0% found this document useful (0 votes)
21 views

Anti Theft Application For Android Based

The document describes an anti-theft application called Teledroid for Android devices. It allows users to track their device's location, retrieve contacts and files if the device is lost or stolen. The application runs in the background and automatically sends SMS alerts to a user-specified number if the SIM card is changed by a thief. It obtains location using GPS and sends it via SMS. Users can also retrieve contacts and files by sending SMS commands. The application architecture includes modules for configuration, SIM monitoring, information fetching, and a web interface to view location history and download retrieved files. The application aims to reduce the effort needed to track lost devices compared to manually contacting carriers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

Anti Theft Application For Android Based

The document describes an anti-theft application called Teledroid for Android devices. It allows users to track their device's location, retrieve contacts and files if the device is lost or stolen. The application runs in the background and automatically sends SMS alerts to a user-specified number if the SIM card is changed by a thief. It obtains location using GPS and sends it via SMS. Users can also retrieve contacts and files by sending SMS commands. The application architecture includes modules for configuration, SIM monitoring, information fetching, and a web interface to view location history and download retrieved files. The application aims to reduce the effort needed to track lost devices compared to manually contacting carriers.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Advances in Computing 2017, 7(2): 44-47

DOI: 10.5923/j.ac.20170702.07

Teledroid Anti-Theft Application for Android Devices


Rekha Rao*, Sahana B., Sahana V. Prabhu, Shamitha Ammanna, Chaithra

Department of Computer Science and Engineering, St Joseph Engineering College, Vamanjoor, India

Abstract Lots of applications are developed to track a Smart Phone, but still it is a major concern. If ever the phone is lost,
user has to manually report to the customer care to block the IMSI number of the lost phone. This work is reduced by our
application. Our Android Application is deployed with initial registration of user mobile number, alternative mobile number,
and passcode and email id. This application which runs in the background can be able to track the current location of the
device. If the thief changes the SIM card, immediately SIM details, latitude and longitude of the location are sent to the
alternative phone number of the original user through SMS. We can retrieve the contacts and critical files from the lost phone.
We can retrieve important contacts by SMS and entire contact list through mail. We can also retrieve the critical files in the
lost phone by using file transfer facility that is available in the application. Website provides location history of the phone and
we can download the requested files.
Keywords Location tracking, Android Smart Phone, SMS, Email

Application provides the requested services via SMS or


1. Introduction Email.
Location history of the lost phone and meta data of the
In today's world, cell phones play an important role in
requested file along with the downloading of the required file
everyone's life. The mobile OS used by modern smart phones
can be made available through the website.
include Android, Blackberry, Symbian which are the world's
best OS. There are many differences between their features
and performance. It provides multiple options like voice and
video conversation, GPS tracking system and internet usage.
2. Background
Radio signals are constantly been broadcasted by cell phones There are already several applications in the market that
and hence can trace a lost mobile phone. All cell phones offer tracking systems and anti theft applications to detect
constantly send signals to its nearest towers hence it is been non-authorized SIM cards. Most of these applications
possible to track lost phone accurately. provide dedicated solutions using tracking methods to
Anti-Theft application is a project which helps to track the monitor a mobile device [2].
location of smart phones. This application usually runs in the The application can be installed only on mobile phones
background. It consists of Android Client application which with Android operating system. The existing systems which
automatically sends SMS to alternate number when SIM are available in the market are not protected by password, so
card is changed. Position Tracker works on GPS (Global the application can be uninstalled by the thief. This drawback
Positioning System) and GPRS (General Packet Radio is overcome by our proposed system in which we configure
Service) [1]. When SIM flipped, the application will fetch our application with a password during the installation of an
latitude and longitude from satellite and send it as SMS. application.
Owner can send a message to the application in the
predefined format. Application provides the requested
services via SMS or Email. 3. Proposed System
Teledroid is an Android based software which helps us do
some specific operations on a cell phone which is in a remote The proposed system tracks the location of the mobile
location that is accessed through a different user’s cell phone; phone using GPS. This application can be used even if the
operations include retrieving contacts, retrieving files and mobile is present in the moving vehicle. It can be installed on
tracking phone in case the user loses the phone. Owner can the mobile phones with the Google android operating system.
send a message to the application in the predefined format. Upon the SIM change by the thief, notification is sent to the
pre-specified mobile number.
* Corresponding author: System Architecture
rekharao193@gmail.com (Rekha Rao)
Published online at http://journal.sapub.org/ac The architecture of the “Anti-theft application for Android
Copyright © 2017 Scientific & Academic Publishing. All Rights Reserved devices” is as shown in figure 1. Upon SIM change by the
Advances in Computing 2017, 7(2): 44-47 45

