Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets"

Transcription

1 ICT Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets Deliverable Security related services evaluation phase 1 Workpackage: Authors: Status: WP5 Service and Application Development Aranzazu Narganes (CGI), Susana Ortega Guilló(CGI) Draft Date: 19/09/2014 Version: 0.5 Classification: Public Disclaimer: The OPENi project is co-funded by the European Commission under the 7 th Framework Programme. This document reflects only authors views. EC is not liable for any use that may be done of the information contained therein.

2 OPENi Project Profile Contract No.: Acronym: Title: URL: FP7-ICT OPENi Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets Start Date: 01/10/2012 Duration: 30 months Partners Waterford Institute of Technology Coordinator Ireland National Technical University of Athens (NTUA), Decision Support Systems Laboratory, DSSLab Greece Fraunhofer-Gesellschaft Zur Foerderung Der Angewandten Forschung E.V Germany INFORMATICA GESFOR SA Spain AMBIESENSE LTD UK VELTI SA Greece BETAPOND LIMITED Ireland 2

3 Document History Version Date Author (Partner) Remarks /07/2014 Aranzazu Narganes (CGI) First version /08/2014 Susana Ortega (CGI) Minor updates /09/2014 Susana Ortega(CGI) Updates /09/2014 Susana Ortega (CGI) Minor updates /09/2014 Susana Ortega (CGI) Fixing advices from reviewers 3

4 Executive Summary This deliverable describes the outcome of T5.1 Security related services evaluation software, phase 1 of the OPENi project. This task is responsible of developing the Service Enablers that provide enhanced features to OPENi developers. These features will be available for WP6 applications. For this first phase, the selected security related service is the Biometric Recognition Service Enabler (SE). For this Service Enabler, it is provided its features, design and a demonstration for the first phase implementation. This Service Enabler (SE) first prototype will be evolved in the next phase in order to enhance their functionalities or implement the missing ones. 4

5 Table of Contents 1 Introduction Biometrics SE Overview, Motivation and Goals Overview Motivation, Goals and innovations Methodology Biometrics SE Design and Architecture Component overview Workflow API Specification Biometrics SE prototype Implementation Outline key components in the Implementation phase How it will interface with OPENi Biometrics SE Demonstration and Source code Biometrics SE Conclusions and Outlook

6 1 Introduction Biometric authentication has to ways to confirm the user s identity and profile in an organization: using one or more physical traits or using a behavioural feature. This kind of processes have greatly increased in popularity with the advent of faster computer processors and increased quality in the data collection devices. Physical traits are body features as fingerprint, iris, or ratios between facial features, while behavioural features as speech and tone cadence or rhythm. In the field of security services, the only identified SE so far is the Biometric Comparison SE. This SE will take advantage in mobile devices improvements about sensors and gadgets to be used in any physical property of the device owner. At this point, the OPENi Biometric comparison SE has focused on face recognition. 6

7 2 Biometrics SE Overview, Motivation and Goals 2.1 Overview The Biometric Comparison Service Enabler (SE) is included in the Task 5.1 as part of the Security related Services in combination with the Security Framework. This SE aims at give OPENi developers the opportunity of including one more security level in their applications. 2.2 Motivation, Goals and innovations For many years, the identification process in an application has been providing a written login and password to access the system. This has been also the traditional method for mobile applications to identify users. Biometric recognition has risen as the most secure identification process. A Gartner report 1 from last year predicts that 30% of all companies will use biometric recognition on mobile devices by Mobile devices are evolving in such a high speed that in a near future almost very mobile device will be able to accept some kind of biometric recognition. Fingerprint, facial and voice recognition, are the most extended biometrics to identify a user. Among biometric recognition methods we have focused on face recognition. Nowadays, nearly all mobile devices have a good quality camera. We use this camera for taking a picture of the user and comparing it with other ones stored into the device. 2.3 Methodology The focus in this first phase for the Service Enablers has been placed in: a) the design of Biometric Comparison SE (in terms of features, information flow and APIs); b) the design and implementation of the Biometric Comparison SE GUI (android application); In the second phase it is intended to integrate the Biometric Comparison SE in the OPENi platform and Security component

