Security System | Android

UI/UX project

This security system will be the native app for the upcoming modified Android phone.
This compact cyberphone boasts top-notch design elements and security features for anyone that desires greater mobile protection with 4 features:
Location Lock—location-based security settings to unlock/lock the phone and/or specific files at designated locations.
SIM Card Lock—device lockdown feature to protect users from personal information theft when their phone is lost or stolen, the SIM card is removed or an unfamiliar one is reinserted.
Facial Recognition—facial recognition software with liveliness detection capabilities to guarantee the phone and files are safe from intruders attempting access with a 2D image.
Duo AES—Advanced encryption software to support 256-bit encryption for optimal data security as well as 512-bit military-grade encryption for working with highly classified information.

After activated each features, they will simultaneously work together to protect user’s phone. 
This wireframe is the foundation of the app’s workflow, showcasing the relationship among each page.  
The activation and deactivation process for each security feature falls under similar workflow since they are all apart of the suite. This reduced user’s learning curve, and created smooth user experience for the app suite.

The overall visual elements are under Material Design guidelines since it’s an app for android phone. 
Each logo for each security features were beautifully crafted, delightful, and easy to understand.  
All the utility icons are directly from Material Design library  so they are synced with default android system.

Loading screen + Navigation panel
During the initial lunch of the app, it will automatically run the first scan to determine phone’s security level. The logo in the loading screen will transfer to the scanning process which will result the phone’s security level, where user can click to activate each security feature to protect their phone. Security levels will separate to 3 different levels. Level Low, Fair, and High is based on how many security features were activated or currently running.  User can go to app’s navigation panel to access their account settings, app setting, notifications, and passcode for other features

SIM Card Lock workflow
SIM lock require 2 SIM cards installed in the phone so it will detect and notify user if there is missing SIM card in the slot. Activation process will be available when 2 SIM cards are properly installed in the phone. After successfully activated the SIM lock feature, user will be notified the phone and 2 SIM cards are linked. User will not able to access the phone if they take off the SIM card.  For deactivate process, user can use their fingerprint or deactivation code to deactivate SIM lock. They can also call customer service if they forget or loss their credentials.

Location Lock workflow
Location lock allows user to set up 2 addresses for location based security feature. The challenge of designing the set up process is fairly more complicated since it involves more user input. The decision applied to this workflow is to expand the information panel within the same page while user trying to edit the address. This animation will give user a direct feedback while reduce the complicity of create another page level to input information. Another small feature added to this page is Preview on map, which gives user a visual representation of the space covered by the selected amount of radius, making it easier for user to understand how their information will be protected.

Location Lock Geofencing workflow
Geofence creates an easier workflow for user to just open the map and drop the pin to set up the Location Lock feature.
Many apps in the market now use Geofence such as Uber and Lyft.
The challenge here is to design an very straight-forward user-flow to reduce learning curve for new users.  By adding small animations to generate direct feedback to users whenever they click on each button or icons or moving the map in this case will resolve the problem.

TrueFace workflow
Quick access and easy to use are 2 top priorities while designing the workflow for facial recognition security feature. During the initial set up, user will be asked to set a passcode for future access the setting of this feature. This passcode can also be created and edited in the user’s navigation panel.  After entering the facial recognition page, user will be facing their face in front of the camera to let TrueFace record user’s facial features.  User will be able to reset or delete the recorded facial features by enter the passcode created during the initial set up process.

Fingerprint workflow
Similar to Facial Recognition, quick access and easy to use are 2 top priorities while designing the workflow for Fingerprint security feature. During the initial set up, user will be asked to set a passcode for future access the setting of this feature. This passcode can also be created and edited in the user’s navigation panel.  After entering the fingerprint recognition page, user will need to place their finger on the phone’s scanner to record their fingerprint data.  User will be able to reset or delete the recorded fingerprint data by enter the passcode created during the initial set up process.

Security System | Android

This security system will be the native app for the upcoming modified Android phone.
This compact cyberphone boasts top-notch design elements and security features for anyone that desires greater mobile protection with 4 features:
Location Lock—location-based security settings to unlock/lock the phone and/or specific files at designated locations.
SIM Card Lock—device lockdown feature to protect users from personal information theft when their phone is lost or stolen, the SIM card is removed or an unfamiliar one is reinserted.
Facial Recognition—facial recognition software with liveliness detection capabilities to guarantee the phone and files are safe from intruders attempting access with a 2D image.
Duo AES—Advanced encryption software to support 256-bit encryption for optimal data security as well as 512-bit military-grade encryption for working with highly classified information.

Project details

Work:   The Macate Group
Category: UI/UX
Date:     January 2016
Web:     macate.com