Request a call
  • Hidden

Business Overview

Business Overview

Our client is a hardware and software provider specializing in data security. They planned to launch a cutting-edge Android smartphone seamlessly integrated with their blockchain network, positioning it as a portable, highly protected crypto wallet. The company aimed to develop a phone that, in addition to its core functions, creates a safe environment for secure crypto transactions.

To this end, the client decided to empower their custom firmware with a unique system application designed to record all events occurring with the phone when it’s not in use. The goal was to increase the device’s security even more and thus improve user trust in the client’s company and their product.

600h405_1

Challenges

  • No final product vision. The client had a general business idea, but due to the lack of mobile development expertise, they couldn’t see the final picture regarding app functionality and design.

  • Custom firmware under development. We needed to develop an app taking into account the technical constraints of integrating it with the custom firmware, which was still under development.

  • Tight deadlines. We had to meet the scheduled deadlines since the client had already planned the smartphone’s release, followed by its presentation.

Solution

Solution

To minimize risks and realize a finalized scope of work, we started our project with the following steps:

  • Conducting a discovery phase, during which our team formed a solution that would maximally cover all identified business needs.
  • Review of their initial groundwork, after which we suggested many UX and UI improvements and also concluded the inexpediency of reusing existing code.
600h405_2

Android System Application

600h405_3

Android System Application

We built the app by modifying the Android Open Source Project (AOSP) and using the features available in the Android SDK. Among them are Bluetooth, content providers for getting information about launching and closing applications, broadcast receivers for tracking the locking and unlocking of a mobile phone, and many others.

To provide an even greater level of protection, we encrypted the tracked data using a symmetric method based on the SHA-256 algorithm.

Events The App Tracks

Events The App Tracks

The application works in the foreground, offline, storing data in a cache and monitoring events such as:

  • Opening and closing applications
  • Connecting a USB cable
  • Attempts to unlock the screen
  • User access to the internet, etc.

The app records the events in the log, designed in a visually appealing tabular format, and captures the other user’s actions through screenshots. It also takes a webcam photo of the user if the screen unlocks.

600h405_4

User Flow

Outcome

Outcome

We helped the client release the phone on schedule. Supplemented with a secured system app, it now attracts customers who want full control over their devices.
The phone is already available worldwide and has found a loyal audience among users interested in cryptocurrencies, blockchain technologies, and secure crypto transactions. The unique app functionality encourages customers to choose this particular device over other analogs on the market, for they know their smartphones are protected to the maximum.

600h405_5

Team:

6 experts (Project Manager, 3 Android Developers, QA Engineer, Business Analyst)

Tech Stack:

Kotlin, AOSP, Android SDK, ViewModel, Coroutines, Hilt

Contact Us

Latest Insights

Why Do Companies Outsource? Lessons Learned And Outsourcing Examples

Understand the strategies of other major companies that outsource so you can ensure that your business is run in the most cost-effective manner possible.

Offshore Development: Guide to Successful Collaboration

Offshore development allows businesses to leverage outsourcing to build high-quality solutions. Let’s explore how offshoring can empower you to create better apps.

Everything You Need to Know About Microservices in Simple Terms

A microservice is a component of an application that is made to operate autonomously. Consider the advantages of the microservices architecture.

Guide to Software Integration with Examples, Types, and Benefits

Data silos and lack of transparency are detrimental to a company’s health. Learn how software integrations can remedy these and other common challenges.

How to Choose a Cross Platform Framework for Your App

How to develop a piece of mobile software in the most all-around cost-efficient, time-efficient, smooth manner based on your specific budget and requirements? Pick the right development model from the get-go. And a cross-platform approach may just be the most optimal choice for you.

How to Properly Prepare Your Dataset for Machine Learning

Preparing data for machine learning is a complex process that requires technical and domain expertise. Explore techniques to prepare your data for ML algorithms.

Web 3.0: New Generation of Internet

Learn what Web 3.0 is and understand how this new concept of the internet is related to blockchain and cryptocurrency.

What Is Adtech and Why Is It Important?

Do you think it’s worth implementing adtech into your marketing processes? Find out this in our article.

What is Infrastructure as Code? Benefits and Best Practices

How can Infrastructure as Code lower your costs and accelerate development? Learn more about IaC tools and best practices.