Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma.

Slides:



Advertisements
Similar presentations
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Advertisements

Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
Lee Hang Lam Wong Kwun Yam Chan Sin Ping Wong Cecilia Kei Ka Mobile Phone OS.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Mobile Security 310KM Lab 4 Group Presentation NG KING TUNG MA HO YIN CHE CHUN KIT WOO SHUN CHAK.
Patient’s privacy protection with anonymous access to medical services Dasun Weerasinghe, Kalid Elmufti, M Rajarajan, Veselin Rakocevic Mobile Networks.
Chung Man Ho Willims Chow Man Kei Gary Kwok Pak Wai Lion.
FIT3105 Smart card based authentication and identity management Lecture 4.
Cyber Security and Key Management Models Smart Grid Networks The Network System Key Management and Utilization Why Hardware Security Christopher Gorog,
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
1 Security and Protection Chapter 9. 2 The Security Environment Threats Security goals and threats.
Final Project Review Team Tessier Brandon Thorpe Michael Shusta Telin Kim Lucas Root.
Henric Johnson1 Network Security /. 2 Outline Attacks, services and mechanisms Security attacks Security services Methods of Defense A model for Internetwork.
Multi-Factor Authentication Added protection for a more secure you Presenter: Jeff Penn.
PASSWORD MANAGER Why you need one 1. WHAT IS A PASSWORD MANAGER? A modern Password Manager is a browser extension (Chrome, Internet Explorer, Firefox,
Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma.
Confidential Computer Systems Group HD Lock for Toshiba Notebook August 3rd, 2006.
CRYPTOGRAPHY PROGRAMMING ON ANDROID Jinsheng Xu Associate Professor North Carolina A&T State University.
魂▪創▪通魂▪創▪通 Use Case and Requirement for Future Work Sangrae Cho Authentication Research Team.
RIVERA SÁNCHEZ-1 CSE 5810 User Authentication in Mobile Healthcare Applications Yaira K. Rivera Sánchez Computer Science & Engineering Department University.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
The secret to creative success is knowing how to hide your sources! — Albert Einstein.
Getting organized was never so easy. Every person in the world will have some or the other Valuable Information which should be protected from anybody,
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
Binary Auditing Geller Bedoya Michael Wozniak. Background  Binary auditing is a technique used to test the security and discover the inner workings of.
PRESENTED BY : MOHAMMAD DIAB ALAA’ DWAIKAT SUPERVISOR: DR.SUFYAN SAMARA GRADUATION PROJECT PRESENTATION Amany 3la Al Tareeq أماني على الطريق.
MOBILE MEDICAL INFORMATION FOR THE DEAF By: Siphokazi Dayile Supervisor: Prof I Venter Co-supervisor: Prof WD Tucker.
Additional Security Tools Lesson 15. Skills Matrix.
© Oxford University Press 2011 DISTRIBUTED COMPUTING Sunita Mahajan Sunita Mahajan, Principal, Institute of Computer Science, MET League of Colleges, Mumbai.
Mobile Device Security Drew Hayes Christ Liechty November 27, 2007.
Advanced Windows 8 Apps Using JavaScript Jump Start Exam Prep M5: Data, Files, and Encryption Michael Palermo Microsoft Technical Evangelist Jeremy.
Transparent Data Encryption
Password Security & Software Encryption n John Barthmaier n October 21, 2009.
出處 :2010 2nd International Conference on Signal Processing Systems (ICSPS) 作者 :Zhidong Shen 、 Qiang Tong 演講者 : 碩研資管一甲 吳俊逸.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Data Security.
1 Network Security Lecture 7 Overview of Authentication Systems Waleed Ejaz
PREVIOUS GNEWS. try again next week Patch Tuesday.
Maintaining a Cache of Previously Queried Prefixes “Telepathwords: Preventing weak passwords by reading users’ minds.” Saranga Komanduri, Richard Shay,
1. U2F Case Study Examining the U2F paradox 3 What is Universal 2 nd Factor (U2F)?
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Knut S-C Öjermark K enmark International Pleasanton Senior Center.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Sofia, 2008 Valery Konyavsky New Approaches to Ensure Cybersecurity VNIIPVTI All-Russia Research-and- Development Institute for Problems of Computing Equipment.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Mobile/Web Enabled Project Management Ideas Do It Yourself Projects: MBProject Lite mbprojectweb.com.
CIS 450 – Network Security Chapter 10 – UNIX Password Crackers.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Over 18 yrs experience with SQL Server
Scott Van Heest IT Specialist, Data Analysis and Support Team, NPCR, CDC Denise Farmer CDC/NPCR Contractor Division of Cancer Prevention and Control National.
Video notification for SignSupport Remind Deaf users when and how to take medication Student : Vuyisa Phindiso Supervisor : Prof. Bill Tucker.
Effective Password Management Neil Kownacki. Passwords we use today PINs, smartphone unlock codes, computer accounts, websites Passwords are used to protect.
2 Factor & Multi Factor Authentication
IT Security Awareness Day October 19, 2016
Google 2 Step Verification Backup Codes Google 2 Steps Verification Backup Codes is very important to get access Gmail account. Backup codes is usually.
Multifactor Authentication & First Time Login
GSBS IT Resources and Security
O.
Operating Systems Security
Two Factor Authentication
IT & Security Training Skills.
Simple Retail Store Software
How to Download And Install McAfee Mobile Security on iOS?
Getting Started With LastPass Enterprise
Presentation transcript:

Mobile security application for SignSupport Protecting a Deaf person’s medical information that is stored on a mobile SD card Student: Lindokuhle Duma Supervisor name: Prof. Tucker

SignSupport Mobile Application Developed by Michael Motlhabi (UWC Masters student)

Tools used

Unlock pattern password GoalProblem

Encryption Problem Goal

accomplished Point reuse in pattern password Storing encryption keys Integrating pattern password with SignSupport Integrating encryption with SignSupport

Term4 project plan

Demo Setting a pattern password Login to SignSupport View Deaf person’s background information while logged in View Deaf person’s background information after logging out

Smudge attack! Generic pattern SignSupport pattern

References [1] lockpattern/wiki/Downloads?tm=2https://code.google.com/p/android- lockpattern/wiki/Downloads?tm=2 [2] Aviv J., Gibson, K., Mossop, E., Blaze, M., and Smith, J. M. (2010, August). Smudge attacks on smartphone touch screens.InProceedings of the4th USENIX conference [3] CA Technologies (2011),authentication-system CE technolo- gies,Advance authentication methods: software vs. hardware http :==www:ca:com= =media=F iles=whitepapers=AMMebooklayout:pdf

Thank you

Source code Encryption and Pattern

Pattern tracking

Pattern color

Password verification

Generating encryption key

Encryption