NEF3001 Applied Project 1: Securing Folders Using Bluetooth System

Verified

Added on  2022/08/16

|19
|3901
|12
Project
AI Summary
This project details the design and implementation of a Bluetooth-based system for securing computer folders. The system architecture includes various subsystems such as initial setup, encryption/decryption, login/logout, and notification management. The project explains how each subsystem functions and interacts, including the use of databases for storing user credentials and device information. The system utilizes Bluetooth for authentication, encrypting folders when the user is away and providing notifications for unauthorized access attempts. The document also covers the user interface design and the implementation techniques using Visual Studio, including an executive summary of the IDE, the reasons for using it, and its benefits. The project aims to provide a secure and convenient method for protecting sensitive data on a computer by leveraging Bluetooth technology for user authentication and access control. This document is a comprehensive design document for an applied project that aims to secure computer folders using a Bluetooth system, with detailed explanations of the system's architecture, subsystems, and implementation techniques.
Document Page
NEF 3001APPLIED PROJECT 1
SECURING COMPUTER FOLDERS WITH BLUETOOTH SYSTEM
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Contents
Introduction......................................................................................................................................1
1. System Architecture of the application....................................................................................2
2. The function of each subsystem and how it works..................................................................4
a) Initial Setup Management Subsystem..................................................................................4
b. Registration Management Subsystem...................................................................................5
c. Login Management Subsystem.............................................................................................5
d. Logout Management Subsystem...........................................................................................6
e. Search Management Subsystem...........................................................................................6
f. Bluetooth Management Subsystem......................................................................................7
g. Deletion Management Subsystem........................................................................................7
h. Device Listing Management Subsystem..............................................................................8
i. Change Password Management Subsystem..........................................................................9
j. Encryption and Decryption Management Subsystem...........................................................9
k. Notification Management Subsystem.................................................................................10
3.User Interphase of the system.....................................................................................................11
4.Implementation Technique about Visual Studio........................................................................12
a. Executive Summary of the IDE(Visual Studio).................................................................12
b. Reasons for using Visual Studio.........................................................................................12
c. Benefits of using Visual Studio over other IDE.................................................................13
Conclusion.....................................................................................................................................13
References......................................................................................................................................15
Document Page
Introduction
In society today due to advancements in technology, we ought to search for ways in which we
can solve our problem with ease, and in the process of solving them depending on what we are
solving it is always good to check the major issue being solved. In this case, we are building a
system that makes it easy for users to secure their computer folders using a Bluetooth system.
For the application to work properly, several factors have been considered when it comes to how
and what is in the folder. When it comes to the subsystems, things like distance and size of the
folder being secured is taken into consideration when securing the document.
The system contains many subsystems that work hand in hand to see that the primary functions
have been achieved at the end. Some of the subsystems found are encryption management,
decryption management, Bluetooth discovery management and also notification management
among many others.
The system will be designed in such a way that it will have an interface that supports Bluetooth
devices. Also as a consideration, the application should always start immediately when the PC is
turned and when the program connects to the mobile device. Another important aspect is that the
program should be able to encrypt folders immediately when the user moves away from the
computer. For this to work properly the program will have a handshake protocol that will be
added, which will run after every 5 seconds to check the Bluetooth connection. In the case,
where someone else is trying to login using a different mobile device then the owner will be
notified through a message.
This document explains all the approaches that will be taken to develop the system. The process
of developing an interactive user interface is also described.
1. System Architecture of the application
Different applications have a different architecture interface which is normally determined by the
users and the functioning requirements [1]. This can also be determined by the type of servers
Document Page
that will be used while developing the application. This section shows how the architecture of the
whole system will look like, and what will be achieved in different stages when subsystems are
communicating with each other. In this case, the subsystem and their corresponding databases
are shown. This is important because it shows where information is being stored and the
developer may now find ways in which they can extract the information and use it in the
querying process [2]. The following figure shows the various subsystems being used in the
application. They include the following:
Initial Setup Management
Encryption Management
Decryption Management
Change Password Management
Bluetooth Discovery Management
Login Management
Logout Management
Deletion Management
Registration Management
Device Listing Management
Notification Management
Search Management
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 1:Variou subsystems with their databases
The above diagram shows the overview of each subsystem and aligns them with their
corresponding database, which is used for storing the required details in each subsystem. The
databases of each subsystem are represented using the rectangles with curved edges.
Document Page
Figure 2: Various subsystems and how they communicate with each other
The above diagram shows how information flows from various subsystems when specific tasks
are being conducted. The pointers shown in the diagram is used to show how information is
being transmitted from one subsystem to another. In the case, above an example of what happens
when a new user launches the application to use is given. The user presses the icon of the app
which initiates the Initial Setup Management Subsystem to alert other subsystems that the
application has been started which will enable the user to register and login to the system. This
acts as the first process being invoked when using the program. Other interactions will pick from
this, once the initial setup has started.
2. The function of each subsystem and how the coordinate
For the system to work properly the various subsystems work together to ensure that the main
goal of the application has been achieved. This section not only lists the subsystems but also tries
to explain how each of them works. They include the following:
a) Initial Setup Management Subsystem
The Initial Setup Management Subsystem is activated by the user when he/she tries to set up how
the program will be working. This process will always begin when notebooks or PCs are turned
Document Page
on [3]. This part of the subsystem initializes the required connection before any activity is carried
out by the system. This part of the program is the one that kicks start all the program activities.
All of this starts when the application icon is pressed by the user.
Figure 3: Initial set up the alarm system
b. Registration Management Subsystem
This subsystem goes hand in hand with registration, login and logout subsystems, where the user
is prompt to enter details depending on whether he/she is logging in to the system for the first
time [4]. In the case of first-time users, they are prompt to enter credentials that they will use to
access the application and use it when needed. The user registers using official names and is
prompt to use alphanumeric in their password which consists of at least five characters this
enhances the security of the system.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Figure 4: The registration alert system
c. Login Management Subsystem
The subsystem works uniquely such that after the user has registered, he/she can log in to a
computer easily provided the application is turned on. This subsystem works well with Bluetooth
Discovery Subsystem to ensure that the mobile device being used to access the computer is on
the device list [5]. The user will always be authenticating him/her self whenever the application
is out of range and wants to log back when he/she is in range.
Figure 5:Login Management system
Document Page
d. Logout Management Subsystem
This subsystem works hand in hand also with the Bluetooth Discovery Subsystem to ensure that
if the user is not in range with his/her computer easily disconnects making the computer
unusable to anyone who does not have the mobile device within the range [5]. At the time when
the system is not in range, the folders are encrypted also.
Figure 6: Logout Management system
e. Search Management Subsystem
It is the one that is responsible for finding devices that are required to connect the mobile device
with the computers that are within the Bluetooth range [6]. When a device is logged into a
system, it uses its MAC address to ensure that it connects to the specific computer that it was
registered with. In the case where someone else tries to log in to the computer, the search
subsystem is responsible for notifying the users about the illegal activity that is about to happen.
In that case, the user has to take precautions to stop the activity.
Document Page
Figure 7: The search management system
f. Bluetooth Management Subsystem
This part of the subsystem ensures that there is a wireless connection between the two devices
which is the computer and the mobile device being used [7]. The devices are easily connected
since they are using radio waves for them to connect to each other. The short-range of
connection in Bluetooth makes it suitable for this type of security. Whenever the user is not close
to his/her computer, it will immediately log off from the system and the device won't be used by
anyone unless he/she has the mobile device that is linked to the computer.
Figure8: Bluetooth system
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
g. Deletion Management Subsystem
The subsystem will be invoked depending on the issue arising from the system. In the case of a
password bridge, the user might be forced to change the password that he/she is using to log in to
the system [8]. When this happens, the user password will be removed from the tray catalog
found in the database so that the same password cannot be used in accessing the same system
again whenever the same mobile device is paired with the computer for connection.
Another considered aspect of the subsystem is that it is the one responsible for handling different
sessions that occur when the two devices pair. In this case, it acts as a security measure on its
own since no one is able to access the system using the sessions that were deleted.
The subsystem also works together with the encryption and decryption subsystem.
Figure 10: Deletion Management system
h. Device Listing Management Subsystem
The device listing subsystem works like a catalog where it tries to capture the entire devices used
by the system. From this, it has a list of devices according to their MAC addresses which go
hand in hand with the password and name of the users. This helps in pairing devices easily since
Document Page
it compares each device with what they paired with earlier before other authentication protocols
are used.
This subsystem is also responsible for sending the notification to other subsystems in cases
where there are an unusual pair. This subsystem ensures the smooth running of the system since
it facilitates faster response to actions that are considered basic.
Figure 11: Deletion Listing system
i. Change Password Management Subsystem
This subsystem enables users to change passwords easily since it will be communicating with the
device listing subsystem [9]. Once a password has been changed the correct one will be
transferred to the list device subsystem and every other thing will be as usual meaning the MAC
address will remain the same but the password will be changed. When this is being done it is
worth noting that also encryption and decryption will be considered so that the right user can
change anything in the system.
j. Encryption and Decryption Management Subsystem
This part of the subsystem plays an important role in ensuring that the security of the system is
enhanced. Encryption in this system has been applied in many places especially in the login part.
Where several encryption methods are being used to ensure that no session can be accessed
easily and hacked when passing information to the intended user [10]. Also when the paired
chevron_up_icon
1 out of 19
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]