SlideShare a Scribd company logo
1 of 9
PHONE GUARD
MOBILE ANTI-THEFT SYSTEMS
WELCOME
PHONE GUARD
MOBILE ANTI-THEFT SYSTEMS
M.MOKESH (21SUCS126)
P.HARISHCHANDRU (21SUCS118)
GUIDE:-
Mrs. D. BalaPriya, MCA, M.Phil.,
Assistant professor
ABSTRACT
• Mobile devices are valuable and portable items that are often targeted by
thieves.
• Existing solutions either rely on dedicated hardware or provide limited
functions.
• we propose a novel mobile anti-theft system that uses only the inertial
sensing data from the device to detect thefts in real time. The system
identifies the user’s behavior by segmenting and analyzing the motions
during the take-out action.
• The system then tracks the user’s habit using a Markov model and alarms
when the tracked data deviate from the normal pattern. We implement the
system on Android and evaluate its performance in various scenarios.
• The results show that the system is accurate, robust, and user-friendly.
Objectives
• To establish a secure connection between the mobile device and the
owner or authorized user.
• To enable the mobile device to notify the owner or authorized user in
case of theft or unauthorized access.
• To facilitate the locking, wiping, or tracking of the mobile device
remotely by the owner or authorized user.
• To locate and recover the mobile device if possible, or prevent the
misuse of the data stored on it.
Existing System
• Find My Phone (Google)
• Find My iPhone (Apple)
"Drawback's tracking functionality is contingent upon
the active status of your phone; if it is switched off,
the app will be unable to monitor its location."
Proposed System
Phone Guard
Mobile Anti-Theft System PHONE GUARD
MOBILE ANTI-THEFT SYSTEMS
• This application incorporates a simulated shutdown feature,
providing the appearance of a powered-off state while actively
running in the background.
• This application offers a simulated airplane mode functionality,
wherein the feature emulates the activation of airplane mode on
your phone. However, in actuality, the device remains operational
within the network.
• This application is designed for real-time location tracking.
Software Specifications
Android Studios Fire Base Figma
Modules
• Login Module
1. Login Activity
2. Register Activity
3. Forget Password Activity
• Main Module
1. Find Phone Activities
2. Phone Guard Activities
1. Fake Shutdown Switch
2. Fake Airplane Mode Switch
3. SOS Mode Switch
THANKYOU

More Related Content

Similar to PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA

Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
danhaley45372
 
36890126-Blue-Eyes.ppt
36890126-Blue-Eyes.ppt36890126-Blue-Eyes.ppt
36890126-Blue-Eyes.ppt
AjaySahre
 

Similar to PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA (20)

Isaca tech session 19 feb 2013 securing mobile devices rev
Isaca tech session 19 feb 2013   securing mobile devices revIsaca tech session 19 feb 2013   securing mobile devices rev
Isaca tech session 19 feb 2013 securing mobile devices rev
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
Part 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docxPart 3 ApplicationEnd-User Security Recommendations.docx
Part 3 ApplicationEnd-User Security Recommendations.docx
 
Cell phone parental support application
Cell phone parental support applicationCell phone parental support application
Cell phone parental support application
 
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
BlackHat Europe 2013 - Practical Attacks against Mobile Device Management (MDM)
 
36890126-Blue-Eyes.ppt
36890126-Blue-Eyes.ppt36890126-Blue-Eyes.ppt
36890126-Blue-Eyes.ppt
 
portable security camera.
portable security camera.portable security camera.
portable security camera.
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
blue-eyes technology
blue-eyes technologyblue-eyes technology
blue-eyes technology
 
Mobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptxMobile_Forensics- General Introduction & Software.pptx
Mobile_Forensics- General Introduction & Software.pptx
 
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
[EUC2014] cODA: An Open-Source Framework to Easily Design Context-Aware Andro...
 
a-Blue-Eyes.pptx
a-Blue-Eyes.pptxa-Blue-Eyes.pptx
a-Blue-Eyes.pptx
 
RAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AIRAT Trap: Home Surveillance System Using IoT & AI
RAT Trap: Home Surveillance System Using IoT & AI
 
Mobile frame asset management in depth
Mobile frame asset management in depthMobile frame asset management in depth
Mobile frame asset management in depth
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?How can EMM help with GDPR compliance?
How can EMM help with GDPR compliance?
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 

More from ssuser7f90ae

More from ssuser7f90ae (12)

21UCAE53 The-Internet-Of-Things.pptx(MTNC)
21UCAE53 The-Internet-Of-Things.pptx(MTNC)21UCAE53 The-Internet-Of-Things.pptx(MTNC)
21UCAE53 The-Internet-Of-Things.pptx(MTNC)
 
21UCAE61 Cyber Security.pptx(MTNC) (BCA)
21UCAE61 Cyber Security.pptx(MTNC) (BCA)21UCAE61 Cyber Security.pptx(MTNC) (BCA)
21UCAE61 Cyber Security.pptx(MTNC) (BCA)
 
21UCAE52 Software Project Management.ppt
21UCAE52 Software Project Management.ppt21UCAE52 Software Project Management.ppt
21UCAE52 Software Project Management.ppt
 
