Вісник Черкаського державного технологічного університету (Jan 2020)
AUTOMATED SYSTEM OF SOFTWARE PROTECTION FOR ANDROID OPERATION SYSTEM
Abstract
The article pays the attention to the authentication of data on mobile devices running the Android operation system. We use smartphones and applications which are installed on them, every day. We can use personal information in some applications, that we do not wish to disclose. Such built-in user authentication mechanisms as unlocking with a PIN code, password, fingerprint, or with the new Face ID technology are most commonly used. Most often, smartphone users, and not only use the same password to access different sites, authenticate a user to the device, rarely they use two different passwords, and very rarely use different passwords for different authentication systems. These systems are well protected from computer hacking, but not from humans. What does it mean? At the time of authentication, another person may be present, and he can look at the password (it's called the shoulder surfing) and remember it after that. That’s why it has been decided to create an authentication that would be difficult to remember and would confuse the user who wanted to gain unauthorized access to personal data. The article introduces the implementation of Android application lock, which is an improved version of the usual use of passwords, using a change in the way details are introduced. That is, instead of the user seeing the usual input field every time, the user will be able to enter a combination from a specially created table, whose order of elements will be changed every time, thus not allowing easy password reproduction. Using this method of blocking apps, you can be sure that nobody in your environment, or just random people who wanted to know your sensitive information when you have just left your smartphone, would be able to access by simple typing of easy password right away. In addition, the testing has provided valid results regarding the reliability of the developed authentication method.
Keywords