Request a call
  • Hidden

Business Overview

Business Overview

Our client is a hardware and software provider specializing in data security. They planned to launch a cutting-edge Android smartphone seamlessly integrated with their blockchain network, positioning it as a portable, highly protected crypto wallet. The company aimed to develop a phone that, in addition to its core functions, creates a safe environment for secure crypto transactions.

To this end, the client decided to empower their custom firmware with a unique system application designed to record all events occurring with the phone when it’s not in use. The goal was to increase the device’s security even more and thus improve user trust in the client’s company and their product.

600h405_1

Challenges

  • No final product vision. The client had a general business idea, but due to the lack of mobile development expertise, they couldn’t see the final picture regarding app functionality and design.

  • Custom firmware under development. We needed to develop an app taking into account the technical constraints of integrating it with the custom firmware, which was still under development.

  • Tight deadlines. We had to meet the scheduled deadlines since the client had already planned the smartphone’s release, followed by its presentation.

Solution

Solution

To minimize risks and realize a finalized scope of work, we started our project with the following steps:

  • Conducting a discovery phase, during which our team formed a solution that would maximally cover all identified business needs.
  • Review of their initial groundwork, after which we suggested many UX and UI improvements and also concluded the inexpediency of reusing existing code.
600h405_2

Android System Application

600h405_3

Android System Application

We built the app by modifying the Android Open Source Project (AOSP) and using the features available in the Android SDK. Among them are Bluetooth, content providers for getting information about launching and closing applications, broadcast receivers for tracking the locking and unlocking of a mobile phone, and many others.

To provide an even greater level of protection, we encrypted the tracked data using a symmetric method based on the SHA-256 algorithm.

Events The App Tracks

Events The App Tracks

The application works in the foreground, offline, storing data in a cache and monitoring events such as:

  • Opening and closing applications
  • Connecting a USB cable
  • Attempts to unlock the screen
  • User access to the internet, etc.

The app records the events in the log, designed in a visually appealing tabular format, and captures the other user’s actions through screenshots. It also takes a webcam photo of the user if the screen unlocks.

600h405_4

User Flow

Outcome

Outcome

We helped the client release the phone on schedule. Supplemented with a secured system app, it now attracts customers who want full control over their devices.
The phone is already available worldwide and has found a loyal audience among users interested in cryptocurrencies, blockchain technologies, and secure crypto transactions. The unique app functionality encourages customers to choose this particular device over other analogs on the market, for they know their smartphones are protected to the maximum.

600h405_5

Team:

6 experts (Project Manager, 3 Android Developers, QA Engineer, Business Analyst)

Tech Stack:

Kotlin, AOSP, Android SDK, ViewModel, Coroutines, Hilt

Contact Us

Latest Insights

Blockchain Security: How Can You Ensure It?

Blockchain security: what is it? Why do you need a special approach to ensure it? Learn tips and tricks in our article.

How to Create a Location-based App: Tech Requirements & Pitfalls Explained

Building a GPS application can be a real challenge, but understanding the consequence of app development and involving an experienced tech partner into your project will bring your idea to reality.

How to Cut Costs Without Layoffs in the Face of Global Crisis

This article describes how your business can reduce operational and IT costs with help of tech solutions during a global crisis while maintaining business growth.

Serverless Architecture 101: What is it and How Do You Benefit From It?

What exactly is serverless architecture? What are its main specifics? For which applications is it the best option? Let’s find out all of these in our article.

Machine Learning in Marketing: Comprehensive Guide for Newcomers

Digital marketing and machine learning: advanced technologies as the key to success for your business.

What is Infrastructure as Code? Benefits and Best Practices

How can Infrastructure as Code lower your costs and accelerate development? Learn more about IaC tools and best practices.

Crucial Trends and Vital Benefits of IoT Across Various Sectors 

IoT is a fast-growing technology that has already penetrated multiple industries. Let’s discuss the use cases and advantages across various sectors.

Machine Learning as a Service: Comparison of Cloud Providers

Looking for a trusted MLaaS vendor? Choose the best one with our Amazon vs Microsoft Azure vs Google Cloud AI vs IBM Watson in-depth overview.

Cybersecurity Risk Management Strategy: Tips and Benefits

With the constant uptick of cybercrime, having a fully-fledged cybersecurity risk management strategy can help you safeguard your valuable data and avoid threats.