Team 6: Faisal Moiz Raymond Nnodim Michael Woodruff Instructor: Dr. Bun Yue Mentor: Craig Russell – Tietronix Software 1 Capstone – Spring 2012 Android.

Slides:



Advertisements
Similar presentations
Mobile Devices in the DoD
Advertisements

Android Smart Card ID Checker UHCL Capstone Team 6 Michael Woodruff Raymond Nnodim Faisal Moiz.
Cloud PIV Authentication and Authorization Demo PIV Card User Workstation Central Security Server In order to use Cloud Authentication and Authorization.
Michal Bodlák. Referred to as mobile money, mobile money transfer, and mobile wallet generally refer to payment services operated under financial regulation.
New Release Announcements and Product Roadmap Chris DiPierro, Director of Software Development April 9-11, 2014
HCE AND BLE UNIVERSITY TOMORROWS TRANSACTIONS LONDON, 20 TH MARCH 2014.
Data-Intensive Cloud Control for GENI GEC 8 demo Orca control framework July 20, 2010 Michael Zink, Prashant Shenoy, Jim Kurose, David Irwin and Emmanuel.
1 GP Confidential © GlobalPlatform’s Value Proposition for Mobile Point of Sale (mPOS)
SECAM Systems Product Presentation SECAM Systems © 2010.
SENIOR DESIGN ITERATION © Computer Science Department, Texas Christian University.
15 Tactical Improvements to IT Security Virtual Keyboard, Two Factor Authentication, Active Confirmation and FAA Access to CPS Online Ganesh Reddy.
PulseHR Time and Attendance software development and coding web development, web hosting IT project management and consulting Str. Ghioceilor.
NTASC PRESENTATION – PART I 04/05/14 © Computer Science Department, Texas Christian University.
OPC Systems.NET. Open Automation Software Based in Lakewood, Colorado USA Founded in 1994 OPC Systems.NET released in 2004 Over 100k+ server licenses.
FIT3105 Smart card based authentication and identity management Lecture 4.
15 Chapter 15 Web Database Development Database Systems: Design, Implementation, and Management, Fifth Edition, Rob and Coronel.
Component-Based Software Engineering Introducing the Bank Example Paul Krause.
Moira Team Again_ Dongjoon Lee Changyun Kim Sangeun Kwon 1 st proposal presentation : Smart Phone App. for grouping people.
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Midway Design Review.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System interfaces Updated: November 2014.
eGovernance Under guidance of Dr. P.V. Kamesam IBM Research Lab New Delhi Ashish Gupta 3 rd Year B.Tech, Computer Science and Engg. IIT Delhi.
Remotely monitor and control a DCS (Distributed Control system) system of a miniature Oil platform through a 2D representation model Presented by - Himendra.
1 Generic SMS Gateway for AtLink Enterprise Voice Integration Instructor: Dr. Kwok-Bun Yue, Ph.D Mentor: Mr. Dilhar De Silva Team #6: Dang Nguyen Huy Do.
Remotely monitor and control a DCS (Distributed Control system) system of a miniature Oil platform through a 2D representation model Presented by - Kirthy.
NFC Inventory Android App
Case Study Portable Wireless Network for Emergency Response.
Sharepoint Portal Server Basics. Introduction Sharepoint server belongs to Microsoft family of servers Integrated suite of server capabilities Hosted.
Lecture 9: Security via PGP CS 436/636/736 Spring 2012 Nitesh Saxena.
Chapter 10 Remote Access and Wireless Networking Business Issues Logical & Physical Topology Technology: Hardware & Software, & Wireless Personnel Communication.
System Architecture & Hardware Configurations Dr. D. Bilal IS 592 Spring 2005.
For more notes and topics visit:
Unit 30 P1 – Hardware & Software Required For Use In Digital Graphics
Cosc 4/5730 Android and Blackberry Near Field Communications (NFC)
Copyright © Team #4 CSCI 6838 Spring Ad Hoc Graphical Reports CSCI Research Project and Seminar Team #4 March 1, 2007.
Ken Dorsey KA8OAD. What is EchoLink? The simple answer is EchoLink software uses VoIP technology to link ham radio stations together around the world.
Education and New Technology Digital Cameras. What is a Digital Camera? Takes video, photographs, and sometimes sounds digitally by recording images through.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
Module 7: Fundamentals of Administering Windows Server 2008.
Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore.
PPT Slides by Dr. Craig Tyran & Kraig Pencil Computer Networking – Part 1 MIS 320 Kraig Pencil Summer 2014.
Web Security : Secure Socket Layer Secure Electronic Transaction.
Computer Emergency Notification System (CENS)
Zdenek Nejedly, Campus Services Rasim Duric, Lelio Fulgenzi, Deborah MacDougall, Networking Services Computing & Communications Services University of.
28 th International Traffic Records Forum Biometrics/SmartCard Workshop 28 th International Traffic Records Forum August 4, 2002 Orlando, Florida.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
Ad Hoc Graphical Reports Ad Hoc Graphical Reports Copyright © Team #4 CSCI 6838 Spring CSCI Research Project and Seminar Team# 4 (
INTRODUCTION TO DBS Database: a collection of data describing the activities of one or more related organizations DBMS: software designed to assist in.
Trunica Inc. 500 East Kennedy Blvd #300 Tampa, FL Cross Platform Mobile Apps With Cordova and Visual Studio 2015 © Copyright 2015.
The Internet of Things with Live Data Cloud by Open Automation Software.
Data-Intensive Cloud Control for GENI GEC 10 Orca control framework March 15 th, 2011 Michael Zink, Prashant Shenoy, Jim Kurose, David Irwin and Emmanuel.
S O A P ‘the protocol formerly known as Simple Object Access Protocol’ Team Pluto Bonnie, Brandon, George, Hojun.
MINICHECK ID Pro™ Team #2 07/02/08. Team Members Imran Ullah Mohammad Roles: Team Lead, Programmer Id: Anjali.
CSE 403 LCO Presentation Chris Scoville. Operational Concepts Create a built in 411-type system in a cell phone Allows the user to find a person’s phone.
CMPE 226 Database Systems April 19 Class Meeting Department of Computer Engineering San Jose State University Spring 2016 Instructor: Ron Mak
System Optimization Networking
Boeing NFC Part and Process Tracking System Team 41 Alper Olcay – Vigneshwar Karthikeyan – Jinjoo Nam.
Secure Services Shared Hosted MS Exchange 2010.
SMART HOME Capstone project introduction Capstone project _Star team. Dec-12 1.
RFH Team Supervisor: Mr. Phan Trường Lâm Nguyễn Việt Nam – Cao Quốc Hưng – Võ Hoàng Việt – Trần Thị Bích – Nguyễn Tiến Chung -
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Project SCS a lightweight source control system for Windows platforms.
Information Technology Deanship
Get the Most Out of GoAnywhere: Agents
The Client/Server Database Environment
reporting on event attendance using a simple yet effective method
Cesar Lomeli.
Introduction to Smart Search
Telecom Software & VoIP Communication Platforms Provider.
Chit fund software, Online Chit fund software,chit fund management software,chit fund accounting software,android chit fund software,chit fund software online
Presentation transcript:

Team 6: Faisal Moiz Raymond Nnodim Michael Woodruff Instructor: Dr. Bun Yue Mentor: Craig Russell – Tietronix Software 1 Capstone – Spring 2012 Android Smart Card ID Checker

Presentation Overview Background Requirements Design Demo Results

Presentation Overview Background Requirements Design Demo Results

PIV Cards Background Requirements Design Demo Results HSPD-12 (Aug. 2004) – Presidential Directive to create a government- wide standard ID FIPS 201 (Feb. 2005) – NIST standard to fufill HSPD-12 – Defines PIV card

PIV Smart Card Microprocessor and Storage Contact or NFC Contactless NFC is – Standardized – ISO/IEC – High Frequency – MHz – Short Range – 10cm or less Background Requirements Design Demo Results

Presentation Overview Background Requirements Design Demo Results

Purpose of Project Johnson Space Center (JSC) personnel are all assigned PIV cards The PIV cards are visually inspected by security at entrances Using portable PIV scanners would help to increase security Background Requirements Design Demo Results

Why Use Android? Purpose-built scanners – Expensive – Too big or small screen Android – Many new models support NFC – Inexpensive – Lightweight with big screen – Lots of features /06/ /gI_0_0_DSC00111.jpg $4,700 alog/images/IT-800.jpg $1,431 $200 - $450 MaxID IDL500 CASIO IT-800 Samsung Galaxy Nexus Background Requirements Design Demo Results Galaxy-Nexus-vs-droid-razr-maxx-600x378.jpg

Requirements Use Android smart phone to read NFC cards Use ID number read to query remote database and display digital replica of ID card Display additional personnel details Display warnings such as revoked or expired cards Log time and location of scans Log and photograph Guests Should work offline Background Requirements Design Demo Results

Presentation Overview Background Requirements Design Demo Results

Architecture Local Database Remote Database Web Server Background Requirements Design Demo Results

Remotely Generated Phone Generated Background Requirements Design Demo Results Data Model

Pull Personnel Records Remote Database Local Database Request records Send records Save records to local database Web Server Background Requirements Design Demo Results Query Remote Database

Scan Card Local Database Save Scan/Guest Logs Remote Database Request records Send records Web Server Background Requirements Design Demo Results Query Remote Database

Retrieve Personnel Data Locally Local Database Use Local Database Web Server Background Requirements Design Demo Results

Push Logs Local database Push Scan/Guest Logs Logs Received Confirmation Delete Logs from Local Database Retrieve Logs to send from local database Remote Database Web Server Background Requirements Design Demo Results Store Logs In Remote Database

Presentation Overview Background Requirements Design Demo Results

Presentation Overview Background Requirements Design Demo Results

Challenges Getting Equipment – Hard to find suitable cards – No local sellers Writing to PIV cards – Complicated specification and limited software Integrating Client and Server – Network communications – Translating data too and from XML Working with Different Android Phones Using Different Vendors’ Cards Background Requirements Design Demo Results

Future Work Security Enhancement – Use encrypted portion of card – Require authentication for app – Use secure connection – Encrypt local data Performance Enhancement – Custom made server application – Compress XML or use binary data format Background Requirements Design Demo Results

Conclusion Android is a good platform for reading PIV cards – The phones are cheap and fast – Android has a native API for NFC – However, there are difficulties running the app on different hardware/Android version Reading cards can be difficult – The NFC reader on the phone can sometimes be underpowered – Some models of card read better than others There would be extra steps for security personnel, but enhanced security Background Requirements Design Demo Results