1. G E T Y O U R L O S T D E V I C E B A C K J U S T B Y
C A L L I N G I T
G-TRAP
(GSM Based Tracing Ranging and Protecting)
4/11/2017
Presented By:-
MANISH PATEL
KIRTI PRAKASH
2. The Problem
Increasing number of theft of electronic gadgets is a
very serious problem.
There might be some very important data in your
laptop , PDA’s or any other device.
The victim undergoes a financial setback.
Meager chances of recovering the object with police
help.
4/11/2017
3. Theft Happened !!! What Next ??
Conventionally –
Go to police.
Lodge a FIR.
Search everywhere
possible.
Hope to get your
device and data intact.
Police has no option.
Have a look now—
“CALL” your device
“Command it to STOP
working.
DATA is secure.
Now CALL the Police
TRACE your device by it’s
“PHONE NUMBER.”
4/11/2017
4. D O N ’ T W O R R Y … . Y O U C A N H A V E I T B Y
P A Y I N G F E W E X T R A B U C K S ! ! !
Thinking About Cost ??
4/11/2017
5. The System :
Let’s see what is
to be done to
bring this to
work
A GSM Module along with a SIM card will be
installed in manufacturing phase.
Customers will be told about the SIM number
and it’s calling 10-digit number.
If the device gets stolen , just CALL that
number and after automatic receiving of call
by the device , Press 1 to deactivate it.
Now as long as the call is active device
location can be easily traced with the help of
police.
Activate it again by calling and Pressing 2
after successful recovery.
4/11/2017
6. How it works ??
As soon as you call the device , the GSM module inside it receives the call automatically.
On Pressing 1 , the DTMF of Key-1 is transmitted to the device.
The DTMF decoder , after receiving the “1” signal , will give the output as BCD , 0001 the
change in LSB can be used as a switch to break/make connection between power cord
and the motherboard.
4/11/2017
7. Continued…
After the connection is broken...the device will stop working…the data
is secured…and the call is still active.
Now you can call upon the police and ask to trace the number of your
laptop.
As long as the call is connected it can be traced back.
Recover your device.
Call again and press 2 for activating it again.
4/11/2017
8. The DTMF
Heart of this system is a
Dual Tone Multiple
Frequency Decoder
which figures out the
key pressed by you on
the keypad.
Every key on the keypad is characterized by
two sinusoidal frequencies.HIGH & LOW
On pressing the key , it generates a
combination of these frequencies and by
suitably decoding the signal we can know
which key was pressed
4/11/2017
10. DTMF Keypad Frequencies
1209 Hz 1336 Hz 1477 Hz 1633 Hz
697 Hz 1 2 3 A
770 Hz 4 5 6 B
852 Hz 7 8 9 C
941 Hz * 0 # D
CM 8870 IC is used for
decoding the DTMF
signal incoming in a call.
0-9 can be represented
by BCD numbers..and
hence the IC output is a
4-bit BCD pattern
representing numbers.
4/11/2017
11. Working
Circuit
The output is taken in
the form of 4 weighted
LEDS.
The number is detected
by their pattern of
glowing.
4/11/2017
12. GSM
The Global System for
Mobile communication
provides a very effective
wireless
communication.
We are using the same
here.
When you call your
device , the call will
trace it and make a
request , which will be
automatically
acknowledged.
4/11/2017
14. Is your data costlier than device ??
India is a major IT hub at the global level and the IT professionals are
using software for testing , verification , debugging etc.
Some of them cost lacs & crores of Rupees.
Their DATA is COSTLIER than the LAPTOP.
G-TRAP can help them to secure it.
4/11/2017
15. Defense Data Security
In defense sector
although the data is
not costlier but they
need security ,
hence in case
someone breaches
into the
database…the OS
can be disabled to
boot up.
In this way, we can
secure the vital
information.
4/11/2017
16. Tracing the device
A SIM card can be traced back by obtaining the VLR and HLR register
values , which you can get from your corresponding service provider
after lodging the FIR.
With the Home Location Register (HLR) and Visitor Location Register
(VLR) values compared one can easily reach the device.
4/11/2017
17. 1. Device can be deactivated immediately
2. Data is secured
3. Licensed software can not be
unauthorized
4. Device can be recovered by tracing the
sim card.
5. No damage to hardware or data hence no
backup needed
Overall Benefits
4/11/2017
18. • Strongly network
dependent
• Calling the device will
cause calling cost
• Added Hardware
complexity
• The secret number
should be secure.
• Dedicated network with
best coverage can be
used
• Normal local rates are
very less than the device
cost.
• It can be programmed
to change the pin by the
user
Disadvantages & Remedies
4/11/2017
19. A Step Ahead
Using the same SIM
installed in the device
we can access voice and
data services.
For large costlier
systems GPS locator can
be used for exact
location.
We can control the
device from a remote
location.
4/11/2017
20. At last we can say that this system prove
very useful if implemented properly. When
the use increases then companies can devise
low cost devices. Customers can secure their
devices worth hundreds of thousand rupees
by spending few hundred rupees only.
Conclusion
4/11/2017