Você está na página 1de 12

DECLARATION

I hereby declare that this project report is based on original work except for
citation a quotation which has been duly acknowledged. I also declare that
the report is not been previously and concurrently submitted for any other
diploma or award at any government and private educational institutions.

1. Signature :

Name : MAGENDRAN A/L SANGAR

Registration Number : 01DIS14F1046

Date :

2. Signature :

Name : NUR MUHAMMAD NAIM BIN


ZAINUDIN

Registration Number : 01DIS14F1044

Date :

3. Signature :

Name : MUHAMMAD IQBAL ADIL BIN MOHD


MAHDZIR

1
Registration Number : 01DIS141032

Date:

APPROVAL FOR SUBMISSION

Project Title : PROTECTION APPLOCK (P-APPLOCK)

Session : JUNE 2016

Submitted by : 1. MAGENDRAN A/L SANGAR (01DIS14F1046)

2. NUR MUHAMMAD NAIM BIN ZAINUDIN


(01DIS14F1044)

3. MUHAMMAD IQBAL ADIL BIN MOHD


MAHDZIR (01DIS14F1032)

This project report has been proposed, checked and approved as a


fulfilment and need of report writing as determined.

Checked by :

Supervisors Signature :

Supervisors Name : MDM. MAZNITA BINTI MOHAMED FIKRE

Date :

Approved by :

Coordinators Signature :

2
Coordinators Name :

Date :

ACKNOWLEDGEMENT

Alhamdulillah, all praises to Allah S.W.T., The Most Greater and The Most
Merciful, because without His permission, we cannot finished our project
which is named Protection Applock (P-APPLOCK) .We also wish to
express our gratitude to our supervisor Mdm .Maznita Binti Mohamed
Fikre because of her guidance and encouragement from all aspect during
the process preparation of this project until finished.

We would like to thanks to all lecture of Ungku Omar Polytechnic whose


contributed in guiding us in the development of this project. In addition, we
would like to express our honor toward our family especially our parent in
every moral support that given. Without their encouragement and advice,
maybe we will not able to overcome the problem encountered during the
process to complete this task.

Last but not least we would like to express our thanks to our friend because
of their advice and guidance. Thank you for being there at the time us
almost down and give up to complete this project. Finally we want to
thanks to all of you. Thank you so much.

3
ABSTRACT

Nowadays there are a lot of smartphone user use the lock screen application
to maintain the safety of their smartphone from an authorized user but they
do not know that application lock also important to the user in matter to
avoid in matter privacy information from being stolen the purpose of the
project is to develop an application lock special to lock the apps that
contain privacy issues from intruder the project were namely P-
APPLOCK

This application lock is developing to replace the existing application that


available in android playstore. This app is used to make sure that privacy
issues of the user are maintain safe from any intruders. Furthermore this P-
APPLOCK was developed by android studio. Overall this project is for
android phone user and the applock can help the user to improve their
piracy keep secured.

