SlideShare a Scribd company logo
1 of 31
Download to read offline
Mobilereg Nigeria Ltd.
www.fonreg.com
Grants for innovations. We are investing in your future.
Why Fonreg?
Since the launch of smartphones there has been
increase in crimes involving Stolen Mobile Phones.
Mobile phones crimes usually involve AGGRESSION
and VIOLENCE, but may also be assosciated with
BUGLARY, KIDNAPPING and MURDER.
We decided that enough is enough…
Crime rates in Nigeria
Source: https://www.numbeo.com/crime/country_result.jsp?country=Nigeria
All these crimes involve stolen mobile phones.
Registration page
Phone Form
Individual Accounts
Register your phone
Report Lost or Stolen phone
Police Account
Information to Police
about checked stolen phone or attempt to sell Stolen phones
Information to external system
in XML format
Check IMEI
Police checks IMEI numbers
for free!
Thank to the responsive version
Police officers can Check IMEI
numbers with Smartphones.
Database of all phones available
for the Police
List of all phones with stat of
users
Possibility of filtering data
Detailed informations about
the hardware and the owner
History of each phone
registered in the system
Every change of status is
register in the system.
If it is possible we collected
information about the IP address
Mobile Phone Operator
Account
List of phones submitted
to the operator
Operator may be informed of
the theft or lost of mobile
User can send a request for
the operator to completely
lock the phone (hard block)
Operator can send a list of
blocked or lost phone system
Import data from Excel (XLS)
Database of all phones available
for Operators
List of all phones with user
stats
Possibility of filtering data
Detailed information about the
hardware but not the owner
details!
View the history of each phone
registered in the system
Operators can participate in the
program Fonreg Pays You
Operators can cooperate
Partner with Fonreg.
Their offer will
appear on the Fonreg
Fonreg can add new partners,
new offerings and generate
leads for Partners.
Checking Services
Checking by members
Checking Result
Checking the status of your phone
User gives the IMEI number (optional
manufacturer, brand, serial number)
Search the IMEI
number in the
database Fonreg
Search IMEI number in
external collections (ie.
Big Data)
Search foreign services as:
imei.info or GSMA blacklist
Generating report
Notify Police
Notify owner
Reported as
stolen?
Email sent
to Phone Owner
Phone for sale
Search Professional
Buyers by location
Proffessional Buyers Address
is linked to Google Maps
(Integration with Google Maps service)
Fonreg Chat System
Place to exchange
information about the
phones, phones operators
and security.
Using of Big Data
in Fonreg system
Using of Big Data
in Fonreg system
Administration of Languages
Monetizing of Fonreg
1. Commission from Sale of Mobile
phones
2. Advertising
3. SMS checking
4. Fonreg Pays You
Thank you
for your attention!

More Related Content

What's hot

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftAlireza Ghahrood
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactionsAlireza Ghahrood
 
Comodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL DocumentsComodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL DocumentsCheapSSLsecurity
 
V way call
V way callV way call
V way callajbayne
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protectionsipspat
 
Identity Theft Marketing by SK
Identity Theft Marketing by SKIdentity Theft Marketing by SK
Identity Theft Marketing by SKSandy Kleinhenz
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFairfax County
 
001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom fieldMichalis Mavis, MSc, MSc
 
Cell Phone Plans
Cell Phone PlansCell Phone Plans
Cell Phone Planspleasure16
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminalsChip Thornsburg
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Jacqueline Fick
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 

What's hot (19)

FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Baldino legal
Baldino legalBaldino legal
Baldino legal
 
ID Theft
ID TheftID Theft
ID Theft
 
Cscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theftCscu module 10 social engineering and identity theft
Cscu module 10 social engineering and identity theft
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
Comodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL DocumentsComodo Extended Validation (EV) SSL Documents
Comodo Extended Validation (EV) SSL Documents
 