8 3 Biometrics SE Design and Architecture 3.1 Component overview The objective of BIOMETRIC SE Prototype is to allow users to log on to their applications across a picture of theirs. This is called face recognition. This process can be split three steps: Face detection: identify a face into a photo Feature extraction: identify key features as distance between eyes Face recognition: identify if the given image matches with the set of stored ones. 3.2 Workflow At this time, the Biometric SE prototype is an Android library which a developer can add to his application. There are two main steps in the flow: training and recognition. First step when using Biometric SE is running the training operation. In the training operation, user s face photos are stored into the mobile device and they will be the identification key for the user. At least ten images are needed to be stored in order to guarantee the recognition. The subsequent recognition process compares one photo, taken in the current moment, with the stored ones for the current user. For the time being, training images are stored into the user s device. In the next phase these images will be stored into the user s cloudlet. The objective of the first implementation phase is providing to the developer a basic API with the features to include in the OPENi application. Training The library identifies the person who will be able to log on to the application. Figure 1: Diagram for Training feature 8

9 The prerequisite for training is having ten stored images of the person when logging. The images names must have the following format: name + i + jpg, where i is an integer between 1 and 10. The developer must call the public method train in which the training operation is performed. The steps in this method are: Storing 10 images Detecting faces in every one of those images Generating a gray image from each of the stored ones. A correspondence between every of the original images and their gray one is established. Generating a storage space in which to store this correspondence Recognition The library recognizes the person in the picture as a valid user of the application. Figure 2: Diagram from recognition feature The developer must call the public method recognize. The steps followed to perform this action are listed below: Charging the image from the user who intends to be identified. Detecting the face in the provided image. Processing the image with opencv methods. With opencv FaceRecognizer, this image will be compared with the stored training images. A Boolean will be returned depending on the result of recognition process. 9

10 3.3 API Specification For this first phase, the defined Android API is the following cloudlet which user is going to be identified **/ public void train(string cloudletid) cloudlet which user is going to be Image file which is going to be used to identify the cloudlet owner. **/ public boolean recognize(string cloudletid, File myimage) 10

11 4 Biometrics SE prototype Implementation 4.1 Outline key components in the Implementation phase The Prototype BIOMETRIC SE is a library based on open source technology. It has been developed using JavaCV 2 with OpenCV 3 for Android. We have selected the OpenCV due to it has become the main tool for software computer vision, is open source and it provides an Android SDK. Wide information and examples are available. One main point to have in mind is that OpenCV needs a huge amount of RAM to process images. The minimum requirements for developing with OpenCV in Android are the following: Sun JDK 6 (Sun JDK 7 is also possible) Android SDK Tools, revision 20 or newer. SDK Platform Android 3.0 (API 11): Android 2.2 (API 8 is the minimal platform supported by OpenCV Java) 4.2 How it will interface with OPENi The Biometric SE will be in full contact with the Authentication and Authorization component. This will be the component which will really give access to the OPENi platform. On the other hand, the future Service Enabler will have to access to the cloudlet in order to access to the user s personal data e.g. to the user s profile photo, to compare it with the given one. So that, we can say the Biometric SE will interact with components from WP4: Profile API (supposed the images for training are accessible via this API) Authentication & Authorization (next phase) User s cloudlet And of course, any application developed in WP6 or by any OPENi developer will be able to add this feature to its development

12 Figure 3: Biometric SE specification 12

13 5 Biometrics SE Demonstration and Source code To demonstrate the operation of BIOMETRIC SE, we have implemented a test application that only includes a button that connects to the library of facial recognition (Figure 4). Figure 4: Login to the app Once we are in the face recognition application, we can use either the front camera or the back one, by clicking the camera application button (Figure 5). 13

14 Figure 5: Screen with camera button Training The "Entrenar" (Training) button is pressed, the face is focused, the person's name is entered, the "Rec" button and finally press the "Parar Entreno" (Stop Training) button (Figure 6) is pressed. Figure 6: Training process Recognition Face is focused, press the button "Buscar" (Search) on the application for testing, if the application of facial recognition focused person recognizes the initial application will be displayed with an OK message (Figure 7). In case you do not recognize the person in focus the initial application will be displayed with a message of KO (Figure 8). 14

15 Figure 7: Ok result Figure 8: Failed to recognize one face 15

16 6 Biometrics SE Conclusions and Outlook With the Biometric Comparison SE, OPENi is able to offer a higher level of security to developers. Each of them will decide if include this feature to his application. Next step for this component will be implementing the interaction with de Authentication and Authorization component and the cloudlet integration. After that, we will try to add any other biometric comparison as identifying the user by a sequence of video, with gestures directed (randomly) by the application. In such use case, the pattern would be a video of the user. The user is told by the mobile phone when the user must smile and when not. That way, the hacking of the system by showing a static picture of the user is not possible. 16

