SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
ISSN: XXXX-XXXX Volume X, Issue X, Month Year
A Remote Phone Access for
Smartphone Events
Siri H.P
Dept of Computer Science and Engineering
BTL Institute of Technology
Bangalore, India
sirireddyh.p@gmail.com
Abstract:
Remote Phone Access is the eventual remote control
tool for the Android Smartphones event access. The
events like application actions such as your phone
may unlock when you are away and remove the stor-
age drive card on your Smartphone or making Blue-
tooth on for sending the any kind of personal data
from your Smartphone etc. Trust event logger will
give you the information of all these actions of what
happened and when. To perform all these operations
manually, it takes more time to access the device
information and also the physical presence of user is
needed. To overcome these problems we represent an
application called “Trust Event Logger”.
1. INTRODUCTION
Android OS environment provide platform for us-
ers to develop their own applications for the
Smartphones. Android applications run in a sandbox.
This is a separated area of the system that does not
have access to the rest of the system’s resources, un-
less access permissions are explicitly conceded by the
user when the application is installed. Before in-
stalling an application, the Play Store displays all
required permissions. After reviewing the permis-
sions, the user can choose to accept or refuse the in-
stalling an application [1]. The Trust Event Logger is
an android application developed for the
Smartphones. There exist some situations where we
may want to access our devices wirelessly. For ex-
ample consider you may leave your Smartphone in
your home or any of the places in the case moving
somewhere very immediately. Those kinds of situa-
tions will make the Smartphone users to feel bad be-
cause the user has to go and get back the phone. This
may cause more time consumable or any kind of data
may be loss or accessed by unauthorized user of the
phone by the time you get the phone back. The Trust
Event Logger is designed for accessing the
Smartphone remotely wherever you are of the place.
This application will provide the Smartphone user to
feel free of condition about the above situations. The
application requires the internet access to remotely
access the Smartphone events.
2. SYSTEM DESIGN
ARCHITECTURE
The system design architecture will give you brief
introduction about the how the Trust Event Logger
application has been designed. The Trust Event Log-
ger consist of four components namely Remote Sys-
tem, Web Server, GCM (Google Cloud Messaging)
and the Smartphone Application.
REMOTE SYSTEM
The Remote System will provide the services for
user to access their Smartphone events from the re-
mote area by sending a request to the Smartphone
and retrieving the information with the use of inter-
net.
International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 2
Fig. 1 The Trust Event Logger Architecture.
WEB SERVER
The Web Server provides the server facility to the
user to store their Smartphone details and it also acts
an intermediate layer to serve the responses from the
Smartphone to the remote system.
GCM (Google Cloud Messaging)
GCM (Google Cloud Messaging) is service provid-
ed to the android developer to send the data from the
web server to the Trust Event Logger application.
The GCM will generate the Registration ID for the
user application, using the Register Id the user can
able to get the response from the server.
MOBILE APPLICATION
The Trust Event Logger application will provide
response to the user request about the particular
events successfully. The events may include like re-
moved media, Bluetooth on or off, battery percentage
and phone is unlock or not etc.
3. SYSTEM IMPLEMENTA-
TION
The implementation of the above system design
involves three major modules, which are Smartphone
Application Module, Communication Software Mod-
ule and the Remote Data Retrieval Software Module.
A. SMARTPHONE APPLICA-
TION MODULE
The Smartphone application module which includes
all the Smartphone events like battery power, SD
card, removed media, Wi-Fi, Bluetooth and ring
mode actions etc. this application is used to get these
events action immediately from the remote area using
internet of Wi-Fi facility. This application requires
some of the android packages to get the data and re-
spond to the remote system. Once the application has
implemented, run the application and make sure you
have internet or Wi-Fi connection in the Smartphone.
B. COMMUNICATION MODULE
The communication module provides the
Smartphone user to get the access of Smartphone
from the remote place. This module require user to
create an account to register their Smartphone appli-
cation with application website. The Smartphone
registration can be done by using the Smartphone
IMEI number or using device name. The web server
will send a verification ID to the Smartphone for the
verification of the Smartphone details. Once the veri-
fication is done, the server identifies each device that
has registered to retrieve Smartphone events from the
remote area.
C.REMOTE DATA RETRIEVAL
SOFTWARE MODULE
The remote data retrieval module helps the
Smartphone user to retrieve their Smartphone events
details from the remote system. This module requires
user to login with the application website. Once the
login has done successfully, the user can able to se-
lect the device using the device name or IMEI num-
ber to send a request to the Smartphone. There will
be a list of event functions, the user can select with
their own interest to retrieve the details by single
event or complete details of the Smartphone. By
choosing particular function the notification of re-
quested data has been sent to the Smartphone through
the GCM service, the Smartphone will provide the
response to the user request through the web server
successfully.
4. EXPERIMENTAL
RESULTS
A. USER LOGIN PAGE
International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year
3
Fig. 2 Smartphone User Login Page
B. ADDING THE DEVICE
Fig. 3 Add the Device to Register
C. DEVICE VERIFICATION
Fig. 4 Successful Verification of Device
D. CHOOSE THE DEVICE AND
FUNCTIONS
Fig. 5 View Details By Selecting Device and the Function.
E. RETRIEVE THE DATA
Fig. 6 Complete Event Details of Smartphone
5. CONCLUSION
The system presented above can be helpful for all
Smartphone users. It saves man power and time con-
sumption by providing a remote access to the
Smartphone. The Trust Event Logger application will
not only retrieve the data from the remote place, it
will know you whether the Smartphone is used by
unauthorized persons or not by knowing the event
actions. It also allows multiple users to use multiple
Smartphone to retrieve data from the remote place.
Future design is to include the function like word,
gallery or any Smartphone data from the remote
place.
6. REFERENCES
[1]http://www.androiddevelop.com
[2] Jaya Bharathi chintalapati,” Remote computer
access through Android mobiles” IJCSI International
Journal of Computer Science Issues,Vol. 9, Issue 5,
No 3, September 2012 ISSN (Online): 1694-0814.
[3] Ajit Kotkar,” Android Based Remote Desktop
International Journal of Innovatory research in Engineering and Technology - IJIRET
ISSN: XXXX-XXXX Volume X, Issue X, Month Year 4
Client” International Journal of Innovative Research
in Computer and Communication Engineering. Vol.
1, Issue 2, April 2013 ISSN (Print): 2320 – 9798
ISSN (Online): 2320 – 9801.
[4] Prof. P.L.Ramteke, Dr. D.N.Choudhary,” Smart
Phone Access, Control & Security: A Survey” Inter-
national Journal of Emerging Technology and Ad-
vanced Engineering Website: www.ijetae.com (ISSN
2250-2459, Volume 2, Issue 6, June 2012).
[5] Anjumara Inamdar, Heena Aggarwal, Sayali Ka-
dam, Mayuri Kadhane, COMPDROID -Remote
Desktop Access through Android Mobile Phone In-
ternational Journal of Science and Modern Engineer-
ing (IJISME) ISSN: 2319-6386, Volume-2, Issue-1,
December 2013.
[6] Blase Ur Carnegie Mellon University-
bur@cmu.edu, Jaeyeon JungMicrosoft Research
jjung@microsoft.com, Stuart SchechterMicrosoft
Research stus@microsoft.com” The Current State of
Access Control for Smart Devices in Homes” Work-
shop on Home Usable Privacy and Security (HUPS)
2013, July 24–26,2013, Newcastle, UK.
[7] Cheng-Lin Tsao, Sandeep Kakumanu, and
Raghupathy Sivakumar, “SmartVNC: An Effective
Remote Computing Solution for Smartphones” Mo-
biCom’11, September 19–23, 2011, Las Vegas, Ne-
vada, USA.

Mais conteúdo relacionado

Mais procurados

IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...IRJET Journal
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...IJCSIS Research Publications
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobileUvaraj Shan
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET Journal
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete ReportChethanHR10
 
Android Sos app development report
Android Sos app development reportAndroid Sos app development report
Android Sos app development reportSudhanshu kumar Sah
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek chan
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithmsBadiginchala Manohari
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...IJECEIAES
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)IOSR Journals
 
Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12Aman Raj
 

Mais procurados (19)

IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
IRJET- High Security in Automated Fare Collection for TollSystem with NFC usi...
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
safe journey
safe journeysafe journey
safe journey
 
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
F-LOCKER: An Android Face Recognition Applocker Using Local Binary Pattern Hi...
 
Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
HinDroid
HinDroidHinDroid
HinDroid
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...IRJET-  	  App Misbehaviour Check: Development of Virus Modeling, Propagation...
IRJET- App Misbehaviour Check: Development of Virus Modeling, Propagation...
 
Sniffer Technology Complete Report
Sniffer Technology Complete ReportSniffer Technology Complete Report
Sniffer Technology Complete Report
 
Android Sos app development report
Android Sos app development reportAndroid Sos app development report
Android Sos app development report
 
Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant Vivek Chan | Technology Consultant
Vivek Chan | Technology Consultant
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
 
Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...Nolong.in: an android based incident notification application with push notif...
Nolong.in: an android based incident notification application with push notif...
 
A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)A Mobile Based Women Safety Application (I Safe Apps)
A Mobile Based Women Safety Application (I Safe Apps)
 
Womensecurityapp12
Womensecurityapp12Womensecurityapp12
Womensecurityapp12
 

Destaque

Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...IJIR JOURNALS IJIRUSA
 
Show and tell : Hinari
Show and tell : HinariShow and tell : Hinari
Show and tell : HinariAPLICwebmaster
 
Show and Tell : Medium
Show and Tell : MediumShow and Tell : Medium
Show and Tell : MediumAPLICwebmaster
 
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodiesIjirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodiesIJIR JOURNALS IJIRUSA
 
APLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLICwebmaster
 
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIJIR JOURNALS IJIRUSA
 
An Integrated DHS system
An Integrated DHS systemAn Integrated DHS system
An Integrated DHS systemAPLICwebmaster
 
Improving awareness pescador san diego air & space museum
Improving awareness  pescador san diego air & space museumImproving awareness  pescador san diego air & space museum
Improving awareness pescador san diego air & space museumAPLICwebmaster
 
Terra Populus: Integrated Data on Population and Environment
Terra Populus: Integrated Data on Population and EnvironmentTerra Populus: Integrated Data on Population and Environment
Terra Populus: Integrated Data on Population and EnvironmentAPLICwebmaster
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Astrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultantAstrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultantSanjeev166
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...IJIR JOURNALS IJIRUSA
 
The roles of warm up
The roles of warm upThe roles of warm up
The roles of warm upYo Yo
 
La revolució del gessamí
La revolució del gessamíLa revolució del gessamí
La revolució del gessamíNúria Martos
 

Destaque (20)

Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
Ijirsm ashok-kumar-h-problems-and-solutions-infrastructure-as-service-securit...
 
Show and tell : Hinari
Show and tell : HinariShow and tell : Hinari
Show and tell : Hinari
 
Show and Tell : Medium
Show and Tell : MediumShow and Tell : Medium
Show and Tell : Medium
 
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodiesIjirsm amrutha-s-efficient-complaint-registration-to-government-bodies
Ijirsm amrutha-s-efficient-complaint-registration-to-government-bodies
 
GNU Debugger
GNU DebuggerGNU Debugger
GNU Debugger
 
Karakter akhlak islam
Karakter akhlak islamKarakter akhlak islam
Karakter akhlak islam
 
APLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content CurationAPLIC 2014 - Beth Kantor on Content Curation
APLIC 2014 - Beth Kantor on Content Curation
 
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systemsIjiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
Ijiret ashwini-kc-deadlock-detection-in-homogeneous-distributed-database-systems
 
Deber deinformatica
Deber deinformaticaDeber deinformatica
Deber deinformatica
 
An Integrated DHS system
An Integrated DHS systemAn Integrated DHS system
An Integrated DHS system
 
Improving awareness pescador san diego air & space museum
Improving awareness  pescador san diego air & space museumImproving awareness  pescador san diego air & space museum
Improving awareness pescador san diego air & space museum
 
Final exam review game
Final exam review gameFinal exam review game
Final exam review game
 
Dangers of facebook by sani
Dangers of facebook by saniDangers of facebook by sani
Dangers of facebook by sani
 
Terra Populus: Integrated Data on Population and Environment
Terra Populus: Integrated Data on Population and EnvironmentTerra Populus: Integrated Data on Population and Environment
Terra Populus: Integrated Data on Population and Environment
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
ad web
ad webad web
ad web
 
Astrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultantAstrologer, Vastu & Fengshui consultant
Astrologer, Vastu & Fengshui consultant
 
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
Ijirsm bhargavi-ka-robust-distributed-security-using-stateful-csg-based-distr...
 
The roles of warm up
The roles of warm upThe roles of warm up
The roles of warm up
 
La revolució del gessamí
La revolució del gessamíLa revolució del gessamí
La revolució del gessamí
 

Semelhante a Ijiret siri-hp-a-remote-phone-access-for-smartphone-events

IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET Journal
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewIJSRD
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationKavita Sharma
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various ToolsIRJET Journal
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET Journal
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSJournal For Research
 
Remote Data Acquisition from Android Mobile
Remote Data Acquisition from Android MobileRemote Data Acquisition from Android Mobile
Remote Data Acquisition from Android MobileIRJET Journal
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Journals
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...eSAT Publishing House
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET Journal
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...eSAT Journals
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxtodd581
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxglendar3
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APPIRJET Journal
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesIAEME Publication
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...IJECEIAES
 

Semelhante a Ijiret siri-hp-a-remote-phone-access-for-smartphone-events (20)

IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking System
 
Cloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature ReviewCloud based Anti-Theft Application for Android Devices: A Literature Review
Cloud based Anti-Theft Application for Android Devices: A Literature Review
 
Location sharing and automatic message sender Android Application
Location sharing and automatic message sender Android ApplicationLocation sharing and automatic message sender Android Application
Location sharing and automatic message sender Android Application
 
IRJET - Android based Mobile Forensic and Comparison using Various Tools
IRJET -  	  Android based Mobile Forensic and Comparison using Various ToolsIRJET -  	  Android based Mobile Forensic and Comparison using Various Tools
IRJET - Android based Mobile Forensic and Comparison using Various Tools
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
IRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple UsersIRJET- TRACKITUP-An Android Application to Track Multiple Users
IRJET- TRACKITUP-An Android Application to Track Multiple Users
 
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTSOFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
 
Remote Data Acquisition from Android Mobile
Remote Data Acquisition from Android MobileRemote Data Acquisition from Android Mobile
Remote Data Acquisition from Android Mobile
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
 
IRJET- SMS based Mobile Technology
IRJET- SMS based Mobile TechnologyIRJET- SMS based Mobile Technology
IRJET- SMS based Mobile Technology
 
Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...Camera based attack detection and prevention tech niques on android mobile ph...
Camera based attack detection and prevention tech niques on android mobile ph...
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Running head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docxRunning head mobile application security1mobile application se.docx
Running head mobile application security1mobile application se.docx
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
WOMEN’s SAFETY APP
WOMEN’s SAFETY APPWOMEN’s SAFETY APP
WOMEN’s SAFETY APP
 
Detection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phonesDetection and prevention method of rooting attack on the android phones
Detection and prevention method of rooting attack on the android phones
 
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
An Improvised Methodology to Unbar Android Mobile Phone for Forensic Examinat...
 

