Jun 28, 2022
No image
Project Bodyguard ( Cyber Security )
Ongoing

Project Bodyguard ( Cyber Security )

$50,000+
7-12 months
United States
2-5
view project
Service categories
Service Lines
Mobile Development
Domain focus
Other
Programming language
Java
Kotlin

Challenge

1. Restricted Control on the content accessed 2. User must be able to know the urls and ads accessed are safe and have a control over whether to follow or not Maintaining access to different features of the app using License Key Support. 3. For business purposed, have to maintain different features which gets unlocked only when user buys a certain license. 4. User Control over the status of the features implemented - whether they are on or off. 5. App offers different features but user has to the ability to activate and deactivate the feature completely at will. 6. Maintain control over User Authentication. 7. Users who are rendered unauthorized must not be able to enter the app and use the features. 8. Making easy fro the user to login

Solution

1. Activate/Deactivate features on one click 2. Backend maintains the state of the user enabled features on one click. 3. App Token Refresh Feature 4. Passwordless flow where user don’t have to put in a password to login - he/she is verified on email/phone basis 5. On-Device Blocking Using Local DNS 6. Backend supported User Verification Feature 7. Trusted Contact Feature 8. Backend needs to be updated with an alternate email/phone along with default credentials. 9. People trying to access using trusted credentials get authorized access to critical features.

Results

1. Activate/Deactivate features on one click 2. Backend maintains the state of the user enabled features on one click. 3. App Token Refresh Feature 4. Passwordless flow where user don’t have to put in a password to login - he/she is verified on email/phone basis 5. On-Device Blocking Using Local DNS 6. Backend supported User Verification Feature 7. Trusted Contact Feature 8. Backend needs to be updated with an alternate email/phone along with default credentials. 9. People trying to access using trusted credentials get authorized access to critical features.