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software. Engineering, FP7-ICT-2011-8. WP1 Coordination and Management

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software. Engineering, FP7-ICT-2011-8. WP1 Coordination and Management ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

APPLICATION NOTE. Getting Started with pylon and OpenCV

APPLICATION NOTE. Getting Started with pylon and OpenCV APPLICATION NOTE Getting Started with pylon and OpenCV Applicable to all Basler USB3 Vision, GigE Vision, and IEEE 1394 cameras Document Number: AW001368 Version: 01 Language: 000 (English) Release Date:

More information

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS

PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,

More information

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets

Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets Ref. Ares(2013)131534-01/02/2013 ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social

More information

Develop a Hello World project in Android Studio Capture, process, store, and display an image. Other sensors on Android phones

Develop a Hello World project in Android Studio Capture, process, store, and display an image. Other sensors on Android phones Kuo-Chin Lien Develop a Hello World project in Android Studio Capture, process, store, and display an image on Android phones Other sensors on Android phones If you have been using Eclipse with ADT, be

More information

Challenges in Android Application Development: A Case Study

Challenges in Android Application Development: A Case Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Fast remote data access for control of TCP/IP network using android Mobile device

Fast remote data access for control of TCP/IP network using android Mobile device RESEARCH ARTICLE OPEN ACCESS Fast remote data access for control of TCP/IP network using android Mobile device Vaibhav Muddebihalkar *, R.M Gaudar** (Department of Computer Engineering, MIT AOE Alandi

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Enrollment Process for Android Devices

Enrollment Process for Android Devices 1 Enrollment Process for Android Devices Introduction:... 2 Pre-requisites:... 2 Via SMS:... 2 Via Email:... 11 Self Service:... 19 2 Introduction: This is a brief guide to enrolling an android device

More information

How do I maintain my website with Ensemble CMS?

How do I maintain my website with Ensemble CMS? How do I maintain my website with Ensemble CMS? This tutorial introduces you to basic terms and concepts associated with using Ensemble CMS to manage your website. Ensemble CMS Ensemble CMS is a content

More information

How to Pay Fees in Municity Android January 2, 2015

How to Pay Fees in Municity Android January 2, 2015 How to Pay Fees in Municity Android January 2, 2015 This document presents Municity Android fee payment requirements, and provides instructions describing how uses can accept fees. A workflow diagram,

More information

Glass Map Application Design Document

Glass Map Application Design Document Glass Map Application Design Document May14 22 Senior Design Group Project Definition Goals Deliverables System Level Design System Requirements System analysis Feasibility Study Technical Investigation

More information

XMEye Android Mobile Monitoring Client English Manual

XMEye Android Mobile Monitoring Client English Manual XMEye Android Mobile Monitoring Client English Manual Written by: The test department Prepared Date: 2014-03-25 Version: V1.0 目 录 1. Introduction... 3 1.1. Brief Introduction... 3 1.2. Main Functions...

More information

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

MICROSOFT OFFICE 365 MIGRATION 2013/05/13 MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems Erik J Bowman Principal Technologist Advanced Technology Group 24 September 2009 Agenda Problem Statements Research

More information

PrintRover Cloud. Administrator Manual

PrintRover Cloud. Administrator Manual PrintRover Cloud Administrator Manual Copyright Disclaimer Trademarks and patents Intended use Copyright 2013, Thinxtream Technologies Pte. Ltd. All rights reserved. This document may not be copied in

More information

Issues of Hybrid Mobile Application Development with PhoneGap: a Case Study of Insurance Mobile Application

Issues of Hybrid Mobile Application Development with PhoneGap: a Case Study of Insurance Mobile Application DATABASES AND INFORMATION SYSTEMS H.-M. Haav, A. Kalja and T. Robal (Eds.) Proc. of the 11th International Baltic Conference, Baltic DB&IS 2014 TUT Press, 2014 215 Issues of Hybrid Mobile Application Development

More information

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8

ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 ICT-2011.1.2 Cloud Computing, Internet of Services & Advanced Software Engineering, FP7-ICT-2011-8 Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal

More information

Remote Android Assistant with Global Positioning System Tracking

Remote Android Assistant with Global Positioning System Tracking IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking

More information

How to Use Print from E-mail Register the printer

How to Use Print from E-mail Register the printer How to Use Print from E-mail Register the printer 1 Registering the printer to Print from E-mail Register your printer to Print from E-mail in three steps below. When the printer is properly registered,

More information

Introduction to Adobe Connect

Introduction to Adobe Connect Introduction to Adobe Connect Faculty Support Services Academic Technology Services & User Support Cornell Information Technologies USING ADOBE CONNECT CONTENTS Introduction... 3 Create a meeting room...

