SlideShare a Scribd company logo
1
I LOCATE
SECURITY FOR LOST OR MISPLACED DEVICES
G.BHADRA
 Abstract
 Software requirement specifications
 User interface design
 Algorithm
 Modules
 Demonstration
 Screen shots
 Future Extension
 Conclusion
 References
2
INDEX
ABSTRACT
 ILocate comes with the set of features to locate your lost or
misplaced android mobile. User may find his mobile by turning off
the silent mode by sending simple code as a text message to make
his mobile ring.
 User may also locate his device on map by requesting the mobile’s
current location through sending a simple preconfigured code as
text message from another trusted device to user’s mobile. In
response user will get a link as a text message on a trusted device
which will show user’s mobile’s current location on map.
 User can choose specific numbers to receive the command from
by maintaining a list called – ‘Whitelist’
3
Requirements
Software:
 Android Platform v2.1 and later
Development tools:
 Android SDK: includes all power features of java adding to it
more specific APIs for android development.
 Eclipse IDE 3.7: IDE, with ADT (Android Development Tools)
plug-in, provides features specific to develop,
 debug and deploy the Android Apps.
 SQLite: A database engine helps to create self-contained,
cross-platform databases for Gadgets.
4
Requirements
 Hardware
ARM processor: Reduced Instruction Set Computer (RISC)
–SoC used in Android devices
5
SCREENSHOTS
6
SCREENSHOTS
7
SCREENSHOTS
8
SCREENSHOTS
9
FUTURE EXTENSION
We have included very basic features that required for application to work.
Some advancement in futures may possible for better features and better
user experience.
 Dynamic entries for contacts & fetching contacts from mobile instead of
manual typing:
This version of iLocate has fixed number of allowable contact numbers for
White list and SIM change list. Advance controls may be used to add or
remove text fields as per user’s need. Also application may allow user to
fetch contact from People list itself and selecting accordingly.
 Connecting using internet
Application may be extended to make a use of internet to allow the device
to be located through another device by trusted users (already registered
with application) and to track movements of user’s device.
10
CONCLUSION
 The App Security for lost or misplaced device – ilocate has been
successfully completed. The goal of the system is achieved and
problems are solved. The project is developed in the manner which is
user friendly and required help is provided at different levels.
 The primary goal is to provide security for the lost or misplaced
devices. It tracks the mobiles which are misplaced or lost. A simple
text message from a friend’s mobile will make users mobile to ring
(even if it is on Silent mode) if phone is misplaced within reachable
range. When a user lose his mobile a simple text message from
friend’s mobile will help user to receive his phone’s GPS location .
11
REFERENCES
 Learning Android, Building Applications for the Android
Market by Marko Gargenta, O'Reilly Media
 Android Developer’s official site
http://developer.android.com
 Google
http://www.google.co.in/
 Stack Overflow
http://stackoverflow.com/
& many other blogs, web materials, youtube, etc…
12

More Related Content

What's hot

Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Ecway Technologies
 
Bluetooth Chat
Bluetooth ChatBluetooth Chat
Bluetooth Chat
Panchhi Sahu
 
Ticket To Ride from Elevate UK
Ticket To Ride from Elevate UKTicket To Ride from Elevate UK
Ticket To Ride from Elevate UK
Keir Bowden
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
smilichitti
 
Introduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhoneIntroduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhonerohitnayak
 
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
IRJET Journal
 
5. users
5. users5. users
Iphone Application Development
Iphone Application DevelopmentIphone Application Development
Iphone Application DevelopmentYn Reddy
 
Android Sos app development report
Android Sos app development reportAndroid Sos app development report
Android Sos app development report
Sudhanshu kumar Sah
 

What's hot (10)

Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
Bluetooth Chat
Bluetooth ChatBluetooth Chat
Bluetooth Chat
 
Ticket To Ride from Elevate UK
Ticket To Ride from Elevate UKTicket To Ride from Elevate UK
Ticket To Ride from Elevate UK
 
iPhone Programming
iPhone ProgrammingiPhone Programming
iPhone Programming
 
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
208 jpa016 --multy-user-mobile-bluetooth-two-way-text-chat-pdf
 
Introduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhoneIntroduction to Progamming Applications for the iPhone
Introduction to Progamming Applications for the iPhone
 
IRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually ImpairedIRJET - Voice based E-Mail for Visually Impaired
IRJET - Voice based E-Mail for Visually Impaired
 
5. users
5. users5. users
5. users
 
Iphone Application Development
Iphone Application DevelopmentIphone Application Development
Iphone Application Development
 
Android Sos app development report
Android Sos app development reportAndroid Sos app development report
Android Sos app development report
 

Viewers also liked

BTech Resume
BTech Resume BTech Resume
BTech Resume
Bhadra Gowdra
 
plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
Bhadra Gowdra
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
Bhadra Gowdra
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
Bhadra Gowdra
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
Bhadra Gowdra
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
Bhadra Gowdra
 
