SlideShare a Scribd company logo
1 of 21
Road Map
 Introduction
 Project Idea and principle
 In-practice Solutions
 Problems with current scenario
 Proposed System and Steps
 Implementation overview
 Relevant methods and classes
 System Technologies
 Constraints
 Conclusion
Project Idea
We are trying to devise a new method to detect a stolen mobile
phones even when they are not connected to the network. The thief
tends to stay offline whilst using common media features and file
transfer services like Bluetooth.
Our Principle : “A friend in need is not always friend indeed.”
Current Scenario
Problems with conventional systems
What do we propose?
Step 1 : The victim is required to fill
an online form reporting the theft to
us and hence updating our database.
Our Server
Stolen phone (A)
Sharing MAC
(x:x:x:x:x:x:x)
Thief’s Friend (B)
(Shell-man Running)
What do we propose?
Step 2
Match Database
(x:x:x:x:x:x:x) &
Send IMEI of ‘B’
Step 3
Can be tracked!
The rest is as easy as it seems to be !
Step 4) ‘B’ is connected to mobile network and can be easily found using IMEI tracking.
Step 5) ‘B’ on interrogation reveals about his friend with whom he recently shared some songs.
Step 6) Thief in trouble!!
Step 7) Time to convey some good news to the owner!
(3) (4) (5)
(6)(7)
(B)
We give the suspected IMEI
to the police
Android Services (Future Prospect)
 A Service is an application component that can perform long-running
operations in the background and does not provide a user interface.
Implementation -
Shell-man fetches all the paired MAC addresses (B) and sends it to the server for matching…
Relevant methods and classes
 telephony_manager.getDeviceID() - Returns the unique device ID, for
example, the IMEI for GSM.
 getDefaultAdapter() - Get a handle to the default local Bluetooth adapter.
Currently Android only supports one Bluetooth adapter, but the API could be
extended to support more. This will always return the default adapter.
 getBondedDevices() - Return the set of Bluetooth Device objects that are
bonded (paired) to the local adapter.
 (BluetoothDevice)device.getAddress() - Return the set of Bluetooth Device
objects that are bonded (paired) to the local adapter.
 Classes : *BluetoothAdapter | *TelephonyManager
Implementation -
IMEI of ‘B’ is fetched by Shell-man and sent to server in case it has recently interacted with the stolen phone...
(The list of MACs sent by ‘B’ contains the MAC address of the stolen phone.)
Technologies
System Constraints
 The proposed system is entirely Bluetooth dependent.
 MAC Address is not always known to the owners.
 Shell-man might be considered as a redundant process by many
manufacturers.
 Single Platform Implementation as of now.
 The Police Department still have some minimalistic involvement.
Conclusion
 Eliminating the need to rely on a slow and lazy process followed by police
department, we have tried to come up with a solution that increases the
probability of finding the lost device.
 We have taken into account the possibilities that haven't been considered
in the current solutions. Thus, Instead of relying over the carrier services,
we take the advantage of wireless sharing mobile service i.e. Bluetooth to
track a person who is in the know about the actual thief.
THANK YOU

More Related Content

Viewers also liked

Buletin edisi i ksr pmi unhas
Buletin edisi i ksr pmi unhasBuletin edisi i ksr pmi unhas
Buletin edisi i ksr pmi unhasVicky Hilang
 
Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]
Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]
Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]Praseed Nair
 
ข่าว ไอที
ข่าว ไอทีข่าว ไอที
ข่าว ไอทีravewan
 
Happy, fulfilling long term relationships
Happy, fulfilling long term relationshipsHappy, fulfilling long term relationships
Happy, fulfilling long term relationshipsmelololonn
 
Happy, fulfilling long term relationships
Happy, fulfilling long term relationshipsHappy, fulfilling long term relationships
Happy, fulfilling long term relationshipsmelololonn
 
Modul communication for_behavioral_impact(comb)-dbd
Modul communication for_behavioral_impact(comb)-dbdModul communication for_behavioral_impact(comb)-dbd
Modul communication for_behavioral_impact(comb)-dbdVicky Hilang
 
03 grasim industries ltd
03 grasim industries ltd03 grasim industries ltd
03 grasim industries ltdBidyut Das
 
Panduan fasilitator pelatihan dasar ksr
Panduan fasilitator pelatihan dasar ksrPanduan fasilitator pelatihan dasar ksr
Panduan fasilitator pelatihan dasar ksrVicky Hilang
 
ANKUR PURI RESUME
ANKUR PURI RESUMEANKUR PURI RESUME
ANKUR PURI RESUMEANKUR PURI
 

Viewers also liked (9)

Buletin edisi i ksr pmi unhas
Buletin edisi i ksr pmi unhasBuletin edisi i ksr pmi unhas
Buletin edisi i ksr pmi unhas
 
Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]
Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]
Rejuvenating Your Revenues [Hotel Connect, May-Jun 2016]
 
ข่าว ไอที
ข่าว ไอทีข่าว ไอที
ข่าว ไอที
 
Happy, fulfilling long term relationships
Happy, fulfilling long term relationshipsHappy, fulfilling long term relationships
Happy, fulfilling long term relationships
 
Happy, fulfilling long term relationships
Happy, fulfilling long term relationshipsHappy, fulfilling long term relationships
Happy, fulfilling long term relationships
 
Modul communication for_behavioral_impact(comb)-dbd
Modul communication for_behavioral_impact(comb)-dbdModul communication for_behavioral_impact(comb)-dbd
Modul communication for_behavioral_impact(comb)-dbd
 
03 grasim industries ltd
03 grasim industries ltd03 grasim industries ltd
03 grasim industries ltd
 
Panduan fasilitator pelatihan dasar ksr
Panduan fasilitator pelatihan dasar ksrPanduan fasilitator pelatihan dasar ksr
Panduan fasilitator pelatihan dasar ksr
 
ANKUR PURI RESUME
ANKUR PURI RESUMEANKUR PURI RESUME
ANKUR PURI RESUME
 

Similar to Android Theft Detection

Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01nagapriyanka
 
Control Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable MobileControl Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable MobileSamiul Hoque
 
Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01ramaswamireddy challa
 
Client Server Development – Problems in Supporting Different Wireless Platform
Client Server Development – Problems in Supporting Different Wireless PlatformClient Server Development – Problems in Supporting Different Wireless Platform
Client Server Development – Problems in Supporting Different Wireless Platformgustavoeliano
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisitedThierry Zoller
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
 
3-Way Scripts as a Base Unit for Flexible Scale-Out Code
3-Way Scripts as a Base Unit for Flexible Scale-Out Code3-Way Scripts as a Base Unit for Flexible Scale-Out Code
3-Way Scripts as a Base Unit for Flexible Scale-Out CodeTokyo University of Science
 
A Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksDavid González Romero
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWalmart Super Center
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWalmart Super Center
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWalmart Super Center
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth securityRamasubbu .P
 
Digiplant colloquim
Digiplant colloquimDigiplant colloquim
Digiplant colloquimTyler Belle
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Denis Gorchakov
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hackSlawomir Jasek
 

Similar to Android Theft Detection (20)

Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01
 
Control Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable MobileControl Pc Via Bluetooth Enable Mobile
Control Pc Via Bluetooth Enable Mobile
 
Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01Controlpcviabluetoothenablemobile 091028150632-phpapp01
Controlpcviabluetoothenablemobile 091028150632-phpapp01
 
Client Server Development – Problems in Supporting Different Wireless Platform
Client Server Development – Problems in Supporting Different Wireless PlatformClient Server Development – Problems in Supporting Different Wireless Platform
Client Server Development – Problems in Supporting Different Wireless Platform
 
23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited23c3 Bluetooth hacking revisited
23c3 Bluetooth hacking revisited
 
Rococo Software Q3 2010
Rococo Software Q3 2010Rococo Software Q3 2010
Rococo Software Q3 2010
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the Device
 