More information

Affdex SDK for Android. Developer Guide For SDK version 1.0

Affdex SDK for Android. Developer Guide For SDK version 1.0 Affdex SDK for Android Developer Guide For SDK version 1.0 www.affdex.com/mobile-sdk 1 August 4, 2014 Introduction The Affdex SDK is the culmination of years of scientific research into emotion detection,

More information

SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.

SAP NetWeaver Fiori. For more information, see Creating and enabling a trusted provider for Centrify on page 108-10. Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori

More information

BlackHawk for MAC Software User Guide

BlackHawk for MAC Software User Guide BlackHawk for MAC Software User Guide Products: BLK-DH2 Series and BLK-HD Series DVRs Please read this manual before using your software, and always follow the instructions for safety and proper use. Save

More information

An Introduction to OSVR

An Introduction to OSVR An Introduction to OSVR What is OSVR? OSVR is an open-source software platform for VR/AR applications. OSVR provides an easy and standardized way to discover, configure and operate hundreds of devices:

More information

BehavioSec participation in the DARPA AA Phase 2

BehavioSec participation in the DARPA AA Phase 2 BehavioSec participation in the DARPA AA Phase 2 A case study of Behaviometrics authentication for mobile devices Distribution Statement A (Approved for Public Release, Distribution Unlimited) 1 This paper

More information

Sharepoint Manual for the Joint Action on Health Workforce Planning and Forecasting

Sharepoint Manual for the Joint Action on Health Workforce Planning and Forecasting Sharepoint Manual for the Joint Action on Health Workforce Planning and Forecasting Contents Getting started... 1 The main site... 3 The work Package sites... 5 Working together in documents... 8 Getting

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

OneDrive in Office 365

OneDrive in Office 365 OneDrive in Office 365 OneDrive is a universal tool that allows you to upload and share documents with others. You can upload Word Documents, PDFs, Excel spreadsheets, images, and other Office files. Contents

More information

Quick guide steps you need to take

Quick guide steps you need to take Single Sign On user manual (EMM SSO) From website http://www.emm.sk/download/emm-sso we will download file EMM-SSO.ZIP. The file needs to be unpacked and installation programme SETUP.EXE must be run. The

More information

Apps for Android. Apps for iphone & ipad INS584-3

Apps for Android. Apps for iphone & ipad INS584-3 Apps for iphone & ipad INS584-3 Apps for Android Android is a trademark of Google Inc. iphone is a trademark of Apple Inc., registered in the U.S. and other countries. ipad is a trademark of Apple Inc.,

More information

Creating a User Profile for Outlook 2013

Creating a User Profile for Outlook 2013 Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when

More information

Managed Devices - Web Browser/HiView

Managed Devices - Web Browser/HiView Managed Devices - Web Browser/HiView All Hirschmann managed devices have a web based GUI interface available for configuration purposes. This is typically the primary means of configuration used for most

More information

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0

Creating a System DSN for Crystal Reports to Access a Sentinel Server Database. Configuration Guide Version 1.0 Creating a System DSN for Crystal Reports to Access a Sentinel Server Database Configuration Guide Version 1.0 July 2007 Configuration Guide Part Number: 62-14332000, V1.0 Copyright 1995-2007 Ringdale

More information

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory...

