Software Interfaces Bluetooth App
First both users get the app from play store and installed in android phone, tab, and pc. After installation, both users first register on the app and then verified his valid email and password. After this user makes a profile on this app to use for communication purpose to each other. The sender sends a message to the receiver for communication. The receiver receives a private key message from sender then he verified his own private key is authenticated. In this app, we use the Bluetooth version is 4.2. We used radio waves frequency as a resource.
The Bluetooth ISM band is 2.400 to 2.485. We use tools
for app JAVA (for use programming) and SQLite (for use data store) database. We
use libraries is BLE (Bluetooth Low Energy). Using this app user no need
network and internet-only required an app for communication purpose audio,
video calling, files sharing and chatting. Using this app system can be
connected to multiple devices on this application.
Communications Interfaces of Bluetooth
|
System
Features
Performance Requirements
Safety Requirements
We use radio waves frequency which is harmful to human life. It can damage the heart and human pulse so avoid the long time call on that app. Using radio waves frequency became harmful because it creates cancer disease. In any case, if we call, do not leave the call active. It can cause many diseases. In this app, we don’t require any cable for data sharing so that it is not harmful to sending data. It is authenticated because we use a private key to pair devices with each other. Third-party cannot interfere due to using a specific key for the receiver.
Plain text
This
text is of two, one calls rich and second of plain text. The text can also be
used by the plain text. We use bold, italic, font size and formatting style of
the text that we write. This text is called bold text. These are called italic text. This text also has a simple
text. To see this, we use the ASCII code. First of all, we are encryption our
text and then the decryption. And finally, we get to the text in the form of plain
text. This way is another way that we can convert again the plain text into the
plain text.
Cypher text
A
cypher data is used to encryption to cypher data. Also, we use a cipher to hide
our data. To use encryption, we read to tell our system about a cleartext.
Just as the system read the Plain Text. He encrypts it. It can also be implicated
to change an alphabet with someone else. As such, we will give it a name as
alphabet we have to change.
Keys
Cryptographic
is an algorithm that changes the plain text into the ciphertext. For this
method, we use the private key. We all have a private and another public key. The
private key is only with us. And everyone who has public keys is with everyone.
When we get data from someone, we are sour from our private key. When data goes
to another, he looks at this data by logging in to his private key.
Encryption cypher
A
cypher is used to hide any text, symbol. It does the text encryption. As soon
as the system has a plain text, He transforms it into a cypher. Encryption
cyphers text so that the user can understand it from easily.
Decryption cypher
Plain
Text is of two types. The first type of text is called the encryption text. And the second type of text is called decryption text. This is also the work of the
same cypher and after bringing the text into a plain text. It's a method of
conversion. After being a text editor it is encryption.
Software Quality Attributes
Adaptability
This
application is better than WhatsApp. Because the user will have to pay no
charge to call or text message on it. WhatsApp needs some money to talk on the
app. But the Bluetooth will not have any charge by the user.
Availability
It
is easily install on android phone, pc, tablet and any other devices. We use
RSA algorithm in our app so that third party cannot interfere with that device. It
installs once a time in android than he cannot require any updating or another tool.
Portability
It
is not required any port, cable and pin to connect pc, android, and tablet for
communication purpose. It is installed any device like an android phone then we
cannot require any cost network internet for communication.
Reusability
When
user forgot his password then simply delete app and again download the app from
play store and reinstall it and sign in with a valid email and password or make
a new profile for reusability. When a user installs this app and verified
during profile and giving valid information. If already register then get a
notification from the database. If he is not registering than he completes valid
user name, password, and date of birth etc.
Usability
It
is easy to use for any person (businessman, employees, non-technical person)
because not required any mechanism or tough profile.
Business Rules
User
The user simply interacts with this app. It is installed easily from google play
store to system mobile etc.
Sender
First
of all sender to check the receiver is online or offline. If the receiver is
online than the sender is sending the message to the receiver. The sender is the send a message for communication to the other person and shares the information of
work.
Communication medium
First
of all sender send the original message to receiver for connectivity and then
message send encrypt than the encryption send to cypher is convert into the unreadable
form of a message. After the unreadable message to obtain then receive the other the person in decryption form to use the private key to convert into the readable form
of the original message.
0 Comments