Abstract

The “Contact Recognition App Using Fingerprint Sensor” enables users to securely manage and access their contact information through biometric authentication. This app allows users to store and access their contacts, with the added security of fingerprint authentication to ensure that only the authorized user can view or modify the contact details. The primary goal of the application is to enhance the security of personal and sensitive contact information, making it difficult for unauthorized users to access these details even if they have physical
access to the device.

Existing System

Traditional contact management apps on mobile devices typically rely on basic security measures such as PINs, passwords, or patterns to protect access to contact information. Although these methods provide some security, attackers can easily compromise them through techniques like shoulder surfing or brute force attacks. Additionally, when someone unlocks the device, they can access all contacts without further authentication. This situation poses a security risk, especially if someone loses the device, it gets stolen, or the user’s password is compromised.

Proposed System

The proposed Contact Recognition App enhances the security of contact information by integrating fingerprint authentication directly into the contact management process. Users must authenticate using their fingerprint each time they access or modify their contacts. The system encrypts and securely stores contact details, ensuring data remains safe even if someone compromises the device. The app will also include features such as secure contact sharing, where recipients can only view shared contacts after authenticating with their fingerprint. This approach significantly reduces the risk of unauthorized access and ensures that sensitive contact information is protected.

Methodology

  1. Requirement Analysis: Gather user requirements and identify potential security threats to
    design an effective and user-friendly contact management system that leverages fingerprint authentication.
  2. Design: Develop the system architecture, focusing on the integration of fingerprint authentication with contact management. Design a user-friendly interface that simplifies the process of accessing and managing contacts securely.
  3. Development: Implement the core functionalities, including fingerprint authentication, encrypted contact storage, and secure contact sharing. Develop the app using best practices in mobile security.
  4. Integration: Ensure seamless integration with the device’s fingerprint sensor API (e.g., Android’s BiometricPrompt API) and the existing contact management framework.
  5. Testing: Conduct thorough testing, including unit testing, integration testing, and security testing,
    to ensure the app functions as expected and provides a high level of security.
  6. Deployment: Launch the app on the Google Play Store and Apple App Store, making it available
    to users who require enhanced security for their contact information.
  7. Maintenance and Updates: Provide regular updates to address any security vulnerabilities,
    improve performance, and introduce new features based on user feedback.

Technologies

  1. Programming Language: Java/Kotlin for Android development and Swift for iOS development.
  2. Biometric Authentication: Use Android’s BiometricPrompt API or iOS’s LocalAuthentication framework to implement fingerprint authentication.
  3. Encryption: AES encryption for securely storing contact information on the device.
  4. Database: SQLite or a similar lightweight database for managing encrypted contact data.
  5. UI/UX Design: Android XML and SwiftUI for designing a secure and intuitive user interface.
  6. Security: Implement secure coding practices, encryption, and data protection mechanisms to ensure the app’s security.
  7. Testing Tools: Use JUnit and Espresso for Android testing, and XCTest for iOS testing, to ensure app reliability and security.
Contact Recognition App,
Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *