Remote Phone Access is the eventual remote control tool for the Android Smartphones event access. The events like application actions such as your phone may unlock when you are away and remove the stor-age drive card on your Smartphone or making Blue-tooth on for sending the any kind of personal data from your Smartphone etc. Trust event logger will give you the information of all these actions of what happened and when. To perform all these operations manually, it takes more time to access the device information and also the physical presence of user is needed. To overcome these problems we represent an application called “Trust Event Logger”.
1. ISSN: XXXX-XXXX Volume X, Issue X, Month Year
A Remote Phone Access for
Smartphone Events
Siri H.P
Dept of Computer Science and Engineering
BTL Institute of Technology
Bangalore, India
sirireddyh.p@gmail.com
Abstract:
Remote Phone Access is the eventual remote control
tool for the Android Smartphones event access. The
events like application actions such as your phone
may unlock when you are away and remove the stor-
age drive card on your Smartphone or making Blue-
tooth on for sending the any kind of personal data
from your Smartphone etc. Trust event logger will
give you the information of all these actions of what
happened and when. To perform all these operations
manually, it takes more time to access the device
information and also the physical presence of user is
needed. To overcome these problems we represent an
application called “Trust Event Logger”.
1. INTRODUCTION
Android OS environment provide platform for us-
ers to develop their own applications for the
Smartphones. Android applications run in a sandbox.
This is a separated area of the system that does not
have access to the rest of the system’s resources, un-
less access permissions are explicitly conceded by the
user when the application is installed. Before in-
stalling an application, the Play Store displays all
required permissions. After reviewing the permis-
sions, the user can choose to accept or refuse the in-
stalling an application [1]. The Trust Event Logger is
an android application developed for the
Smartphones. There exist some situations where we
may want to access our devices wirelessly. For ex-
ample consider you may leave your Smartphone in
your home or any of the places in the case moving
somewhere very immediately. Those kinds of situa-
tions will make the Smartphone users to feel bad be-
cause the user has to go and get back the phone. This
may cause more time consumable or any kind of data
may be loss or accessed by unauthorized user of the
phone by the time you get the phone back. The Trust
Event Logger is designed for accessing the
Smartphone remotely wherever you are of the place.
This application will provide the Smartphone user to
feel free of condition about the above situations. The
application requires the internet access to remotely
access the Smartphone events.
2. SYSTEM DESIGN
ARCHITECTURE
The system design architecture will give you brief
introduction about the how the Trust Event Logger
application has been designed. The Trust Event Log-
ger consist of four components namely Remote Sys-
tem, Web Server, GCM (Google Cloud Messaging)
and the Smartphone Application.
REMOTE SYSTEM
The Remote System will provide the services for
user to access their Smartphone events from the re-
mote area by sending a request to the Smartphone
and retrieving the information with the use of inter-
net.
2. International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 2
Fig. 1 The Trust Event Logger Architecture.
WEB SERVER
The Web Server provides the server facility to the
user to store their Smartphone details and it also acts
an intermediate layer to serve the responses from the
Smartphone to the remote system.
GCM (Google Cloud Messaging)
GCM (Google Cloud Messaging) is service provid-
ed to the android developer to send the data from the
web server to the Trust Event Logger application.
The GCM will generate the Registration ID for the
user application, using the Register Id the user can
able to get the response from the server.
MOBILE APPLICATION
The Trust Event Logger application will provide
response to the user request about the particular
events successfully. The events may include like re-
moved media, Bluetooth on or off, battery percentage
and phone is unlock or not etc.
3. SYSTEM IMPLEMENTA-
TION
The implementation of the above system design
involves three major modules, which are Smartphone
Application Module, Communication Software Mod-
ule and the Remote Data Retrieval Software Module.
A. SMARTPHONE APPLICA-
TION MODULE
The Smartphone application module which includes
all the Smartphone events like battery power, SD
card, removed media, Wi-Fi, Bluetooth and ring
mode actions etc. this application is used to get these
events action immediately from the remote area using
internet of Wi-Fi facility. This application requires
some of the android packages to get the data and re-
spond to the remote system. Once the application has
implemented, run the application and make sure you
have internet or Wi-Fi connection in the Smartphone.
