Documente Academic
Documente Profesional
Documente Cultură
1.4 Methodology:
We make prevention of unauthorized access possible by extracting the IP address of the
machine from which the breach is being made and then delivering this IP address along with a
warning message to the user.
CHAPTER 2
LITERATURE SURVEY
2.1 Methods and Theories:
In our application the user is supposed to register and then he/she can login by giving the
appropriate username and password. After this the user can edit his friend list and other profile
information. At the time of incorrect login the user will get a message intimating about the
suspicious activity going on in his account. User can search his friends by giving their possible
known popular nick names by which search results are minimized and exact results are obtained.
CHAPTER 3
TECHNOLOGY USED
3.2.1 Php:
PHP is a scripting language originally designed for producing dynamic web pages. It has
evolved to include a command line interface capability and can be used in standalone
graphical applications.
It is a widely-used general-purpose scripting language that is especially suited for web
development and can be embedded into HTML.
PHP generally runs on a web server, taking PHP code as its input and creating web pages
as output. It can also be used for command-line scripting and client-side GUI
applications.
From PHP 4, the PHP parser compiles input to produce byte code for processing by the
Zend Engine, giving improved performance over its interpreter predecessor.
3.2.2 My Sql:
MySql is a multithreaded,multi-user SQL database management system (DBMS). The
basic program runs as a server providing multi-user access to a number of databases.
The data in MySql is stored in database objects called tables. A table is a collection of
related data entries and it consists of columns and rows. Databases are useful when
storing information categorically.
With MySql, we can query a database for specific information and have a record set
returned.
Before you can access data in a database, you must create a connection to the database. In
PHP, this is done with the mysql_connect() function.
CHAPTER 4
SOFTWARE REQUIREMENT SPECIFICATION
4.1 Introduction:
The purpose of this document is to present detailed description of the project titled
preventing unauthorized access of social accounts through mobile devices. The intended users
can get the messages if any unauthorized access is made to their mail or social accounts. SRS is
intended for the users, developers and Project review committee. This application is known as
preventing unauthorized access for social accounts or mail accounts. It is a web based
application.
This application provides users to create account and if any suspicious activities in their
account will be intimated to them by a message using their mobile numbers. The main point of
the project is to search their friends with any nick name known and still the user will be able to
get the intended search.
Our product makes uses of normal mining and database concepts in order to maintain the
data. It makes use of pattern searching technology to give the intended result even when the nick
names are given for searching. There are no such products available that provides proper result
even on giving nick names. If unauthorized access is done to any other users account message
are sent to the legal user. Here it makes use of networking protocol in order to send the messages.
4.2.2 System Interface:
The application is going to be developed using wamp server and its packages. The
application will be developed in php language by making use of different packages.
4.2.3 Interfaces:
There is a GUI and no command line interface. The GUI is required for accepting the
users username and password. When there are some exceptions raising error like entering
invalid username and password, then error messages will be displayed prompting the users to re-
enter the details.
4.2.7 Operations:
User: He/She is responsible for logging in.
Administrator: He will be responsible for authentication of user. Also responsible for extracting
the proper intended search result given the query using nick names. Also responsible for sending
messages to the authorized user if any suspicious activities are done in their account.
4.2.8 Site Adaptation Requirements:
The user must have social site account. We are not modifying any details of the user in
his account, but only extracting the required details from it.
4.2.11 Constraint:
User must have an account in the social networking site created.
In order to get the information of hacking his account, user must possess a mobile device.
The user must provide his nick name during registration, so that given query for
searching a friend with nick name will be easy.
In case of unauthorized access, it is not possible to detect the person who is doing such
activity.
Safety Requirements: Since the users getting registered to the social networking site their
username and passwords are stored with high security measures.
Reliability Requirements: Reliability is the ability of the system to deliver services as specified.
The application is 100% reliable if the users friends maintain updated profiles.
Maintainability Requirements: The system source code should be updated as and when there
are changes made in the technology used.
The system will display login page. End user provides login name and password to the
system. Take the login details from the user to authenticate the user
For invalid username and password appropriate error message will be displayed.
The output of the system will be the friends list to the end user.
4.3.2 Functions:
Fig 3.2 Use Case diagram for user getting registered
4.3.6.1 Reliability:
Reliability is the ability of the system to deliver services as specified. The application is
100% reliable if the users friends maintain updated profiles.
