] A visual interface editor for Android,
http://www.droiddraw.org/
[8]http://elinux.org/Android_Architecture.
Sumaiya Patel et al , Int.J.Computer Technology & Applications,Vol 4 (3),374-377
377
ISSN:2229-6093
IJCTA | May-June 2013 Available online@www.ijcta.com