International Journal of Computer Applications (0975 – 8887) Volume 161 – No 11, March 2017 17 A Simple Face-based Mobile Security System Design for Android Phone Protection Alabi A. A. Adjunct Lecturer, Computer Science Department, Oduduwa University Ipetumodu Osun State, Nigeria Ogundoyin I. K. ICT Department, Osun State University, Oshogbo, Osun State, Nigeria ABSTRACT The advent and use of mobile phones have added a lot to the world’s social lives as technology keeps evolving on a daily basis but also face a bit of challenges such as info theft, misrepresentation, impersonation etc. with a view to causing mayhem; a scenario that calls for a more secured mode of phone access for protection sake. A unit of functionality provided by the system was demonstrated with the aid of a Use-Case diagram and the procedural flow of control between the various class objects involved was illustrated using the Activity diagram. The code was written in JAVA on a platform called “Android Visual Studio” and the required tools and Texts were built with the aid of the Android In-built Controls; which generate their own codes when utilized thus providing the needed field for entering E-mail and some other required parameters. The design was made in such a way that security info was sent to a designated Email for necessary action whenever an illegal attempt is noticed on the mobile phone. The expected intruder’s face captured and the registered phone location due to the provision of incorrect security codes (while attempting to log in on the phone) were sent to the phone’s rightful owner inform of alert via a preset Email. This research guaranteed privacy in addition to exposing intruders no matter their motives. It also educates the masses with the basic knowledge of privacy, protection from unauthorized access and the core importance of mobile phones security. Keywords Security, Face, Mobile Applications, Android Phones, Java Programming 1. INTRODUCTION The advent and use of mobile phones have added a lot to the world’s social lives as technology keeps evolving on a daily basis. These days, more and more users employ different forms and make of phones not only as communication tools, but also as a means of planning and organizing work and private life. Within companies, mobile technology is constantly causing profound changes in the organization of information systems and improvising of certain technology- related needs. This has also become a source of new risks as its potentials grow. For instance, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of probably a company or government-owned institution. Many smartphones are preferred targets of attacks these days. These attacks exploit weaknesses related to smartphones that can come from means of communication such as Short Message Service (SMS) also known as “Text Message”, Multimedia Messaging Service (MMS), Wi-Fi networks, Bluetooth and GSM (the de facto “global standard for mobile communication”). There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users thus causing the unthinkable. In view of this, different security counter-measures are being developed and applied to smartphones configurations, from security in different layers of software to the dissemination of information to end users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps. Mobile Phone users are today exposed to various threats ranging from theft to unauthorized access of his/her phones with a view to causing mayhem. These threats are considered very serious in the sense that victims and stakeholders in this could suffer from end effects such as illegal transmissions of their classified info, misrepresentation, impersonation and the likes. Although, some of these mobile phones come with some inbuilt security functions which are in most cases in default form easily bypassed by people conversant with the workings of such phones. This scenario calls for a more secured mode of preventing illegal access which could also provide an undeniable form of identification should in case such negative acts take place. Mobile security today is a very important part of security scheme that required prompt and implicit attention. Aside the fact that our mobile devices (i.e. Phones) host the larger aspects of our bio-data and other forms of records, they represent the best and most available communication devices for most of our day-to-day correspondence. In the same vein, a lot of risks comes with the use of mobile phones and so serve as constraints if not cons to the pros expected to be associated with having them. One of such problem is the increasing complexity of mobile intrusion, mobile theft etc. It is therefore paramount to invest lots of interests and resource in curbing this menace for a free and safe communication system. The result of this study could serve as a breakthrough towards decreasing the stakes as stressed above with a view to maximizing the good involved. In short, the new system should be capable of eliminating some problems inherent in the existing system such as an increased guaranty of the mobile phone’s security, provision for easy tacking of the phone if lost or stolen and easy capturing of intruders face and location. This article is targeted at developing a Face-Based Security System for Mobile Application with a view to exposing and neutralizing any form of threat emanating from accessing one’s phone as a result of the activities of intruders. Expected goals here include gathering and analyzing of information making up records about mobile phone systems in terms of user and system data; developing a face-based security system for managing and securing those records as well as the phone’s functions and evaluation the developed system.