Mobbo Secuirty Case Study

Decent Essays
Mobo Secuirty
Type: Secuirty Application
Short description:
Mobile devices are the most important part of our lives. Now a days what you do or want to know what others are doing. If you want to save your precious moments in that case you also use mobile. In that case all your memories stored in your mobile. So mobile security is getting importance day by day and people are getting more and more concern to secure their privacy.
Keeping this thing in mind we have decided to create a security application that will help to protect or privacy in case if we lose our mobile device then we can do something to keep track of our device and do can take an action against the responsible authorities.
Ingredients
PROJECT CONTENTS:
1. Login System
2. Sound
…show more content…
IMEI/MEID Tracking
1. Login System
Login system is very important part in any privacy related system/application. In Login screen user has an option to set password for his/her application. He has multiple different ways to set password. In case if he forgot his password he has the option to recover his password by answering some questions. We have a unique facility that if you want to know who is trying to access your private information. This application will take the photo of the intruder (Front camera required).

2. Sound an Alarm
With this feature you are able to sound an alarm whenever you lost your device. So your device is either on silent mode or set at a very low sound it will make a load alarm sound that identifies you with in a short area.
3. Erase Memory
If your mobile is lost and there is no way you can do or first thing that you wanting to do is to wash out your memory in which all of your private data includes like pictures, videos or any other important files. You can delete all of them from any other mobile using the command code.
4. Backup your Contacts
You can take a backup or you contacts and store it to some other place so if you lose any of then you can restore than from our application easily.
5. Take
…show more content…
SIM card change Alerts
If your phone is lost and SIM card is changed, an alert SMS will be sent to the reporting number. So that you can get the new number of your lost phone .Hence by using that new numbers you can perform any action that you want.
7. Call Tracking
Call tracking is a feature through which user maintain call history related to any contact or number. Later on he can check record regarding to any contact.
8. SMS Tracking
In SMS tracking user can store and view all SMS of any contact that will be stored in the directory of the application.
9. Call Blocking
To get rid of the annoying people user can use the call blocking service of the application. By putting contacts to the black list user don’t need to worry any more.
10. SMS Blocking
Just like calls if user doesn’t want to receive messages from any unknown person, here he has the option that he can avail and stay calm.

11. Location Detection
If you lost your mobile or it is stolen you don’t need to worry about that just send your secrete code to your number and you can check your location anywhere in the world.
12. IMEI/MEID

Related Documents

  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    To develop this application I have choose ASP.NET MVC 5.0 as a Front End and SQL SERVER 2012 Express edition as a Backend. To work on this technologies we are using Visual studio 2013 web Express and SQL SERVER Management Studio 2012. 1.1 SELECTION CRITERIA There are various reason for choosing this  Responsive design possible  SEO optimization is easy  Easy to implement …

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Sc300 Unit 3 Assignment

    • 1018 Words
    • 5 Pages

    Klima 08/16/2015 SC4 Encrypted security system for users will be developed R. Klima 08/16/2015 SC5 Infrastructure required for the software system which consists of a database server, application server and web server R. Klima 08/16/2015 SC6 The system will only be developed in the English language R. Klima 08/16/2015 SC7…

    • 1018 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Even though there are some people in the world that are very cruel over the internet, privacy goes a long way. Hopefully the government gives people more space and freedom and they respect that. On the newer phones, they have updated ways to get into them. WIth finger ID and even…

    • 433 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Essay On 1984 Technology

    • 501 Words
    • 3 Pages

    “Let’s stop calling them cellphones, call them trackers” (that’s no phone). With cellphones everywhere you go you can get tracked. If you get lost it can tell you exactly where you are at. Also if you leave your phone somewhere you can track your lost phone and find it where ever it’s at. This states how technology can track you…

    • 501 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Imagine a world filled with silence, an environment that exclude people from communicating with one another, and the norm of physical interaction seems abnormalrobots, roaming abandoned streets and depending on installed programs to behave a certain way, just plain old machines burning on energy. The sweet sound of loud busy streets will slowly become inactive and people will soon depend on installed programs on their phone to function a certain way. Humans have regress in their abilities to incorporate their intercommunication skills. This make their life harder to live because people need communication to live an emotionally happy life. If people allow cell phones to rule their life can result in a society that operates only on advance technology, in order to engage in social activities.…

    • 1226 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Provide a description of the merchants, government agencies, and law enforcement agencies that are collecting data using location-based tracking technologies. A location-based service (LBS) is a software-level service that uses location data to control features. As such LBS is an information service and has many uses in social networking today as information, in entertainment or security, which is accessible with mobile devices through the mobile network and which uses information on the geographical position of the mobile device.…

    • 492 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In society these days people are constantly glued to their phones. They cannot take their eyes off of their phones for even a minute out of fear that they will miss something. Many are guilty of this bad habit. Phones have corrupted people’s minds and have made them believe that texting or emailing are the only forms of communication.…

    • 1739 Words
    • 7 Pages
    Improved Essays
  • Decent Essays

    Cell Phone Literacy

    • 428 Words
    • 2 Pages

    I understand that my cell phone is the property of my parents, however, it is my responsibility to keep up with it and take care of it at all times. I understand that my parents may monitor the contents of my phone at any time. I will understand that must surrender my phone for monitoring when requested by my parents. I understand that I am not to change passwords or restrictions which my parents have set on my phone. I will never ignore texts or phone calls from my parents; all calls and texts from parents will be answered or returned immediately.…

    • 428 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The city council of Oklahoma has proposed to ban cellular devices from vicinities such as restaurants, movie theatres, and retail stores; although there are quite a few negative reasons to approve of this new rule, it may provide us with liabilities in our society overall. For many years we use our cell phones today for social media and answers in our daily lives. Albeit, we may cause quite a bit of disruption with the media today, we use these devices for important tasks that can be provided to assist in the world we live in today. The use of cell phone devices are still vital when used in buildings such as restaurants, Cellular technology can be used to contact others the location of restaurants and food places.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Most times, the provider will have updated all of this information on the website or on the app itself. Also ensure that you confirm any type of information with the software manufacturer before you buy any spy cell phone programs. Rules and Regulations It is crucial that you use the cell phone tracking app in accordance with all the local rules and regulations. You should ensure that your usage is as per regional and local laws.…

    • 842 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Reverse phone detective system If you have ever received a call from an unknown number and had the person hung up on you, you know how infuriating it can be. Not only was that rude, but who was it that called you? Could it possibly have been that special person you have been eyeing for a while? Or was it some strange person with a dark and sick agenda? What if a loved one had needed help and was using someone else’s phone to contact you?…

    • 1011 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Calista Cloud Phone System Calista Cloud Phone System is a PBX System designed specifically for businesses. This phone system features innovative solutions to help companies to stay connected at an affordable rate. The system allows business-specific customizations, which ensures that customers get the highest value for money. The Calista Cloud Phone System comes with some of the best features of the PBX industry. Available Features include Attended Call Transfer, Call Broadcast, Call Privacy, Conference Call, Email 2 Fax, IVR, Dial by Name, Call Block, Follow Me, Video Calling, Video Conference, Call Recording, Eavesdrop, Voicemail to Email, Voicemail to Text, and so on.…

    • 931 Words
    • 4 Pages
    Improved Essays