SlideShare a Scribd company logo
1 of 5
Introduction: 
 This application can prove to be a genuine anti theft app to inform us about our lost phone. 
 Unlike existing anti theft apps our proposed app is well equipped to provide the facility to 
track our lost phone not only through sms but by GPS and camera too. 
 App don’t allow cracking: as the password to login is given by App server therefore the App 
is useless if cracked and used. 
 The most important feature of this project is that our app will allow the authenticated owner 
of the phone to retrieve all data may it be newly clicked pictures or calling to numbers and 
SMS’s will be all stored in his/her personal account(websites account) database. 
 Location tracking using GPS Locator. 
 Detailed information about the no of incomming outgoining calls and SMS was not able. 
 Commanding using internet was not able.
2.1 EXISTING SYSTEM 
 The lost phone was able to command using an SMS only. 
 Alternate numbers was informed about the current SIM changed number via SMS. 
 It was a bit difficult to locate phone with an application, only FIR was mandatory. 
 Location tracking using GPS Locator. 
 Detailed information about the no of incomming outgoining calls and SMS was not able. 
 Commanding using internet was not able. 
 Several advertisements. 
2.2 PROPOSED SYSTEM 
 Locate the mobile and track it: The mobile location can be tracked using the proposed 
approach. 
 Backup, retrieve and erase the critical data that has been stored in the mobile if 
commanded. 
 Listen incoming calls and alert the remote device: The calls to the mobiles can be traced 
from a remote location through GPS. 
 Clicks the picture from front and back camera :It allows to retrieve the first image that is 
click on the phone after it is lost and the image will be saved in our apps server account. 
 Listen incoming SMS and give automatic reply and forward to remote user:Similar to calls 
the Short Messages can also be tracked . 
 App don’t allow cracking :as the password to login is given by App server therefore the App 
is useless if cracked and use. 
 Remote locking:
When phone is lost, user can remotely lock the lost phone through two ways: either via 
server i.e., internet access or by SMS command. 
 Controlling lost phone: 
Phone can be commanded to perform remote operations by giving SMS command or using 
internet our anti theft application contains website, that works as server user can login on 
his/her personally account(similar concept as Gmail account) and can command the phone to 
perform several operation (e.g.- remote locking, clicking picture from phones camera, 
retrieving phones data that may consists of (SMS, gallery, files, contacts), erasing the content 
from the lost phone through a button click, GPS tracking, receiving calls and SMS) 
 The most important feature of this project is that our app will allow the authenticated owner 
of the phone to retrieve all data may it be newly clicked pictures or calling to numbers and 
SMS’s will be all stored in his/her personal account(websites account) database.
3. DESCRIPTION OF PROJECT 
3.1 REQUIREMENTS OF ANALYSIS 
FIGURE 3.1 CLIENT COMPONENT WORKING ON SMART PHONE
SOFTWARE REQUIREMENT 
Operating System Android 
Platform ANDROID SDK 2.3 
Development 
Environment 
eclipse Helios IDE 
Back End MySQL 
Testing Manual Testing

More Related Content

Viewers also liked

Data model scorecard (Article 5 of 11)
Data model scorecard (Article 5 of 11)Data model scorecard (Article 5 of 11)
Data model scorecard (Article 5 of 11)Analytics8
 
αγιος σαββας
αγιος σαββαςαγιος σαββας
αγιος σαββαςanastasialal
 
How to use LinkedIn to Transform your B2B Marketing
How to use LinkedIn to Transform your B2B MarketingHow to use LinkedIn to Transform your B2B Marketing
How to use LinkedIn to Transform your B2B MarketingLets learn Digital
 
Evidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic LibrariesEvidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic LibrariesSusanMRob
 
Librarians Conducting Research: Researcher Librarian Partnerships
Librarians Conducting Research: Researcher Librarian PartnershipsLibrarians Conducting Research: Researcher Librarian Partnerships
Librarians Conducting Research: Researcher Librarian PartnershipsSusanMRob
 

Viewers also liked (6)

Data model scorecard (Article 5 of 11)
Data model scorecard (Article 5 of 11)Data model scorecard (Article 5 of 11)
Data model scorecard (Article 5 of 11)
 
Resume 2014 x3
Resume 2014 x3Resume 2014 x3
Resume 2014 x3
 
αγιος σαββας
αγιος σαββαςαγιος σαββας
αγιος σαββας
 
How to use LinkedIn to Transform your B2B Marketing
How to use LinkedIn to Transform your B2B MarketingHow to use LinkedIn to Transform your B2B Marketing
How to use LinkedIn to Transform your B2B Marketing
 
Evidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic LibrariesEvidence of Research Support Services in Australian Academic Libraries
Evidence of Research Support Services in Australian Academic Libraries
 
Librarians Conducting Research: Researcher Librarian Partnerships
Librarians Conducting Research: Researcher Librarian PartnershipsLibrarians Conducting Research: Researcher Librarian Partnerships
Librarians Conducting Research: Researcher Librarian Partnerships
 

Similar to Synopsis

ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONESADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONESJournal For Research
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesŃirjhor Ánjum
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking ApplicationIRJET Journal
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on smsiCreateWorld
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...pleasure16
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
What is CellTracker ?
What is CellTracker ?What is CellTracker ?
What is CellTracker ?buffetporch98
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Bhaskar Nemala
 
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your DroidMobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your DroidIJERA Editor
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...eSAT Journals
 
Android app (Presentation v2)
Android app (Presentation v2)Android app (Presentation v2)
Android app (Presentation v2)Dhruv Parmar
 