Smart card
Smart cardSmart card
Smart card
Bhadra Gowdra
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
Bhadra Gowdra
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
Bhadra Gowdra
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
Bhadra Gowdra
 
Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
Bhadra Gowdra
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
Bhadra Gowdra
 

Viewers also liked (13)

BTech Resume
BTech Resume BTech Resume
BTech Resume
 
plant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstractplant disease recognition method is proposed based on plant images abstract
plant disease recognition method is proposed based on plant images abstract
 
BRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE DocumentationBRAIN COMPUTER INTERFACE Documentation
BRAIN COMPUTER INTERFACE Documentation
 
FUN AND FOOD PPT
FUN AND FOOD PPTFUN AND FOOD PPT
FUN AND FOOD PPT
 
Analysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRAAnalysis of historical movie data by BHADRA
Analysis of historical movie data by BHADRA
 
Braincomputerinterface ppt
Braincomputerinterface pptBraincomputerinterface ppt
Braincomputerinterface ppt
 
Smart card
Smart cardSmart card
Smart card
 
5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc5G NETWORK AND INTERNET OF THINGS doc
5G NETWORK AND INTERNET OF THINGS doc
 
mobile-jammer
mobile-jammermobile-jammer
mobile-jammer
 
5G wireless technology and internet of things
5G wireless technology and internet of things5G wireless technology and internet of things
5G wireless technology and internet of things
 
Worldranking universities final documentation
Worldranking universities final documentationWorldranking universities final documentation
Worldranking universities final documentation
 
Pill camera presentation
Pill camera presentationPill camera presentation
Pill camera presentation
 
Smatcard documentation
Smatcard documentationSmatcard documentation
Smatcard documentation
 

Similar to I locate security for lost or misplaced devices PPT

Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
iCreateWorld
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
Editor IJCATR
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
ITExamAnswers.net
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
IJIR JOURNALS IJIRUSA
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
IJCSEIT Journal
 
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your DroidMobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
IJERA Editor
 
Accident detection
Accident detection Accident detection
Accident detection
Samana Rao
 
Presentation slides of android controlled robot
Presentation slides of android controlled robotPresentation slides of android controlled robot
Presentation slides of android controlled robot
ankit8743
 
Presentation slides on android controlled robot
Presentation slides on android controlled robotPresentation slides on android controlled robot
Presentation slides on android controlled robot
siddharth8743
 
Android note manager application for people with visual impairment
Android note manager application for people with visual impairmentAndroid note manager application for people with visual impairment
Android note manager application for people with visual impairment
ijmnct
 
MobileApplicationTesting.pptx
MobileApplicationTesting.pptxMobileApplicationTesting.pptx
MobileApplicationTesting.pptx
CbhaSlide
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android apps
ijmnct
 
Rococo Software Q3 2010
Rococo Software Q3 2010Rococo Software Q3 2010
Rococo Software Q3 2010
Sean O'Sullivan
 
Logic tree mobile_gv
Logic tree mobile_gvLogic tree mobile_gv
Logic tree mobile_gvLogictreeit
 
Logictree Mobile Practice Presentation
Logictree Mobile Practice PresentationLogictree Mobile Practice Presentation
Logictree Mobile Practice PresentationLogictreeit
 
Personal Assistant Application Using Android
Personal Assistant Application Using AndroidPersonal Assistant Application Using Android
Personal Assistant Application Using Android
Ahmar Ansari
 
MobileApplicationTesting.pptx
MobileApplicationTesting.pptxMobileApplicationTesting.pptx
MobileApplicationTesting.pptxBhavani Testone
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
Ńirjhor Ánjum
 

Similar to I locate security for lost or misplaced devices PPT (20)

Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 12 Exam Answers
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
SensActions-Report
SensActions-ReportSensActions-Report
SensActions-Report
 
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your DroidMobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
 
Accident detection
Accident detection Accident detection
Accident detection
 
Presentation slides of android controlled robot
Presentation slides of android controlled robotPresentation slides of android controlled robot
Presentation slides of android controlled robot
 
Presentation slides on android controlled robot
Presentation slides on android controlled robotPresentation slides on android controlled robot
Presentation slides on android controlled robot
 
Android note manager application for people with visual impairment
Android note manager application for people with visual impairmentAndroid note manager application for people with visual impairment
Android note manager application for people with visual impairment
 
MobileApplicationTesting.pptx
MobileApplicationTesting.pptxMobileApplicationTesting.pptx
MobileApplicationTesting.pptx
 
A case study of malware detection and removal in android apps
A case study of malware detection and removal in android appsA case study of malware detection and removal in android apps
A case study of malware detection and removal in android apps
 
