SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Cell Phone Parental Support
        Application
       Under the guidance of:
          Prof Pooja Shah
                By:
          Ancy Varghese
            Mihika Shah
Why do we need this?
• Are your children or employees abusing the
  privileges of texting, calling and browsing?
• Are you worried they are using the phone for
  inappropriate activities?
• You will finally learn the truth about their
  activities
What is the app about?
• The app is a hybrid software/service which
  allows you to monitor your child's Android
  based smartphone in real time.
• It starts at every boot of the phone but
  remains stealth.
How it works?
• Parent installs the software onto their child's
  phone. They configure the program according
  to their specific needs.
• Child uses the phone normally. The app blocks
  and filters the actions specified and silently
  reports all actions to the Parent.
• Parents can check their logs and monitor the
  activities of the child in Real time.
Salient Features
• The app is non UI based background process
  hence the child would not be able to realize
  the presence of such an application running in
  the background, as it has no interface.
• The app has been desired to have less
  memory usage so that it can not be tracked.
What it does?
• It allows you to fully record the activities of
  your child's cell phone
• It makes full logs of every text message sent
  and received, and logs vital information about
  each phone call.
• The records do not rely on the phone's
  internal logging system, so if your child deletes
  their logs it won't matter.
…Contd
• You can still view every single text message
  and call .
• The interface for the parent can be through a
  mail (if the phone is usually connected to the
  wi-fi) or through a GSM module.
Assumptions
• For the app to work successfully, at this initial
  stage we assume that the phone has to be
  connected to the wi-fi or Internet through
  Packet Data Subscription, so that the logs get
  tranferred.
• If not that, GSM module can be used for
  transfer of the logs.
Functional Requirements
• REQ-1: The software should record user
  activities including SMS text messages, call
  information and GPS locations
• REQ-2: To view logs on the device itself or in
  a secure online control panel.
• REQ-3: Installation should be hidden from the
  phone user.
• REQ-4: Upon getting connected to the
  internet, the transfer of logs should begin.
Non-Functional Requirements
• Performance Requirements
Minimum RAM usage so that the application’s
presence is not noticed and force killed.
Installation without explicit installation through
the internet is desired.
• Safety Requirements
As it is free of UI it is difficult for the child to realize the
presence of such a software.
Software Parameters:
•   Transfer time
•   RAM usage
•   Call logs summary size
•   Invoke Time
Technical Aspects
Interfaces
• There is no apparent interface on the smart
  phone because of the app being a non UI
  background process. So it is usually silent and
  hidden from the phone user.
• The other interface could be a another smart
  phone or a mail.
Requirements
• Android Version 2.2.1(Froyo) and above.
• RAM requiremets: Minimum 128 MB
• Processor speed: 600 Mhz and above
Installation Issues
• Parent either gets a one time access to the
  smartphone to install the app and then the
  app remains hidden in the background.
• Through the market, only if the parent has an
  account on the Google Market via the Android
  phone so that the installation ,if on the market
  , could be invoked by the parent.
Surpassing the app
• Loop holes in this stage includes that if the
  child finds out the extra RAM consumption
• Or finds an app that is unknown in the Task
  Manager or in the Manage Applications menu.
• Force killing the app does not invoke the app
  again.
Progress till now
• Call summary collection
• Connectivity with the PC via sockets, which
  can be used to monitor Texts, in real time
What next?
• Integrating the several modules to one app
  and making it run in the background, with no
  user interface.
• Using Wifi or GSM module to transfer the logs
  and summary which is collected by the Call
  Summary module.
Challenges
• Non UI background process
• Minimum RAM usage
• Invocation after being Force-killed
Future Enhancements
•   GPS tracking
•   Blocking the malicious numbers
•   Application installation summary
•   Setting up time constraints for blocking calls.
•   SMS alerts instantly
References:
• Google Android Homepage:
  http://code.google.com/android/
• Google Android SDK:
  http://code.google.com/android/download.ht
  ml
• Simple Notepad Tutorial:
  http://code.google.com/android/intro/tutorial
  .html
THANK YOU

Weitere ähnliche Inhalte

Was ist angesagt?