B. COMMUNICATION MODULE
The communication module provides the
Smartphone user to get the access of Smartphone
from the remote place. This module require user to
create an account to register their Smartphone appli-
cation with application website. The Smartphone
registration can be done by using the Smartphone
IMEI number or using device name. The web server
will send a verification ID to the Smartphone for the
verification of the Smartphone details. Once the veri-
fication is done, the server identifies each device that
has registered to retrieve Smartphone events from the
remote area.
C.REMOTE DATA RETRIEVAL
SOFTWARE MODULE
The remote data retrieval module helps the
Smartphone user to retrieve their Smartphone events
details from the remote system. This module requires
user to login with the application website. Once the
login has done successfully, the user can able to se-
lect the device using the device name or IMEI num-
ber to send a request to the Smartphone. There will
be a list of event functions, the user can select with
their own interest to retrieve the details by single
event or complete details of the Smartphone. By
choosing particular function the notification of re-
quested data has been sent to the Smartphone through
the GCM service, the Smartphone will provide the
response to the user request through the web server
successfully.
4. EXPERIMENTAL
RESULTS
A. USER LOGIN PAGE
3. International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year
3
Fig. 2 Smartphone User Login Page
B. ADDING THE DEVICE
Fig. 3 Add the Device to Register
C. DEVICE VERIFICATION
Fig. 4 Successful Verification of Device
D. CHOOSE THE DEVICE AND
FUNCTIONS
Fig. 5 View Details By Selecting Device and the Function.
E. RETRIEVE THE DATA
Fig. 6 Complete Event Details of Smartphone
5. CONCLUSION
The system presented above can be helpful for all
Smartphone users. It saves man power and time con-
sumption by providing a remote access to the
Smartphone. The Trust Event Logger application will
not only retrieve the data from the remote place, it
will know you whether the Smartphone is used by
unauthorized persons or not by knowing the event
actions. It also allows multiple users to use multiple
Smartphone to retrieve data from the remote place.
Future design is to include the function like word,
gallery or any Smartphone data from the remote
place.
6. REFERENCES
[1]http://www.androiddevelop.com
[2] Jaya Bharathi chintalapati,” Remote computer
access through Android mobiles” IJCSI International
Journal of Computer Science Issues,Vol. 9, Issue 5,
No 3, September 2012 ISSN (Online): 1694-0814.
[3] Ajit Kotkar,” Android Based Remote Desktop
4. International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 4
Client” International Journal of Innovative Research
in Computer and Communication Engineering. Vol.
1, Issue 2, April 2013 ISSN (Print): 2320 – 9798
ISSN (Online): 2320 – 9801.
[4] Prof. P.L.Ramteke, Dr. D.N.Choudhary,” Smart
Phone Access, Control & Security: A Survey” Inter-
national Journal of Emerging Technology and Ad-
vanced Engineering Website: www.ijetae.com (ISSN
2250-2459, Volume 2, Issue 6, June 2012).
[5] Anjumara Inamdar, Heena Aggarwal, Sayali Ka-
dam, Mayuri Kadhane, COMPDROID -Remote
Desktop Access through Android Mobile Phone In-
ternational Journal of Science and Modern Engineer-
ing (IJISME) ISSN: 2319-6386, Volume-2, Issue-1,
December 2013.
[6] Blase Ur Carnegie Mellon University-
bur@cmu.edu, Jaeyeon JungMicrosoft Research
jjung@microsoft.com, Stuart SchechterMicrosoft
Research stus@microsoft.com” The Current State of
Access Control for Smart Devices in Homes” Work-
shop on Home Usable Privacy and Security (HUPS)
2013, July 24–26,2013, Newcastle, UK.
[7] Cheng-Lin Tsao, Sandeep Kakumanu, and
Raghupathy Sivakumar, “SmartVNC: An Effective
Remote Computing Solution for Smartphones” Mo-
biCom’11, September 19–23, 2011, Las Vegas, Ne-
vada, USA.