FA91S gps tracker wacth user manual (Huatenglobal).pdf
FA91S gps tracker wacth user manual (Huatenglobal).pdfFA91S gps tracker wacth user manual (Huatenglobal).pdf
FA91S gps tracker wacth user manual (Huatenglobal).pdfHuaten Global
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIJIR JOURNALS IJIRUSA
 
How To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpyHow To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpyMxSpy
 
A9 mini gps tracker user manual shenzhen i365-tec...
A9 mini gps tracker user manual  shenzhen i365-tec...A9 mini gps tracker user manual  shenzhen i365-tec...
A9 mini gps tracker user manual shenzhen i365-tec...Alejandro Jose Ore Vargas
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationTELKOMNIKA JOURNAL
 

Similar to Synopsis (20)

ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONESADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
ADVANCED ANDROID APPLICATION TO LOCATE AND TRACK MOBILE PHONES
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking Application
 
1 location tracking of android device based on sms
 1 location tracking of android device based on sms 1 location tracking of android device based on sms
1 location tracking of android device based on sms
 
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ... Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
Address Book IntegrAtIon wIth Jd edwArds enterprIseone And Jd ...
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
What is CellTracker ?
What is CellTracker ?What is CellTracker ?
What is CellTracker ?
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
 
Mobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your DroidMobile Security Using Android: Locate Your Droid
Mobile Security Using Android: Locate Your Droid
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
 
Android app (Presentation v2)
Android app (Presentation v2)Android app (Presentation v2)
Android app (Presentation v2)
 
FA91S gps tracker wacth user manual (Huatenglobal).pdf
FA91S gps tracker wacth user manual (Huatenglobal).pdfFA91S gps tracker wacth user manual (Huatenglobal).pdf
FA91S gps tracker wacth user manual (Huatenglobal).pdf
 
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-eventsIjiret siri-hp-a-remote-phone-access-for-smartphone-events
Ijiret siri-hp-a-remote-phone-access-for-smartphone-events
 
How To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpyHow To Use Auto Answer(spy call) With MxSpy
How To Use Auto Answer(spy call) With MxSpy
 
T racer user_guide_android
T racer user_guide_androidT racer user_guide_android
T racer user_guide_android
 
Mobile security
Mobile securityMobile security
Mobile security
 
A9 mini gps tracker user manual shenzhen i365-tec...
A9 mini gps tracker user manual  shenzhen i365-tec...A9 mini gps tracker user manual  shenzhen i365-tec...
A9 mini gps tracker user manual shenzhen i365-tec...
 
Personal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web ApplicationPersonal Security Tracking based on Android and Web Application
Personal Security Tracking based on Android and Web Application
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Synopsis

  • 1. Introduction:  This application can prove to be a genuine anti theft app to inform us about our lost phone.  Unlike existing anti theft apps our proposed app is well equipped to provide the facility to track our lost phone not only through sms but by GPS and camera too.  App don’t allow cracking: as the password to login is given by App server therefore the App is useless if cracked and used.  The most important feature of this project is that our app will allow the authenticated owner of the phone to retrieve all data may it be newly clicked pictures or calling to numbers and SMS’s will be all stored in his/her personal account(websites account) database.  Location tracking using GPS Locator.  Detailed information about the no of incomming outgoining calls and SMS was not able.  Commanding using internet was not able.
  • 2. 2.1 EXISTING SYSTEM  The lost phone was able to command using an SMS only.  Alternate numbers was informed about the current SIM changed number via SMS.  It was a bit difficult to locate phone with an application, only FIR was mandatory.  Location tracking using GPS Locator.  Detailed information about the no of incomming outgoining calls and SMS was not able.  Commanding using internet was not able.  Several advertisements. 2.2 PROPOSED SYSTEM  Locate the mobile and track it: The mobile location can be tracked using the proposed approach.  Backup, retrieve and erase the critical data that has been stored in the mobile if commanded.  Listen incoming calls and alert the remote device: The calls to the mobiles can be traced from a remote location through GPS.  Clicks the picture from front and back camera :It allows to retrieve the first image that is click on the phone after it is lost and the image will be saved in our apps server account.  Listen incoming SMS and give automatic reply and forward to remote user:Similar to calls the Short Messages can also be tracked .  App don’t allow cracking :as the password to login is given by App server therefore the App is useless if cracked and use.  Remote locking:
  • 3. When phone is lost, user can remotely lock the lost phone through two ways: either via server i.e., internet access or by SMS command.  Controlling lost phone: Phone can be commanded to perform remote operations by giving SMS command or using internet our anti theft application contains website, that works as server user can login on his/her personally account(similar concept as Gmail account) and can command the phone to perform several operation (e.g.- remote locking, clicking picture from phones camera, retrieving phones data that may consists of (SMS, gallery, files, contacts), erasing the content from the lost phone through a button click, GPS tracking, receiving calls and SMS)  The most important feature of this project is that our app will allow the authenticated owner of the phone to retrieve all data may it be newly clicked pictures or calling to numbers and SMS’s will be all stored in his/her personal account(websites account) database.
  • 4. 3. DESCRIPTION OF PROJECT 3.1 REQUIREMENTS OF ANALYSIS FIGURE 3.1 CLIENT COMPONENT WORKING ON SMART PHONE
  • 5. SOFTWARE REQUIREMENT Operating System Android Platform ANDROID SDK 2.3 Development Environment eclipse Helios IDE Back End MySQL Testing Manual Testing