21UCAC 41 Database Management System.ppt
21UCAC 41 Database Management System.ppt21UCAC 41 Database Management System.ppt
21UCAC 41 Database Management System.ppt
 
23UCAEC21 Introduction to Data Science.pptx
23UCAEC21 Introduction to Data Science.pptx23UCAEC21 Introduction to Data Science.pptx
23UCAEC21 Introduction to Data Science.pptx
 
21UCAE65 Software Testing.pdf(MTNC)(BCA)
21UCAE65 Software Testing.pdf(MTNC)(BCA)21UCAE65 Software Testing.pdf(MTNC)(BCA)
21UCAE65 Software Testing.pdf(MTNC)(BCA)
 
21UCAC61 C# and .Net Programming.pdf(MTNC)(BCA)
21UCAC61 C# and .Net Programming.pdf(MTNC)(BCA)21UCAC61 C# and .Net Programming.pdf(MTNC)(BCA)
21UCAC61 C# and .Net Programming.pdf(MTNC)(BCA)
 
21UCAE55 Management Information Systems.pdf(MTNC)(BCA)
21UCAE55 Management Information Systems.pdf(MTNC)(BCA)21UCAE55 Management Information Systems.pdf(MTNC)(BCA)
21UCAE55 Management Information Systems.pdf(MTNC)(BCA)
 
21UCAC31 Java Programming.pdf(MTNC)(BCA)
21UCAC31 Java Programming.pdf(MTNC)(BCA)21UCAC31 Java Programming.pdf(MTNC)(BCA)
21UCAC31 Java Programming.pdf(MTNC)(BCA)
 
23UCAFC11 Programming in C.pdf (MTNC)(BCA)
23UCAFC11 Programming in C.pdf (MTNC)(BCA)23UCAFC11 Programming in C.pdf (MTNC)(BCA)
23UCAFC11 Programming in C.pdf (MTNC)(BCA)
 
23UCACC11 Python Programming (MTNC) (BCA)
23UCACC11 Python Programming (MTNC) (BCA)23UCACC11 Python Programming (MTNC) (BCA)
23UCACC11 Python Programming (MTNC) (BCA)
 
கல்மரம் _ 21SUCS033.pdf
கல்மரம் _ 21SUCS033.pdfகல்மரம் _ 21SUCS033.pdf
கல்மரம் _ 21SUCS033.pdf
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA

  • 2. PHONE GUARD MOBILE ANTI-THEFT SYSTEMS M.MOKESH (21SUCS126) P.HARISHCHANDRU (21SUCS118) GUIDE:- Mrs. D. BalaPriya, MCA, M.Phil., Assistant professor
  • 3. ABSTRACT • Mobile devices are valuable and portable items that are often targeted by thieves. • Existing solutions either rely on dedicated hardware or provide limited functions. • we propose a novel mobile anti-theft system that uses only the inertial sensing data from the device to detect thefts in real time. The system identifies the user’s behavior by segmenting and analyzing the motions during the take-out action. • The system then tracks the user’s habit using a Markov model and alarms when the tracked data deviate from the normal pattern. We implement the system on Android and evaluate its performance in various scenarios. • The results show that the system is accurate, robust, and user-friendly.
  • 4. Objectives • To establish a secure connection between the mobile device and the owner or authorized user. • To enable the mobile device to notify the owner or authorized user in case of theft or unauthorized access. • To facilitate the locking, wiping, or tracking of the mobile device remotely by the owner or authorized user. • To locate and recover the mobile device if possible, or prevent the misuse of the data stored on it.
  • 5. Existing System • Find My Phone (Google) • Find My iPhone (Apple) "Drawback's tracking functionality is contingent upon the active status of your phone; if it is switched off, the app will be unable to monitor its location."
  • 6. Proposed System Phone Guard Mobile Anti-Theft System PHONE GUARD MOBILE ANTI-THEFT SYSTEMS • This application incorporates a simulated shutdown feature, providing the appearance of a powered-off state while actively running in the background. • This application offers a simulated airplane mode functionality, wherein the feature emulates the activation of airplane mode on your phone. However, in actuality, the device remains operational within the network. • This application is designed for real-time location tracking.
  • 8. Modules • Login Module 1. Login Activity 2. Register Activity 3. Forget Password Activity • Main Module 1. Find Phone Activities 2. Phone Guard Activities 1. Fake Shutdown Switch 2. Fake Airplane Mode Switch 3. SOS Mode Switch

Editor's Notes

  1. Device Tracking: Leveraging Java's versatility, the application enables real-time tracking of the mobile device's location, helping users and authorities locate and recover stolen devices. Remote Lock and Wipe: Java facilitates the implementation of features allowing users to remotely lock the device or wipe sensitive data to prevent unauthorized access and protect personal information. Java's capabilities enable the creation of geofencing functionalities and alarm systems, triggering alerts if the device moves outside predefined boundaries or under suspicious circumstances.
  2. This application incorporates a simulated shutdown feature, providing the appearance of a powered-off state while actively running in the background. This application offers a simulated airplane mode functionality, wherein the feature emulates the activation of airplane mode on your phone. However, in actuality, the device remains operational within the network.
  3. This application has been meticulously crafted, utilizing Android Studio for development, integrating Firebase for database configuration, and implementing a sophisticated user interface design through Figma