4.3.6.2 Availability:
Availability is the ability of the system to deliver services when requested. Since the
messages are sent to the cell phones about unauthorized access it must work any time to the user.
4.3.6.3 Security:
Security is the ability of the system to protect itself against accidental or deliberate
intrusion. Since we are maintaining login details the information are kept secured.
4.3.6.4 Maintainability:
Maintainability deals with the ability of the system which allows changes in the system
without affecting the existing components. World today has become competitive in everything.
As new requirements arrive from customer, we need to make changes in the system and add
functionalities. Since our system is built on object-oriented technology it supports the
maintainability to the great extent.
4.3.6.5 Portability:
Portability deals with the ability of the system being machine independent. The
application works on any computer that supports the installed servers. Hence it is portable
application.
Table no: 4.1 Rating of software system attributes
ID Characteristic H/M/L 1 2 3 4 5 6 7 8 9 10 11 12
1 Correctness H
2 Efficiency H
3 Flexibility L
4 Integrity/Security M
5 Interoperability L
6 Maintainability M
7 Portability M
8 Reliability H
9 Reusability M
10 Testability L
11 Usability H
12 Availability H
4.3.7 Organizing the Specific Requirements:
4.3.7.3 Objects:
The classes of objects in our system are User, Administrator, Application, our social
Website, Database, and Server. These Classes each have a single object and will be represented
along with their attributes and functions in a UML diagram in the design document.
4.3.7.4 Features:
In order to obtain friends list the user need to input his username and password that he
has provided at the time of registration.
4.3.7.5 Stimulus:
If a user inputs proper username and password of his account his friends list will be
displayed else a proper error message will be displayed.
CHAPTER 5
DESIGN PHASE
Wamp Server
Web
Admin or
Browser.
User
Internet
Database
Mysql
Application
DBconnect +firstname
+lastname
+connection +contact_number
+database
1 Connects database to application * +edit_profile()
+open() +edit_group()
+close() +edit_friends()
Maintains
+general_information()
profile
photos
+firstname
+lastname * +photo_id
*
+contact_number +photo_description
+edit_friendlist() +add_pic()
+edit_groups() +edit_Album()
application
+profiles
+groups
DBconnect
+connection
+database
+dbconnect()
Alert message
+open()
+close()
+send_message()
+send_email()
Registered user
+firstname
+lastname Admin
+address
+email_id +username
+password
+add_friend()
+remove_Friend() +view_feedback()
+edit_profile() +block_user()
+edit_group() +unblock_user()
Profile
+first name
+employment information
+general info
friend_list
+find_friend() photos
+remove_friend()
+photo_id
+album_name
+add_photo()
+add_album()
+remove_photo()
System
login
view/edit profile
edit photos
edit groups
user
send/recieve messages
<<include>>
login
database confimation
<<include>> view/edit profile
user
edit groups
Admin
<<extend>>
edit friend
block/unblock user
recieve message/email
1 : site()
4
5 : login()
6 : verify()
7 : goto homepage()
8 : edit()
9
10 : send/recieve msgs()
11
12 : edit and view contacts()
13
14 : create and edit groups()
15
16 : upload and view pics()
17
18 : add and search friends with nick name()
19
20
21
22
23
24
Fi
g 5.12 Sequence diagram for entire application
register homepage
user login_verify database profile message address_book groups pics friends
1 : site()
4
5 : login()
6 : verify()
7 : goto homepage()
8 : edit()
9
10 : send/recieve msgs()
11
12 : edit and view contacts()
13
14 : create and edit groups()
15
16 : upload and view pics()
17
18 : add and search friends with nick name()
19
20
21
22
23
24
LOGIN
false
Verify
true
EDIT SEND RECEIVE ADD and ADD and View SEARCH and Create Topic
INVITE and
PROFILE MSG MSG VIEW PICS Contacts JOIN and post Reply
ACCEPT
LOGOUT
Fig 5.14 State diagram for application
Edit Profile Send Receive Add Pics View Pics Add View Search and
Message Message Contact Contact add Friend
Logout
PROFILE EDIT
PROFILE
SEND
MESSAGE
MESSAGES
RECIEVE
MESSAGE
ADD PICS
CREATE
COMMUNITY
COMMIUNITY
JOIN
COMMUNITY