Screenshots
The application user is required to register a password with the application as with the screen shot below.
Fig 1. A
screenshot depicting the provision of password entry to access the FHEA
The mobile phone owner can choose from the menu basing on the functionality required.
Fig 2: A screenshot of the menu page
of the FHEA application
A screen shot depicting how the user is able to view encrypted call logs while within the application
Fig 3: A screenshot of encrypted call logs, only visible within the FHEA application
A screen shot showing a contact which has been encrypted by the user.
Fig 4: A screenshot of an encrypted contact in the ALL option of the FHEA application
A screen shot showing some of the call logs hidden by the user
Fig 5: A screenshot of all the hidden call logs of the FHEA application, only visible within the application
A screen shot showing all the messages within the user;s mobile phone
Fig 6: A screenshot of all the messages in the user's mobile phone
A screen shot depicting hidden messages
Fig 7: A screenshot of some of the messages hidden but only visible within the application.
A screen shot showing some of the categories of files that the user can hide with the application
Fig 8: A screenshot showing the categories of files that the application can hide
No comments:
Post a Comment