Marketing plan for a mobile app
Marketing plan for a mobile app Marketing plan for a mobile app
Marketing plan for a mobile app Keshav Agarwal
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient TruthAGILLY
 
Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueRamin Firoozye
 
Smart phone presentation
Smart phone presentationSmart phone presentation
Smart phone presentationATIF REHMAN
 
Developing for Multiple Platforms
Developing for Multiple PlatformsDeveloping for Multiple Platforms
Developing for Multiple PlatformsDaniel Pfeiffer
 
capstone project kb674d-1
capstone project kb674d-1capstone project kb674d-1
capstone project kb674d-1Krystal Banta
 
Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009Oliver Weidlich
 
Smartphone security
Smartphone securitySmartphone security
Smartphone securityMike Brannon
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applicationseightbit
 
Ultimate guide, tips, and tricks of using iPhone
Ultimate guide, tips, and tricks of using iPhoneUltimate guide, tips, and tricks of using iPhone
Ultimate guide, tips, and tricks of using iPhoneNex Mobility
 
#1NLab14: Reshaping Behavior
#1NLab14: Reshaping Behavior#1NLab14: Reshaping Behavior
#1NLab14: Reshaping BehaviorOne North
 

Was ist angesagt? (17)

Marketing plan for a mobile app
Marketing plan for a mobile app Marketing plan for a mobile app
Marketing plan for a mobile app
 
Mobile application fragmentation
Mobile application fragmentationMobile application fragmentation
Mobile application fragmentation
 
Impero
ImperoImpero
Impero
 
Malware on Smartphones and Tablets - The Inconvenient Truth
Malware on Smartphones and  Tablets  - The Inconvenient  TruthMalware on Smartphones and  Tablets  - The Inconvenient  Truth
Malware on Smartphones and Tablets - The Inconvenient Truth
 
Not another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigueNot another *$#@ app: How to avoid IoT fatigue
Not another *$#@ app: How to avoid IoT fatigue
 
Smart phone presentation
Smart phone presentationSmart phone presentation
Smart phone presentation
 
Developing for Multiple Platforms
Developing for Multiple PlatformsDeveloping for Multiple Platforms
Developing for Multiple Platforms
 
capstone project kb674d-1
capstone project kb674d-1capstone project kb674d-1
capstone project kb674d-1
 
Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009Lg Web Network Mobile Presentation August 2009
Lg Web Network Mobile Presentation August 2009
 
Suche da Carte
Suche da CarteSuche da Carte
Suche da Carte
 
Smartphone security
Smartphone securitySmartphone security
Smartphone security
 
Mobile security
Mobile securityMobile security
Mobile security
 
smartphones
smartphonessmartphones
smartphones
 
YOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS ApplicationsYOW! Connected 2014 - Developing Secure iOS Applications
YOW! Connected 2014 - Developing Secure iOS Applications
 
Ultimate guide, tips, and tricks of using iPhone
Ultimate guide, tips, and tricks of using iPhoneUltimate guide, tips, and tricks of using iPhone
Ultimate guide, tips, and tricks of using iPhone
 
#1NLab14: Reshaping Behavior
#1NLab14: Reshaping Behavior#1NLab14: Reshaping Behavior
#1NLab14: Reshaping Behavior
 
Google Glass
Google GlassGoogle Glass
Google Glass
 

Ähnlich wie Cell Phone Parental Monitoring App

Mobile App Testing by Mark Wilson
Mobile App Testing by Mark WilsonMobile App Testing by Mark Wilson
Mobile App Testing by Mark Wilsonphpwgtn
 
3 Types Of Mobile Apps.pptx
3 Types Of Mobile Apps.pptx3 Types Of Mobile Apps.pptx
3 Types Of Mobile Apps.pptxBOSC Tech Labs
 
Sinergija 11 WP7 Mango multitasking and “multitasking”
Sinergija 11   WP7 Mango multitasking and “multitasking”Sinergija 11   WP7 Mango multitasking and “multitasking”
Sinergija 11 WP7 Mango multitasking and “multitasking”Catalin Gheorghiu
 
TestElf Informational Presentation
TestElf Informational PresentationTestElf Informational Presentation
TestElf Informational PresentationTestElf
 
Mobile Testing, That's Just A Smaller Screen, Right?
Mobile Testing, That's Just A Smaller Screen, Right?Mobile Testing, That's Just A Smaller Screen, Right?
Mobile Testing, That's Just A Smaller Screen, Right?Stephen Janaway
 
Performance testing – mobile apps session1
Performance testing – mobile apps   session1Performance testing – mobile apps   session1
Performance testing – mobile apps session1Jyothirmayee Pola
 
Performance testing – mobile apps session1
Performance testing – mobile apps   session1Performance testing – mobile apps   session1
Performance testing – mobile apps session1Jyothirmayee Pola
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesŃirjhor Ánjum
 
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...NITHIN S.S
 
Mobile applicationtesting
Mobile applicationtesting Mobile applicationtesting
Mobile applicationtesting L ESHWAR
 