thief, notification is sent to pre-specified mobile number. owner and also the Email ID.
Contacts retrieval and deleting of the files that are stored in SIM monitoring module
lost phone can be obtained by sending predefined formatted
This module is used to continuously monitor the SIM
SMS. The critical files in lost phone can be obtained by using
change. The application stores the owners SIM serial number
file transfer facility that is available in the application. The
during the installation process. This SIM serial number is
file request must be sent from a smart phone with the GPRS
checked against the current SIM serial number. If the SIM is
facility enabled and the application installed in it [3].
flipped then SMS notification is sent to the predefined
mobile number that was given during configuration process.
This feature will be continuously running in the background
4. Implementation checking for the SIM change. [4]
This section describes the modules required for Information fetching module
implementing the system which is done in informal design.
If the SIM is flipped the application sends SMS regarding
Formal design describes the internals of each module. It
the details of the new SIM to the predefined mobile number.
describes the logic implemented in that module to perform
If the owner wants to get the information from lost phone,
the desired function.
then the role of the user is to send predefined formatted SMS
Our proposed system contains following module: to the lost android smart phone having the application
1. Configuration Module installed in it from any alternate mobile. Even though the
2. SIM Monitoring Module SIM is not flipped these predefined formatted SMS can be
3. Information Fetching Module used to fetch the information from the lost smart phones.
4. Web Module Files from the lost phone can be obtained from file transfer
Configuration module facility which requires an alternate smart phone with GPRS
facility enabled. [5].
This module is used to acquire the current SIM
information from the owner. The application is configured Web module
with the password from being uninstalled by untrusted user. Web module provides the alternative way to check the
In this module login page is created where owner specify the requested files; user can download the files from the web
authorized SIM numbers. The owner also provides the once the request has been placed. It also helps the user to
password to protect predefined formatted SMS, alternate track the location history of the lost mobile. [6].
mobile number, current mobile number that belongs to

Figure 1. System Architecture


46 Rekha Rao et al.: Teledroid Anti-Theft Application for Android Devices

5. Results
Figure 2- 6 shows the snapshots of the proposed method.

Figure 2. Registration Page


Figure 4. Entire Contacts retrieval to e-mail

Figure 5. File retrieval create request

Figure 3. Contact retrieval through SMS

Figure 6. Location History


Advances in Computing 2017, 7(2): 44-47 47

6. Conclusions and Future Scope


This paper presents a novel anti–theft application for
android based devices. The application deploys an enterprise REFERENCES
security solution that meets user’s immediate and long term
requirements by providing the message and location via [1] Sangwoo Cho; Haekyung Jwa; Joohwan Chun; Jong Heun
website. Lee; Yoon Seok Jung; 'Mobile position location with the
constrained bootstrap filter in a cellular communication
On theft detection the application will send a notification system' Conference Record of the Thirty-Fourth Asilomar
SMS to the owner alerting him with the information about Conference on Volume 1,2000.
the new SIM inserted by the thief and the location
information without the knowledge of thief. Other [2] Sonia C.V & A R Aswatha; 'SAPt: A Stolen Android Phone
Tracking Application'; ITSI Transactions on Electrical and
information that is stored in the lost phone can be fetched Electronics Engineering (ITSI-TEEE).
using SMS or email facilities. Also it is possible for the
owner to delete the secret information that is stored in the [3] A Mondal; Md. A. Masud; N. K. Biswas; 'Smartphone
Tracking Application using Short Message Service';
lost phone.
International Journal of Electronics, Electrical and
It stands different from the existing system as it not only Computational System (IJEECS).
uses GPS and text messaging features but also the GPRS
facility that is available in the smart phone. Thus the [4] Jalil Ghahramani; Masoud Sabaghi; Hamed Shams Oskouie;
'Design an Intelligent Monitoring for Anti-theft System using
developed application is a unique and efficient application
GPS/GSM'; Indian Journal of Engineering, volume 1, number
which enhances the existing mobile tracking application. 1, November 2012.
The Anti-theft application is implemented on Android, it
can be enhanced to enable the application to work on other [5] Mahfuzulhoq Chowdhury; Talemul Islam; Parijat Prashun
Purohit; 'Tracking a cellular phone in a stolen phenomena';
platforms. The application will not work if the lost phone International Journal of u- and e- service, Science and
gets switched off. So additional work can be done to switch technology, 2014.
on the phone after certain period of time and thus helps in
efficient tracking of the lost phone. [6] Android, A Programmer's Guide. (0-07-159988-6); Jerome
(J.F.) DiMarzio.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy