2. Road Map
Introduction
Project Idea and principle
In-practice Solutions
Problems with current scenario
Proposed System and Steps
Implementation overview
Relevant methods and classes
System Technologies
Constraints
Conclusion
3. Project Idea
We are trying to devise a new method to detect a stolen mobile
phones even when they are not connected to the network. The thief
tends to stay offline whilst using common media features and file
transfer services like Bluetooth.
Our Principle : “A friend in need is not always friend indeed.”
7. What do we propose?
Step 1 : The victim is required to fill
an online form reporting the theft to
us and hence updating our database.
Our Server
8.
9. Stolen phone (A)
Sharing MAC
(x:x:x:x:x:x:x)
Thief’s Friend (B)
(Shell-man Running)
What do we propose?
Step 2
Match Database
(x:x:x:x:x:x:x) &
Send IMEI of ‘B’
Step 3
Can be tracked!
10. The rest is as easy as it seems to be !
Step 4) ‘B’ is connected to mobile network and can be easily found using IMEI tracking.
Step 5) ‘B’ on interrogation reveals about his friend with whom he recently shared some songs.
Step 6) Thief in trouble!!
Step 7) Time to convey some good news to the owner!
(3) (4) (5)
(6)(7)
(B)
We give the suspected IMEI
to the police
11.
12.
13.
14. Android Services (Future Prospect)
A Service is an application component that can perform long-running
operations in the background and does not provide a user interface.
16. Relevant methods and classes
telephony_manager.getDeviceID() - Returns the unique device ID, for
example, the IMEI for GSM.
getDefaultAdapter() - Get a handle to the default local Bluetooth adapter.
Currently Android only supports one Bluetooth adapter, but the API could be
extended to support more. This will always return the default adapter.
getBondedDevices() - Return the set of Bluetooth Device objects that are
bonded (paired) to the local adapter.
(BluetoothDevice)device.getAddress() - Return the set of Bluetooth Device
objects that are bonded (paired) to the local adapter.
Classes : *BluetoothAdapter | *TelephonyManager
17. Implementation -
IMEI of ‘B’ is fetched by Shell-man and sent to server in case it has recently interacted with the stolen phone...
(The list of MACs sent by ‘B’ contains the MAC address of the stolen phone.)
19. System Constraints
The proposed system is entirely Bluetooth dependent.
MAC Address is not always known to the owners.
Shell-man might be considered as a redundant process by many
manufacturers.
Single Platform Implementation as of now.
The Police Department still have some minimalistic involvement.
20. Conclusion
Eliminating the need to rely on a slow and lazy process followed by police
department, we have tried to come up with a solution that increases the
probability of finding the lost device.
We have taken into account the possibilities that haven't been considered
in the current solutions. Thus, Instead of relying over the carrier services,
we take the advantage of wireless sharing mobile service i.e. Bluetooth to
track a person who is in the know about the actual thief.