Ijiret siri-hp-a-remote-phone-access-for-smartphone-events

  • 1. ISSN: XXXX-XXXX Volume X, Issue X, Month Year A Remote Phone Access for Smartphone Events Siri H.P Dept of Computer Science and Engineering BTL Institute of Technology Bangalore, India sirireddyh.p@gmail.com Abstract: Remote Phone Access is the eventual remote control tool for the Android Smartphones event access. The events like application actions such as your phone may unlock when you are away and remove the stor- age drive card on your Smartphone or making Blue- tooth on for sending the any kind of personal data from your Smartphone etc. Trust event logger will give you the information of all these actions of what happened and when. To perform all these operations manually, it takes more time to access the device information and also the physical presence of user is needed. To overcome these problems we represent an application called “Trust Event Logger”. 1. INTRODUCTION Android OS environment provide platform for us- ers to develop their own applications for the Smartphones. Android applications run in a sandbox. This is a separated area of the system that does not have access to the rest of the system’s resources, un- less access permissions are explicitly conceded by the user when the application is installed. Before in- stalling an application, the Play Store displays all required permissions. After reviewing the permis- sions, the user can choose to accept or refuse the in- stalling an application [1]. The Trust Event Logger is an android application developed for the Smartphones. There exist some situations where we may want to access our devices wirelessly. For ex- ample consider you may leave your Smartphone in your home or any of the places in the case moving somewhere very immediately. Those kinds of situa- tions will make the Smartphone users to feel bad be- cause the user has to go and get back the phone. This may cause more time consumable or any kind of data may be loss or accessed by unauthorized user of the phone by the time you get the phone back. The Trust Event Logger is designed for accessing the Smartphone remotely wherever you are of the place. This application will provide the Smartphone user to feel free of condition about the above situations. The application requires the internet access to remotely access the Smartphone events. 2. SYSTEM DESIGN ARCHITECTURE The system design architecture will give you brief introduction about the how the Trust Event Logger application has been designed. The Trust Event Log- ger consist of four components namely Remote Sys- tem, Web Server, GCM (Google Cloud Messaging) and the Smartphone Application. REMOTE SYSTEM The Remote System will provide the services for user to access their Smartphone events from the re- mote area by sending a request to the Smartphone and retrieving the information with the use of inter- net.
  • 2. International Journal of Innovatory research in Engineering and Technology - IJIRET ISSN: XXXX-XXXX Volume X, Issue X, Month Year 2 Fig. 1 The Trust Event Logger Architecture. WEB SERVER The Web Server provides the server facility to the user to store their Smartphone details and it also acts an intermediate layer to serve the responses from the Smartphone to the remote system. GCM (Google Cloud Messaging) GCM (Google Cloud Messaging) is service provid- ed to the android developer to send the data from the web server to the Trust Event Logger application. The GCM will generate the Registration ID for the user application, using the Register Id the user can able to get the response from the server. MOBILE APPLICATION The Trust Event Logger application will provide response to the user request about the particular events successfully. The events may include like re- moved media, Bluetooth on or off, battery percentage and phone is unlock or not etc. 3. SYSTEM IMPLEMENTA- TION The implementation of the above system design involves three major modules, which are Smartphone Application Module, Communication Software Mod- ule and the Remote Data Retrieval Software Module. A. SMARTPHONE APPLICA- TION MODULE The Smartphone application module which includes all the Smartphone events like battery power, SD card, removed media, Wi-Fi, Bluetooth and ring mode actions etc. this application is used to get these events