7 reasons why user uninstall your app(final)
7 reasons why user uninstall your app(final)7 reasons why user uninstall your app(final)
7 reasons why user uninstall your app(final)BetaGlide
 
Why you should care about Progressive Web Apps?
Why you should care about Progressive Web Apps?Why you should care about Progressive Web Apps?
Why you should care about Progressive Web Apps?Vytas Dargis
 
An Introduction To Mobile Software Testing
An Introduction To Mobile Software TestingAn Introduction To Mobile Software Testing
An Introduction To Mobile Software TestingStephen Janaway
 
Mobile Application testing
Mobile Application testingMobile Application testing
Mobile Application testingMukta Gupta
 
Unhack conceptnaveenrawat 146330011
Unhack conceptnaveenrawat 146330011Unhack conceptnaveenrawat 146330011
Unhack conceptnaveenrawat 146330011NAVEEN SINGH RAWAT
 
Mobile Application Testing Training Presentation
Mobile Application Testing Training PresentationMobile Application Testing Training Presentation
Mobile Application Testing Training PresentationMobiGnosis
 
A9 mini gps tracker user manual shenzhen i365-tec...
A9 mini gps tracker user manual  shenzhen i365-tec...A9 mini gps tracker user manual  shenzhen i365-tec...
A9 mini gps tracker user manual shenzhen i365-tec...Alejandro Jose Ore Vargas
 
Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits
 Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits
Native, HTML5 or Hybrid Mobile Apps - Cost vs benefitsRanosys Technologies
 
How Mobile Networks Can Torpedo Your App's Best Features - and Your Retention
How Mobile Networks Can Torpedo Your App's Best Features -  and Your RetentionHow Mobile Networks Can Torpedo Your App's Best Features -  and Your Retention
How Mobile Networks Can Torpedo Your App's Best Features - and Your RetentionNeumob
 

Ähnlich wie Cell Phone Parental Monitoring App (20)

Mobile App Testing by Mark Wilson
Mobile App Testing by Mark WilsonMobile App Testing by Mark Wilson
Mobile App Testing by Mark Wilson
 
3 Types Of Mobile Apps.pptx
3 Types Of Mobile Apps.pptx3 Types Of Mobile Apps.pptx
3 Types Of Mobile Apps.pptx
 
Sinergija 11 WP7 Mango multitasking and “multitasking”
Sinergija 11   WP7 Mango multitasking and “multitasking”Sinergija 11   WP7 Mango multitasking and “multitasking”
Sinergija 11 WP7 Mango multitasking and “multitasking”
 
TestElf Informational Presentation
TestElf Informational PresentationTestElf Informational Presentation
TestElf Informational Presentation
 
Mobile Testing, That's Just A Smaller Screen, Right?
Mobile Testing, That's Just A Smaller Screen, Right?Mobile Testing, That's Just A Smaller Screen, Right?
Mobile Testing, That's Just A Smaller Screen, Right?
 
Performance testing – mobile apps session1
Performance testing – mobile apps   session1Performance testing – mobile apps   session1
Performance testing – mobile apps session1
 
Performance testing – mobile apps session1
Performance testing – mobile apps   session1Performance testing – mobile apps   session1
Performance testing – mobile apps session1
 
Security Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile DevicesSecurity Application for Smart Phones and other Mobile Devices
Security Application for Smart Phones and other Mobile Devices
 
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
[TTT Meetup] Enhance mobile app testing with performance-centric strategies (...
 
Mobile Application Testing
Mobile Application TestingMobile Application Testing
Mobile Application Testing
 
Mobile applicationtesting
Mobile applicationtesting Mobile applicationtesting
Mobile applicationtesting
 
7 reasons why user uninstall your app(final)
7 reasons why user uninstall your app(final)7 reasons why user uninstall your app(final)
7 reasons why user uninstall your app(final)
 
Why you should care about Progressive Web Apps?
Why you should care about Progressive Web Apps?Why you should care about Progressive Web Apps?
Why you should care about Progressive Web Apps?
 
An Introduction To Mobile Software Testing
An Introduction To Mobile Software TestingAn Introduction To Mobile Software Testing
An Introduction To Mobile Software Testing
 
Mobile Application testing
Mobile Application testingMobile Application testing
Mobile Application testing
 
Unhack conceptnaveenrawat 146330011
Unhack conceptnaveenrawat 146330011Unhack conceptnaveenrawat 146330011
Unhack conceptnaveenrawat 146330011
 
Mobile Application Testing Training Presentation
Mobile Application Testing Training PresentationMobile Application Testing Training Presentation
Mobile Application Testing Training Presentation
 
A9 mini gps tracker user manual shenzhen i365-tec...
A9 mini gps tracker user manual  shenzhen i365-tec...A9 mini gps tracker user manual  shenzhen i365-tec...
A9 mini gps tracker user manual shenzhen i365-tec...
 
Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits
 Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits
Native, HTML5 or Hybrid Mobile Apps - Cost vs benefits
 
How Mobile Networks Can Torpedo Your App's Best Features - and Your Retention
How Mobile Networks Can Torpedo Your App's Best Features -  and Your RetentionHow Mobile Networks Can Torpedo Your App's Best Features -  and Your Retention
How Mobile Networks Can Torpedo Your App's Best Features - and Your Retention
 

Cell Phone Parental Monitoring App

  • 1. Cell Phone Parental Support Application Under the guidance of: Prof Pooja Shah By: Ancy Varghese Mihika Shah
  • 2. Why do we need this? • Are your children or employees abusing the privileges of texting, calling and browsing? • Are you worried they are using the phone for inappropriate activities? • You will finally learn the truth about their activities
  • 3. What is the app about? • The app is a hybrid software/service which allows you to monitor your child's Android based smartphone in real time. • It starts at every boot of the phone but remains stealth.
  • 4. How it works? • Parent installs the software onto their child's phone. They configure the program according to their specific needs. • Child uses the phone normally. The app blocks and filters the actions specified and silently reports all actions to the Parent. • Parents can check their logs and monitor the activities of the child in Real time.
  • 5. Salient Features • The app is non UI based background process hence the child would not be able to realize the presence of such an application running in the background, as it has no interface. • The app has been desired to have less memory usage so that it can not be tracked.
  • 6. What it does? • It allows you to fully record the activities of your child's cell phone • It makes full logs of every text message sent and received, and logs vital information about each phone call. • The records do not rely on the phone's internal logging system, so if your child deletes their logs it won't matter.
  • 7. …Contd • You can still view every single text message and call . • The interface for the parent can be through a mail (if the phone is usually connected to the wi-fi) or through a GSM module.
  • 8. Assumptions • For the app to work successfully, at this initial stage we assume that the phone has to be connected to the wi-fi or Internet through Packet Data Subscription, so that the logs get tranferred. • If not that, GSM module can be used for transfer of the logs.
  • 9. Functional Requirements • REQ-1: The software should record user activities including SMS text messages, call information and GPS locations • REQ-2: To view logs on the device itself or in a secure online control panel. • REQ-3: Installation should be hidden from the phone user. • REQ-4: Upon getting connected to the internet, the transfer of logs should begin.
  • 10. Non-Functional Requirements • Performance Requirements Minimum RAM usage so that the application’s presence is not noticed and force killed. Installation without explicit installation through the internet is desired. • Safety Requirements As it is free of UI it is difficult for the child to realize the presence of such a software.
  • 11. Software Parameters: • Transfer time • RAM usage • Call logs summary size • Invoke Time
  • 13. Interfaces • There is no apparent interface on the smart phone because of the app being a non UI background process. So it is usually silent and hidden from the phone user. • The other interface could be a another smart phone or a mail.
  • 14. Requirements • Android Version 2.2.1(Froyo) and above. • RAM requiremets: Minimum 128 MB • Processor speed: 600 Mhz and above
  • 15. Installation Issues • Parent either gets a one time access to the smartphone to install the app and then the app remains hidden in the background. • Through the market, only if the parent has an account on the Google Market via the Android phone so that the installation ,if on the market , could be invoked by the parent.
  • 16. Surpassing the app • Loop holes in this stage includes that if the child finds out the extra RAM consumption • Or finds an app that is unknown in the Task Manager or in the Manage Applications menu. • Force killing the app does not invoke the app again.
  • 17. Progress till now • Call summary collection • Connectivity with the PC via sockets, which can be used to monitor Texts, in real time
  • 18. What next? • Integrating the several modules to one app and making it run in the background, with no user interface. • Using Wifi or GSM module to transfer the logs and summary which is collected by the Call Summary module.
  • 19. Challenges • Non UI background process • Minimum RAM usage • Invocation after being Force-killed
  • 20. Future Enhancements • GPS tracking • Blocking the malicious numbers • Application installation summary • Setting up time constraints for blocking calls. • SMS alerts instantly
  • 21. References: • Google Android Homepage: http://code.google.com/android/ • Google Android SDK: http://code.google.com/android/download.ht ml • Simple Notepad Tutorial: http://code.google.com/android/intro/tutorial .html