Security for the Passwords in Mobile Phone Using SHA Technique
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#1
07-10-2010, 11:25 AM


Abstract

These days, anyone who is on the web regularly needs too many passwords, and it’s impossible to remember them all. Generally if we have too many passwords to remember we will be writing them all down on a piece of paper and hide it somewhere. However we cannot ensure security for that.
We designed password safe application as another solution. It’s a small program that encrypts all of your passwords using one passphrase. The program is easy to use, and isn’t bogged down by lots of unnecessary features. This application provides security through simplicity.
This is an end-user java application that stores sensitive information like passwords on mobile phones with strong encryption. This Uses SHA encryption Technique to secure the information. The application requires Java Micro Edition (J2ME) with MIDP-1.0, which is available on most current mobile phones.


Module:
- Security Module
- Password Storage Module
- Password Retrieval Module


1. Security Module:
In This module we Use the SHA Algorithm to encrypt and decrypt the password which is required to enter into the application.
2. Password Storage Module:
In This module the user store his passwords in to the application.
3. Password Retrieval Module:


In This module user can view his passwords by login in to the application.

Technical Environment:

Operating System : Microsoft Windows, Linux or Mac any version
Technologies : Java, J2ME
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Security using colors and Armstrong numbers Moiz ansari 2 170 21-10-2015, 12:10 PM
Last Post: mkaasees
  Wireless Sensor Network Security model using Zero Knowledge Protocol seminar ideas 2 1,452 31-03-2015, 09:08 AM
Last Post: Guest
  security features of atm ppt jaseelati 0 289 16-02-2015, 04:47 PM
Last Post: jaseelati
  abstract cybercrime and security paper presentation jaseelati 0 292 13-02-2015, 02:01 PM
Last Post: jaseelati
  advantages and disadvantages of mobile phones in telugu jaseelati 0 233 07-02-2015, 02:21 PM
Last Post: jaseelati
  mobile phone based attendance tracking system ppt jaseelati 0 331 30-01-2015, 01:57 PM
Last Post: jaseelati
  mobile advantages and disadvantages in hindi wikipedia jaseelati 0 654 29-01-2015, 01:49 PM
Last Post: jaseelati
  mobile data internetworking standards jaseelati 0 334 29-01-2015, 01:15 PM
Last Post: jaseelati
  security features of atm abstract jaseelati 0 304 17-01-2015, 04:13 PM
Last Post: jaseelati
  difference between soc and aoc in mobile computing jaseelati 0 341 20-12-2014, 01:12 PM
Last Post: jaseelati