action immediately from the remote area using internet of Wi-Fi facility. This application requires some of the android packages to get the data and re- spond to the remote system. Once the application has implemented, run the application and make sure you have internet or Wi-Fi connection in the Smartphone. B. COMMUNICATION MODULE The communication module provides the Smartphone user to get the access of Smartphone from the remote place. This module require user to create an account to register their Smartphone appli- cation with application website. The Smartphone registration can be done by using the Smartphone IMEI number or using device name. The web server will send a verification ID to the Smartphone for the verification of the Smartphone details. Once the veri- fication is done, the server identifies each device that has registered to retrieve Smartphone events from the remote area. C.REMOTE DATA RETRIEVAL SOFTWARE MODULE The remote data retrieval module helps the Smartphone user to retrieve their Smartphone events details from the remote system. This module requires user to login with the application website. Once the login has done successfully, the user can able to se- lect the device using the device name or IMEI num- ber to send a request to the Smartphone. There will be a list of event functions, the user can select with their own interest to retrieve the details by single event or complete details of the Smartphone. By choosing particular function the notification of re- quested data has been sent to the Smartphone through the GCM service, the Smartphone will provide the response to the user request through the web server successfully. 4. EXPERIMENTAL RESULTS A. USER LOGIN PAGE
  • 3. International Journal of Innovatory research in Engineering and Technology - IJIRET ISSN: XXXX-XXXX Volume X, Issue X, Month Year 3 Fig. 2 Smartphone User Login Page B. ADDING THE DEVICE Fig. 3 Add the Device to Register C. DEVICE VERIFICATION Fig. 4 Successful Verification of Device D. CHOOSE THE DEVICE AND FUNCTIONS Fig. 5 View Details By Selecting Device and the Function. E. RETRIEVE THE DATA Fig. 6 Complete Event Details of Smartphone 5. CONCLUSION The system presented above can be helpful for all Smartphone users. It saves man power and time con- sumption by providing a remote access to the Smartphone. The Trust Event Logger application will not only retrieve the data from the remote place, it will know you whether the Smartphone is used by unauthorized persons or not by knowing the event actions. It also allows multiple users to use multiple Smartphone to retrieve data from the remote place. Future design is to include the function like word, gallery or any Smartphone data from the remote place. 6. REFERENCES [1]http://www.androiddevelop.com [2] Jaya Bharathi chintalapati,” Remote computer access through Android mobiles” IJCSI International Journal of Computer Science Issues,Vol. 9, Issue 5, No 3, September 2012 ISSN (Online): 1694-0814. [3] Ajit Kotkar,” Android Based Remote Desktop
  • 4. International Journal of Innovatory research in Engineering and Technology - IJIRET ISSN: XXXX-XXXX Volume X, Issue X, Month Year 4 Client” International Journal of Innovative Research in Computer and Communication Engineering. Vol. 1, Issue 2, April 2013 ISSN (Print): 2320 – 9798 ISSN (Online): 2320 – 9801. [4] Prof. P.L.Ramteke, Dr. D.N.Choudhary,” Smart Phone Access, Control & Security: A Survey” Inter- national Journal of Emerging Technology and Ad- vanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 6, June 2012). [5] Anjumara Inamdar, Heena Aggarwal, Sayali Ka- dam, Mayuri Kadhane, COMPDROID -Remote Desktop Access through Android Mobile Phone In- ternational Journal of Science and Modern Engineer- ing (IJISME) ISSN: 2319-6386, Volume-2, Issue-1, December 2013. [6] Blase Ur Carnegie Mellon University- bur@cmu.edu, Jaeyeon JungMicrosoft Research jjung@microsoft.com, Stuart SchechterMicrosoft Research stus@microsoft.com” The Current State of Access Control for Smart Devices in Homes” Work- shop on Home Usable Privacy and Security (HUPS) 2013, July 24–26,2013, Newcastle, UK. [7] Cheng-Lin Tsao, Sandeep Kakumanu, and Raghupathy Sivakumar, “SmartVNC: An Effective Remote Computing Solution for Smartphones” Mo- biCom’11, September 19–23, 2011, Las Vegas, Ne- vada, USA.