4
CONTENTS

LIST PAGE

DECLARATION I

APPROVAL FOR SUBMISSION II

ACKNOWLEDGEMENT III

ABSTRACT IV

TABLE OF CONTENT VI

LIST OF TABLE X

LIST OF FIGURES XII

LIST OF APPENDICES XIV

5
REFERENCES

TABLE OF CONTENT

CHAPTER 1: INTRODUCTION 1

1.1 Introduction 1

1.2 Problem Statement 2

1.3 Objective 3

1.4 Scope 3

1.4.1 User scope 3

1.5 Project Purpose 4

1.6 Framework 5

1.6 Conclusion 6

6
CHAPTER 2: LITERATURE REVIEW 7

2.1 Introduction 7

2.2 Research Definition 8

2.2.1 CM Lock system 8

2.2.2 P-APPLOCK system 9

2.3 Comparison between P-APPLOCK and CM Lock 10

2.3.1 CM Lock advantages and disadvantage 10

2.3.1.1 Advantages 10

2.3.1.2 Disadvantages 11

2.3.2 P-APPLOCK advantages and disadvantages 11

2.4 Conclusion 12

CHAPTER 3: METHODOLOGY 13

3.1 Introduction 13

3.2 Project Methodology 14

3.3 Methodology 16

3.3.1 Planning Phase 16

3.3.2 Analysis Phase 16

3.3.3 Design Phase 17

3.3.4 Coding Phase 17

3.3.5 Testing and Implementation 18

7
3.3.6 Support Phase 18

3.4 Conclusion 19

CHAPTER 4: SYSTEM ANALYSIS AND DESIGN 20

4.1 Introduction 20

4.2 Software and Hardware Requirement 21

4.2.1 Software Requirement 21

4.2.2 Hardware Requirement 22

4.3 Implementation Costs 23

4.3.1 Hardware Cost 23

4.3.2 Software Cost 24

4.4 Context Diagram 25

4.5 Data Flow Diagram 26

4.6 Flow Chart 27

4.7 Logical System Design 28

4.7.1 Pattern Lock Interface 28

4.7.2 Main Page Interface 29

4.7.3 Home Page Interface 31

4.7.4 View Intruder Page Interface 32

4.7.5 Setting Page Interface 33

4.7.6 Pattern Change Setting Page Interface 35

4.7.7 Security Question Change Setting Page Interface 36

4.7.8 About Us Interface 38

8
4.8 Physical System Design 39

4.8.1 Pattern Lock Page 39

4.8.2 Main Page 40

4.8.3 Home Page 41

4.8.4 View Intruder Page 42

4.8.5 Setting Page 43

4.8.6 Pattern Change Setting Page 44

4.8.7 Security Question Change Setting Page 45

4.8.8 About Us Page 46

4.9 Conclusion 47

CHAPTER 5: DEVELOPMENT AND TESTING

5.1 Introduction 48

5.2 System design 49

5.3 System Testing 52

5.3.1 Unit Testing Plan 52

5.3.2 The Unit Testing Plan for Pattern Lock Access 53

5.3.3 First Pattern Set For User 54

5.4 Testing Result 55

5.4 Conclusion 85

CHAPTER 6: CONCLUSION 56

6.1 Introduction 56

6.2 Application Advantage and Disadvantage 57

9
6.2.1 Advantage Of The Application 57

6.2.2 Disadvantage Of The Application 57

6.3 Future Works 58

LIST OF TABLES

Table 4.1: Software requirement 23

Table 4.2: Hardware requirement 24

Table 4.3: Types of hardware and expenses cost 25

Table 4.4: Types of software and expenses cost 26

Table 4.5: Pattern Lock page Interface Description 31

Table 4.6: Main page Interface Description 33

Table 4.7: Home page Interface Description 35

Table 4.8: View Intruder page Interface Description 37

Table 4.9: Settings page Interface Description 39

Table 4.10: Pattern Change Settings page Interface Description 41

Table 4.11: Security Question Change Settings page Interface Description


43

10
Table 4.12: About Us page Interface Description 45

Table 5.1: Status Implementation of Pattern Lock page 56

Table 5.2: Status Implementation of Main page 56

Table 5.3: Status Implementation of Home page 57

Table 5.4: Status Implementation of View Intruder page 57

Table 5.5: Status Implementation of Settings page 57

Table 5.6: Status Implementation of Pattern Change Settings page 58

Table 5.7: Implementation of detail of the Security Question Change


Settings page 58

Table 5.8: Status Implementation of detail of the About Us page 58

Table 5.9: Pattern Lock Access 60

Table 5.10: First Pattern set 61

LIST OF FIGURES

Figure 1.1: P-Applock application 5

Figure 3.1: Waterfall backflow model 15

Figure 4.1: Context Diagram 27

Figure 4.2: Data Flow Diagram 28

Figure 4.3: Flowchart of create pattern, unlock & set Apps to lock29

11
Figure 4.4: Pattern Lock page 30

Figure 4.5: Main page 32

Figure 4.6: Home page 34

Figure 4.7: View Intruder page 36

Figure 4.8: Settings page 38

Figure 4.9: Pattern Change Settings 40

Figure 4.10: Security Question Change 42

Figure 4.11: About Us page 44

Figure 4.12: Pattern Lock page design 46

Figure 4.13: Main page design 47

Figure 4.14: Home page design 48

Figure 4.15: View Intruder page 49

Figure 4.16: Settings page design 50

Figure 4.17: Pattern Change Settings page design 51

Figure 4.18: Security Question Change Settings page design 52

Figure 4.19: About Us page design 53

12

Você também pode gostar