Rococo Software Q3 2010
Rococo Software Q3 2010Rococo Software Q3 2010
Rococo Software Q3 2010
 
Logic tree mobile_gv
Logic tree mobile_gvLogic tree mobile_gv
Logic tree mobile_gv
 
Logictree Mobile Practice Presentation
Logictree Mobile Practice PresentationLogictree Mobile Practice Presentation
Logictree Mobile Practice Presentation
 
Personal Assistant Application Using Android
Personal Assistant Application Using AndroidPersonal Assistant Application Using Android
Personal Assistant Application Using Android
 
MobileApplicationTesting.pptx
MobileApplicationTesting.pptxMobileApplicationTesting.pptx
MobileApplicationTesting.pptx
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
Saurabh_CV
Saurabh_CVSaurabh_CV
Saurabh_CV
 

More from Bhadra Gowdra

Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Bhadra Gowdra
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
Bhadra Gowdra
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
Bhadra Gowdra
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
Bhadra Gowdra
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
Bhadra Gowdra
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
Bhadra Gowdra
 
Fun Food
Fun FoodFun Food
Fun Food
Bhadra Gowdra
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
Bhadra Gowdra
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
Bhadra Gowdra
 

More from Bhadra Gowdra (9)

Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
Your birth-date-surprisingly-reveals-a-lot-about-your-personality,-know-them!
 
Information Security Management
Information Security ManagementInformation Security Management
Information Security Management
 
COLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentationCOLLEGE PHONE BOOK Final documentation
COLLEGE PHONE BOOK Final documentation
 
Parent communication register android application Coding
Parent communication register android application CodingParent communication register android application Coding
Parent communication register android application Coding
 
Parent communication register android application
Parent communication register android applicationParent communication register android application
Parent communication register android application
 
The uniform trade secrets act
The uniform trade secrets actThe uniform trade secrets act
The uniform trade secrets act
 
Fun Food
Fun FoodFun Food
Fun Food
 
Pill camera documentation
Pill camera documentationPill camera documentation
Pill camera documentation
 
Pill camera by bhadra
Pill camera by bhadraPill camera by bhadra
Pill camera by bhadra
 

I locate security for lost or misplaced devices PPT

  • 1. 1 I LOCATE SECURITY FOR LOST OR MISPLACED DEVICES G.BHADRA
  • 2.  Abstract  Software requirement specifications  User interface design  Algorithm  Modules  Demonstration  Screen shots  Future Extension  Conclusion  References 2 INDEX
  • 3. ABSTRACT  ILocate comes with the set of features to locate your lost or misplaced android mobile. User may find his mobile by turning off the silent mode by sending simple code as a text message to make his mobile ring.  User may also locate his device on map by requesting the mobile’s current location through sending a simple preconfigured code as text message from another trusted device to user’s mobile. In response user will get a link as a text message on a trusted device which will show user’s mobile’s current location on map.  User can choose specific numbers to receive the command from by maintaining a list called – ‘Whitelist’ 3
  • 4. Requirements Software:  Android Platform v2.1 and later Development tools:  Android SDK: includes all power features of java adding to it more specific APIs for android development.  Eclipse IDE 3.7: IDE, with ADT (Android Development Tools) plug-in, provides features specific to develop,  debug and deploy the Android Apps.  SQLite: A database engine helps to create self-contained, cross-platform databases for Gadgets. 4
  • 5. Requirements  Hardware ARM processor: Reduced Instruction Set Computer (RISC) –SoC used in Android devices 5
  • 10. FUTURE EXTENSION We have included very basic features that required for application to work. Some advancement in futures may possible for better features and better user experience.  Dynamic entries for contacts & fetching contacts from mobile instead of manual typing: This version of iLocate has fixed number of allowable contact numbers for White list and SIM change list. Advance controls may be used to add or remove text fields as per user’s need. Also application may allow user to fetch contact from People list itself and selecting accordingly.  Connecting using internet Application may be extended to make a use of internet to allow the device to be located through another device by trusted users (already registered with application) and to track movements of user’s device. 10
  • 11. CONCLUSION  The App Security for lost or misplaced device – ilocate has been successfully completed. The goal of the system is achieved and problems are solved. The project is developed in the manner which is user friendly and required help is provided at different levels.  The primary goal is to provide security for the lost or misplaced devices. It tracks the mobiles which are misplaced or lost. A simple text message from a friend’s mobile will make users mobile to ring (even if it is on Silent mode) if phone is misplaced within reachable range. When a user lose his mobile a simple text message from friend’s mobile will help user to receive his phone’s GPS location . 11
  • 12. REFERENCES  Learning Android, Building Applications for the Android Market by Marko Gargenta, O'Reilly Media  Android Developer’s official site http://developer.android.com  Google http://www.google.co.in/  Stack Overflow http://stackoverflow.com/ & many other blogs, web materials, youtube, etc… 12