V way call
V way callV way call
V way call
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
California Privacy Law: Resources & Protections
California Privacy Law: Resources & ProtectionsCalifornia Privacy Law: Resources & Protections
California Privacy Law: Resources & Protections
 
Identity Theft Marketing by SK
Identity Theft Marketing by SKIdentity Theft Marketing by SK
Identity Theft Marketing by SK
 
Fraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying InformationFraud and Identity Theft: Protecting Your Personal Identifying Information
Fraud and Identity Theft: Protecting Your Personal Identifying Information
 
001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field001-MAVIS - Criminal acts in the telecom field
001-MAVIS - Criminal acts in the telecom field
 
Cell Phone Plans
Cell Phone PlansCell Phone Plans
Cell Phone Plans
 
Why can’t police catch cyber criminals
Why can’t police catch cyber criminalsWhy can’t police catch cyber criminals
Why can’t police catch cyber criminals
 
E Fraud
E FraudE Fraud
E Fraud
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23Cataleya-Security-Feature_SAWC_April2016page-20-23
Cataleya-Security-Feature_SAWC_April2016page-20-23
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 

Similar to Fonreg presentation - official

Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniDr Raghu Khimani
 
Identity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable TelecomsIdentity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable TelecomsAlan Quayle
 
Mobile phone security advisory for parents
Mobile phone security advisory for parentsMobile phone security advisory for parents
Mobile phone security advisory for parentsbryan
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
 
(2nd edition) tellows magazine
(2nd edition) tellows magazine(2nd edition) tellows magazine
(2nd edition) tellows magazinetellows
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedSai Srinivas Mittapalli
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensicsi4box Anon
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needsPhonerator, an advanced *valid* phone number generator for your OSINT/SE needs
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needsMartin Vigo
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptxManojMudhiraj3
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection- Mark - Fullbright
 
FraudStrike
FraudStrike FraudStrike
FraudStrike XINTEC
 

Similar to Fonreg presentation - official (20)

Mobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu KhimaniMobile Phone Seizure Guide by Raghu Khimani
Mobile Phone Seizure Guide by Raghu Khimani
 
Identity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable TelecomsIdentity, Authentication, and Programmable Telecoms
Identity, Authentication, and Programmable Telecoms
 
Mobile phone security advisory for parents
Mobile phone security advisory for parentsMobile phone security advisory for parents
Mobile phone security advisory for parents
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
V4I5201553
V4I5201553V4I5201553
V4I5201553
 
Mobile phone cloning
Mobile phone cloningMobile phone cloning
Mobile phone cloning
 
(2nd edition) tellows magazine
(2nd edition) tellows magazine(2nd edition) tellows magazine
(2nd edition) tellows magazine
 
Mobile Phone Cloning
Mobile Phone CloningMobile Phone Cloning
Mobile Phone Cloning
 
Mobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermentedMobile cloning modified with images and bettermented
Mobile cloning modified with images and bettermented
 
Mobile cloning
Mobile cloningMobile cloning
Mobile cloning
 
Handset Theft - A Case Study
Handset Theft  - A Case StudyHandset Theft  - A Case Study
Handset Theft - A Case Study
 
Shelton mobile forensics
Shelton mobile forensicsShelton mobile forensics
Shelton mobile forensics
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
Mobile phone-cloning
Mobile phone-cloningMobile phone-cloning
Mobile phone-cloning
 
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needsPhonerator, an advanced *valid* phone number generator for your OSINT/SE needs
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
 
mobile jammer ppt.pptx
mobile jammer ppt.pptxmobile jammer ppt.pptx
mobile jammer ppt.pptx
 
Mobile Cloning
Mobile Cloning Mobile Cloning
Mobile Cloning
 
Mobile Wallet Services Protection
Mobile Wallet Services ProtectionMobile Wallet Services Protection
Mobile Wallet Services Protection
 
FraudStrike
FraudStrike FraudStrike
FraudStrike
 
Cloning. (4)
Cloning. (4)Cloning. (4)
Cloning. (4)
 

Fonreg presentation - official