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens...15. BlackVue Cloud...24. BlackVue Wi-Fi...40. Internal Memory... Table of Contents BlackVue Cloud App Overview...3 Key Functions When Cloud is Connected...4 Key Functions When Wi-Fi Connection is Made...4 Key Features of Internal Memory...4 Supported Devices...5 Getting

More information

ESET Secure Authentication Java SDK

ESET Secure Authentication Java SDK ESET Secure Authentication Java SDK Getting Started Guide Document Version 1.0 ESET Secure Authentication Java SDK 2 Introduction This document details what is required to add a second authentication factor

More information

CA Service Desk Manager - Mobile Enabler 2.0

CA Service Desk Manager - Mobile Enabler 2.0 This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will

More information

SEACW DELIVERABLE D.1.6

SEACW DELIVERABLE D.1.6 SEACW DELIVERABLE D.1.6 Validation Methodology Specifications Project Acronym SEACW Grant Agreement No. 325146 Project Title Deliverable Reference Number Deliverable Title Social Ecosystem for Antiaging,

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved

VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India loka.ashwin@gmail.com ABSTRACT In this paper, we describe the design and

More information

Getting Started with Android Development

Getting Started with Android Development Getting Started with Android Development By Steven Castellucci (v1.1, January 2015) You don't always need to be in the PRISM lab to work on your 4443 assignments. Working on your own computer is convenient

More information

Getting Started Guide for Developing tibbr Apps

Getting Started Guide for Developing tibbr Apps Getting Started Guide for Developing tibbr Apps TABLE OF CONTENTS Understanding the tibbr Marketplace... 2 Integrating Apps With tibbr... 2 Developing Apps for tibbr... 2 First Steps... 3 Tutorial 1: Registering

More information

D3.4.1: Data Fusion Tools

D3.4.1: Data Fusion Tools COMPETITIVINESS AND INNOVATION FRAMEWORK PROGRAMME CIP-ICT-PSP-2013-7 Pilot Type B WP3 Service platform integration and deployment in cloud infrastructure D3.4.1: Data Fusion Tools Deliverable Lead: NETCAD

More information

Role of Multi-biometrics in Usable Multi- Factor Authentication

Role of Multi-biometrics in Usable Multi- Factor Authentication Role of Multi-biometrics in Usable Multi- Factor Authentication Dr. Nalini K Ratha* IBM T.J. Watson Research Center Yorktown Heights, NY 10598 ratha@us.ibm.com *: In collaboration with colleagues from

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

OPEN INNOVATION IN THE MOBILE APP ECOSYSTEM: OPENI PERSPECTIVE ON APIS & SOCIAL WEB

OPEN INNOVATION IN THE MOBILE APP ECOSYSTEM: OPENI PERSPECTIVE ON APIS & SOCIAL WEB www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets OPEN INNOVATION IN THE MOBILE APP ECOSYSTEM: OPENI PERSPECTIVE ON APIS

More information

Multi-factor Mobile Authentication

Multi-factor Mobile Authentication Multi-factor Mobile Authentication Ram Ramachandran Program Director, Adv. Technologies IBM Research pgramach@us.ibm.com June 9, 2014 Password Authentication Who is using this mobile device? Valuable information

More information

Single Sign-On Access Management A Technical Framework on Access Management Systems

Single Sign-On Access Management A Technical Framework on Access Management Systems Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper

More information

1.1 INITIAL SETUP 1.2 WEB SERVICE CONNECTION SETUP. Canon Cloud Printing Center Setup

1.1 INITIAL SETUP 1.2 WEB SERVICE CONNECTION SETUP. Canon Cloud Printing Center Setup Learn how to connect your mobile device to your compatible printer Canon Cloud Printing Center Setup Download the Canon PRINT App now for AndroidTM or ios Learn how to use the Canon PRINT App on IOS and

More information

Product Overview & Quick Start Guide

Product Overview & Quick Start Guide Product Overview & Quick Start Guide Table of Contents Dynamics CRM CloudCall Plugin Overview 2 Company Overview 2 Product Overview 2 How to order CloudCall Click 3 Product Screenshots and descriptions

More information

CDVS-7000 Series Remote Software Users Guide

CDVS-7000 Series Remote Software Users Guide CDVS-7000 Series Remote Software Users Guide Crest Electronics, Inc. Version 12.1005 Remote Surveillance Program The remote surveillance program enables users of the Crest 7000 series DVRs to connect remotely

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App

HP AppPulse Mobile. Adding HP AppPulse Mobile to Your Android App HP AppPulse Mobile Adding HP AppPulse Mobile to Your Android App Document Release Date: April 2015 How to Add HP AppPulse Mobile to Your Android App How to Add HP AppPulse Mobile to Your Android App For

More information

D3.3.1: Sematic tagging and open data publication tools

D3.3.1: Sematic tagging and open data publication tools COMPETITIVINESS AND INNOVATION FRAMEWORK PROGRAMME CIP-ICT-PSP-2013-7 Pilot Type B WP3 Service platform integration and deployment in cloud infrastructure D3.3.1: Sematic tagging and open data publication

More information

Tutorial on OpenCV for Android Setup

Tutorial on OpenCV for Android Setup Tutorial on OpenCV for Android Setup EE368/CS232 Digital Image Processing, Spring 2015 Macintosh Version For personal Android devices (advised: Android 3.0 or higher) Introduction In this tutorial, we

More information

Cloud Web-Based Operating System (Cloud Web Os)

Cloud Web-Based Operating System (Cloud Web Os) Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing

More information

Integration Overview. Web Services and Single Sign On

Integration Overview. Web Services and Single Sign On Integration Overview Web Services and Single Sign On Table of Contents Overview...3 Quick Start 1-2-3...4 Single Sign-On...6 Background... 6 Setup... 6 Programming SSO... 7 Web Services API...8 What is

More information

The Smartest Way to Get Meetings Done

The Smartest Way to Get Meetings Done The Smartest Way to Get Meetings Done It is time to say goodbye to email and calendar hassle: Meetin.gs is the smartest way to meet. Get your meetings on the cloud and access them from any device. The

More information

YOUR INTERACTIVE SECURITY

YOUR INTERACTIVE SECURITY YOUR INTERACTIVE SECURITY MyFrontpoint.com: Setup & Features SECURITY THE WAY YOU WANT IT After your activation call, you ll receive your MyFrontpoint.com login and password via email. Log on at www.myfrontpoint.com.

More information

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange

More information

RFID Based 3D Indoor Navigation System Integrated with Smart Phones

RFID Based 3D Indoor Navigation System Integrated with Smart Phones RFID Based 3D Indoor Navigation System Integrated with Smart Phones Y. Ortakci*, E. Demiral*, I. R. Karas* * Karabuk University, Computer Engineering Department, Demir Celik Kampusu, 78050, Karabuk, Turkey

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

MTP: Continuous User Authentication on Android Using Face Recognition

MTP: Continuous User Authentication on Android Using Face Recognition MTP: Continuous User Authentication on Android Using Face Recognition Testing of FaceApp Application This experiment is being conducted to find out the accuracy rate of face recognition algorithm used

More information

How to create an Expense Report through iexpense in the iphone Mobile App

How to create an Expense Report through iexpense in the iphone Mobile App How to create an Expense Report through iexpense in the iphone Mobile App 1. Before you can submit Expense Reports through the mobile app, you need to access iexpense through the web application to set

More information

FPT UNIVERSITY. Capstone Project

FPT UNIVERSITY. Capstone Project MINISTRY OF EDUCATION AND TRAINING FPT UNIVERSITY Capstone Project Online Event Organizing Company Management System Group Group Members Đoàn Minh Thiện 60130 Nguyễn Thanh Thống 60561 Mai Hoàng Trí Anh

More information

-Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of

-Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of 1 2 3 -Android 2.3 is the most used version of Android on the market today with almost 60% of all Android devices running 2.3 Gingerbread -Winner of Internet Telephony Magazine s 2012 Product of the Year

More information

French Justice Portal. Authentication methods and technologies. Page n 1

French Justice Portal. Authentication methods and technologies. Page n 1 French Justice Portal Authentication methods and technologies n 1 Agenda Definitions Authentication methods Risks and threats Comparison Summary Conclusion Appendixes n 2 Identification and authentication

More information

A Modular Approach to Teaching Mobile APPS Development

A Modular Approach to Teaching Mobile APPS Development 2014 Hawaii University International Conferences Science, Technology, Engineering, Math & Education June 16, 17, & 18 2014 Ala Moana Hotel, Honolulu, Hawaii A Modular Approach to Teaching Mobile APPS Development

More information

Android Environment SDK

Android Environment SDK Part 2-a Android Environment SDK Victor Matos Cleveland State University Notes are based on: Android Developers http://developer.android.com/index.html 1 Android Environment: Eclipse & ADT The Android

More information

Android and OpenCV Tutorial

Android and OpenCV Tutorial Android and OpenCV Tutorial Computer Vision Lab Tutorial 26 September 2013 Lorenz Meier, Amaël Delaunoy, Kalin Kolev Institute of Visual Computing Tutorial Content Strengths / Weaknesses of Android Java

More information

PISA 2015 MS Online School Questionnaire: User s Manual

PISA 2015 MS Online School Questionnaire: User s Manual OECD Programme for International Student Assessment 2015 PISA 2015 MS Online School Questionnaire: User s Manual Doc: CY6_CBA_SCQ_MSPrincipalManual.docx September 2014 Produced by ETS, Core 2 Contractor

More information

Reviewer Guide Core Functionality

Reviewer Guide Core Functionality securing your personal data Sticky Password Reviewer Guide Core Functionality Sticky Password is the password manager for the entire lifecycle of your passwords. Strong passwords the built-in password

More information

Personal Cloud. Support Guide for Mobile Apple Devices

Personal Cloud. Support Guide for Mobile Apple Devices Personal Cloud Support Guide for Mobile Apple Devices Storing and sharing your content 2 Getting started 2 How to use the application 2 Managing your content 2 Adding content manually 2 Downloading files

More information

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00

Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 Fingerprint Identity User Manual for the Griaule Biometric Framework 040-0103-01 Rev 1.00 www.griaulebiometrics.com Brazil Phone: 55-19-3289-2108 USA Phone: (408) 490 3438 Fingerprint Identity Index Getting

More information

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07 ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall

More information

Remote Desktop Solution, (RDS), replacing CITRIX Home Access

Remote Desktop Solution, (RDS), replacing CITRIX Home Access Remote Desktop Solution, (RDS), replacing CITRIX Home Access RDS Applications on a Computer Overview RDS has replaced citrix for remote access at home for College staff and pupils. This does not replace

More information

Design Document Inventory App

Design Document Inventory App Design Document Inventory App Student: Keith Mullins Supervisor: Nigel Whyte Student ID: C00118202 1 Contents Introduction... 3 Scope... 4 Overview... 4 Use Case Diagram... 5 Class Diagram... 6 Use Cases...

More information

D6.1 GEEWHEZ Test plan

D6.1 GEEWHEZ Test plan D6.1 GEEWHEZ Test plan Coordinator: Zoomarine Italia S.p.A. Claudio Di Capua Research for the benefit of specific groups Project Start Date:1 st October 2011 Duration:24 months -1 Grant Agreement - 25

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.0.0 The owncloud developers July 22, 2016 CONTENTS 1 Using the owncloud Android App 1 1.1 New In Version 2.0.0........................................... 1 1.2 Upgrading................................................

More information

EMC Documentum Content Services for SAP Repository Manager

EMC Documentum Content Services for SAP Repository Manager EMC Documentum Content Services for SAP Repository Manager Version 6.0 Installation Guide P/N 300 005 500 Rev A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

Multi Factor Authentication API

Multi Factor Authentication API GEORGIA INSTITUTE OF TECHNOLOGY Multi Factor Authentication API Yusuf Nadir Saghar Amay Singhal CONTENTS Abstract... 3 Motivation... 3 Overall Design:... 4 MFA Architecture... 5 Authentication Workflow...

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication

Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication

More information

Improving Online Security with Strong, Personalized User Authentication

Improving Online Security with Strong, Personalized User Authentication Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware

More information

User manual for the visitors of Interreg Danube Programme website

User manual for the visitors of Interreg Danube Programme website User manual for the visitors of Interreg Danube Programme website Table of contents National contact points... 2 Newsletter subscription... 2 Subscribe... 2 Unsubscribe... 2 Forum... 2 Approved projects...

More information

Lecture 1 Introduction to Android

Lecture 1 Introduction to Android These slides are by Dr. Jaerock Kwon at. The original URL is http://kettering.jrkwon.com/sites/default/files/2011-2/ce-491/lecture/alecture-01.pdf so please use that instead of pointing to this local copy

More information

ClickView Digital Signage User Manual

ClickView Digital Signage User Manual ClickView Digital Signage User Manual Table of Contents 1. What is ClickView Digital Signage?... 3 2. Where do I find ClickView Digital Signage?... 3 2.1. To find ClickView Digital Signage... 3 3. How

More information

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS

KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com info@plurilock.com 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric

More information

D03.1 Electronic Communication Tools Specification

D03.1 Electronic Communication Tools Specification SEVENTH FRAMEWORK PROGRAMME D03.1 Electronic Communication Tools Specification FP7-ICT-216863/UNIBO-UPC/R/PU/D03.1 Project Number: FP7-ICT-2007-1 216863 Project Title: Building the Future Optical Network

More information

Self Service Portal and 2FA User Guide

Self Service Portal and 2FA User Guide Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.

More information