3-Way Scripts as a Base Unit for Flexible Scale-Out Code
3-Way Scripts as a Base Unit for Flexible Scale-Out Code3-Way Scripts as a Base Unit for Flexible Scale-Out Code
3-Way Scripts as a Base Unit for Flexible Scale-Out Code
 
A Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless NetworksA Comprehensive Approach to Secure Group Communication in Wireless Networks
A Comprehensive Approach to Secure Group Communication in Wireless Networks
 
SIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - DublinSIGFOX Makers Tour - Dublin
SIGFOX Makers Tour - Dublin
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam Results
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam Results
 
Wireless Networking Final Exam Results
Wireless Networking Final Exam ResultsWireless Networking Final Exam Results
Wireless Networking Final Exam Results
 
Report
ReportReport
Report
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
Digiplant colloquim
Digiplant colloquimDigiplant colloquim
Digiplant colloquim
 
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
Countering mobile malware in CSP’s network. Android honeypot as anti-fraud so...
 
IoThings you don't even need to hack
IoThings you don't even need to hackIoThings you don't even need to hack
IoThings you don't even need to hack
 

Android Theft Detection

  • 1.
  • 2. Road Map  Introduction  Project Idea and principle  In-practice Solutions  Problems with current scenario  Proposed System and Steps  Implementation overview  Relevant methods and classes  System Technologies  Constraints  Conclusion
  • 3. Project Idea We are trying to devise a new method to detect a stolen mobile phones even when they are not connected to the network. The thief tends to stay offline whilst using common media features and file transfer services like Bluetooth. Our Principle : “A friend in need is not always friend indeed.”
  • 5.
  • 7. What do we propose? Step 1 : The victim is required to fill an online form reporting the theft to us and hence updating our database. Our Server
  • 8.
  • 9. Stolen phone (A) Sharing MAC (x:x:x:x:x:x:x) Thief’s Friend (B) (Shell-man Running) What do we propose? Step 2 Match Database (x:x:x:x:x:x:x) & Send IMEI of ‘B’ Step 3 Can be tracked!
  • 10. The rest is as easy as it seems to be ! Step 4) ‘B’ is connected to mobile network and can be easily found using IMEI tracking. Step 5) ‘B’ on interrogation reveals about his friend with whom he recently shared some songs. Step 6) Thief in trouble!! Step 7) Time to convey some good news to the owner! (3) (4) (5) (6)(7) (B) We give the suspected IMEI to the police
  • 11.
  • 12.
  • 13.
  • 14. Android Services (Future Prospect)  A Service is an application component that can perform long-running operations in the background and does not provide a user interface.
  • 15. Implementation - Shell-man fetches all the paired MAC addresses (B) and sends it to the server for matching…
  • 16. Relevant methods and classes  telephony_manager.getDeviceID() - Returns the unique device ID, for example, the IMEI for GSM.  getDefaultAdapter() - Get a handle to the default local Bluetooth adapter. Currently Android only supports one Bluetooth adapter, but the API could be extended to support more. This will always return the default adapter.  getBondedDevices() - Return the set of Bluetooth Device objects that are bonded (paired) to the local adapter.  (BluetoothDevice)device.getAddress() - Return the set of Bluetooth Device objects that are bonded (paired) to the local adapter.  Classes : *BluetoothAdapter | *TelephonyManager
  • 17. Implementation - IMEI of ‘B’ is fetched by Shell-man and sent to server in case it has recently interacted with the stolen phone... (The list of MACs sent by ‘B’ contains the MAC address of the stolen phone.)
  • 19. System Constraints  The proposed system is entirely Bluetooth dependent.  MAC Address is not always known to the owners.  Shell-man might be considered as a redundant process by many manufacturers.  Single Platform Implementation as of now.  The Police Department still have some minimalistic involvement.
  • 20. Conclusion  Eliminating the need to rely on a slow and lazy process followed by police department, we have tried to come up with a solution that increases the probability of finding the lost device.  We have taken into account the possibilities that haven't been considered in the current solutions. Thus, Instead of relying over the carrier services, we take the advantage of wireless sharing mobile service i.e. Bluetooth to track a person who is in the know about the actual thief.