MAC-Based Remote Lock For Andriod Smartphone Case Study

Great Essays
Remote lock for andriod smartphone
Manjiri M. Bole, Yogini S. Chavan, Arif J. Shaikh, Saurabh D. Chikhale

Computer Department, K.J.C.O.E.M.R
Computer Department, K.J.C.O.E.M.R
Computer Department, K.J.C.O.E.M.R
Computer Department, K.J.C.O.E.M.R.

Abstract — In this paper, we propose a MAC-based remote lock and wipe system through the SMS push notification to protect against the private data disclosure when smart phone is lost or stolen. The proposed system provides the integrity checking mechanism so that the malicious users are unable to launch denialof- service attacks which send the lock or wipe commands to the normal users on purpose. Also, it satisfies the SMS length limitation of 80 bytes long without downgrading the security level.
…show more content…
As an application cannot misappropriate data it does not have access to the frequency with which applications request access to reach type of potentially sensitive data was studied then determined the frequency with applications ex filtrate data of each type and where they send the data to. Mis appropriation: Prior work has revealed that some Android applications do exploit user data for purposes that may not be expected nor desired by users. Enck et al., who developed the Taint Droid information-flow tracking system extended in our work, used this system to analyze 30 Android applications that required access to the Internet and either users’ loc ation, camera, or microphone. They found that half of these applications shared users’ locations with advertisement servers. The problem is not unique to Android. Egele et al. used static analysis to track information flow in popular iPhone applications and discovered that many contained code to send out the unique device ID. Smith captured network traffic to observe iPhone applications transmitting device IDs. The Wall Street Journal commissioned its own study of 50 iPhone applications and 50 Android applications, also using a network-observation approach . The article suspects that these unique IDs are so commonly transmitted because they can be used to profile users’ behaviors across …show more content…
Here, there is no client component so the user has to message the ‘$’ symbol followed by remote connection command from the mobile’s messaging interface. Server service will distinguish the command from the smart phone’s application and normal SMS by the first two character of the message. Depending on this, the response will be made. In this case, response won’t be encrypted and it will be sent back as a SMS to the user. Response can be the contact information stored the smart phone, an incoming call number,

Related Documents

  • Improved Essays

    Nt1330 Unit 9 Final Report

    • 1448 Words
    • 6 Pages

    To develop this application I have choose ASP.NET MVC 5.0 as a Front End and SQL SERVER 2012 Express edition as a Backend. To work on this technologies we are using Visual studio 2013 web Express and SQL SERVER Management Studio 2012. 1.1 SELECTION CRITERIA There are various reason for choosing this  Responsive design possible  SEO optimization is easy  Easy to implement …

    • 1448 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Great news! In an effort to increase security, we have decided to add a layer of security with new technology called PhoneFactor. PhoneFactor allows you to authenticate to our network using only your network login credentials and your phone. Please take 5 minutes to configure your PhoneFactor account now. Visit the link and follow the instructions listed below under What do I need to do to begin using PhoneFactor?…

    • 429 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 2 Journal

    • 457 Words
    • 2 Pages

    1. Title of Article: Keep Your Phone Safe: How to Protect yourself from wireless threats 2. Authors: N/A 3. Source: http://www.consumerreports.org/cro/magazine/2013/06/keep-your-phone-safe/index.htm 4. Year of Publication: 2013 5.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 6

    • 470 Words
    • 2 Pages

    Protecting ones privacy is something that many people desire and will go to great lengths to protect it. Privacy for most people starts with electronic communications and the smartphone is at the top of that list. Earlier this week SIRIN Labs announced the launch of the SOLARIN, a super phone of sorts - one that the company says is the worlds first truly smartphone. The phone geared towards the travelling business professional, is meant to ultra secure while at the same time not compromising on looks and usability. The company boasts that the device has over 2,500 inner components, and superior exterior compared to any other smartphone on the market - they believe its the best mobile phone in the world.…

    • 470 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    In Rebecca Solnit’s article, “Easy Chair” I realized that we do not have privacy at all if we use the technology and take care of our things online on the Internet. The article Poison Apple made me realize that we do not have privacy at all if we use technology. For example, Rebecca Solnit mentioned, “Google is the world’s biggest advertising company, watching you on nearly every website you visit’’ (Solnit 5). This passage demonstrates how technology has been part of everyday human's life. Google knows everything about everyone’s interests and it can share this information with its partnerships and use it for their benefits.…

    • 166 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Blown To Bits Book Report

    • 871 Words
    • 4 Pages

    The chapter opened by discussing how digital information that people may think is hidden, or even destroyed, is often still accessible to the public. The authors described how the bits that store a given piece of information are never destroyed, but simply overwritten by other data when files are replaced or “deleted.” The descriptions of the people who sold their devices to people, only to have the people who bought their devices to discover personal identification information, “deleted” documents, and even credit card account…

    • 871 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Unit 6 Assignment 1

    • 666 Words
    • 3 Pages

    This is partly because this information is likely shared with third parties for the purposes of advertising. In order to protect the content my communications with others I could refrain from downloading suspicious apps that may contain malware as well as only send emails over secure…

    • 666 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    We may collect and possess personal information about a Client use of our services (“Usage Information”). Usage Information may include IP address, operating system and version, and a unique device identifier or UDID. The source of the Usage Information is our _________________tracking system that collects information from a user’s device. We may legally collect this personal information by consent and for proper delivery of our services in the performance of the contract between the Client and Record360. Client Transaction Data.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In an article entitled “A Day in the Life of Big Brother” by Erik Sherman, the components of services that citizens use daily are observed as to how they track, and in turn report, the actions of their users.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    AskBon http://BizInterview.com.au Caroline Thompson is a respected business executive with an impressive list of professional accomplishments. Her motivation to explore the opportunities in the mobile information industry led her to Ask Bongo, the largest SMS information service in Australia. Caroline is the Business Development Manager of the company. The highly responsive service uses highly sophisticated software and database supported by a team of skilled professional researchers. Using her experience, Caroline successfully developed the Bongo persona, a curious and super intelligent monkey to answer queries through SMS.…

    • 716 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    George Orwell's I-Brother

    • 1078 Words
    • 5 Pages

    I-Brother 1984, a novel written by George Orwell struck alarm in people of the world that complete government power is dangerous. He showed the reader that a totalitarian government can take away people's rights. Even though not as extreme as George Orwell’s novel, where no one was allowed privacy, due to constant surveillance, modern society also finds these struggles prevalent on both fronts: an over intrusive Government and the omnipresent technology induced world of publicness. “Big Brother is Watching You.” (Orwell 2).…

    • 1078 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    For example, in the article "That 's No Phone. That 's My Tracker. " it states, "In just the past few years, cellphone companies have honed their geographic technology, which has become almost pinpoint… If someone knows exactly where you are, they probably know what you are doing.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As humans continue to crave convenience, large technological companies are starting to add features to make products easier to use. However, the consumers do not realize that in order for them to receive such large amounts of convenience, they are sacrificing their privacy. Some of Samsung’s new Smart Televisions ship off “...voice data to an unnamed third party—presumably for the purpose of translating the speech to text”(Newman). This perfectly illustrates how today’s latest technology is invading privacy, one step at a time. People who use the voice command feature on their television can accidentally say something that they should no tell others.…

    • 1601 Words
    • 7 Pages
    Improved Essays