Preview

Cell Phone Theft Indication

Satisfactory Essays
Open Document
Open Document
20840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cell Phone Theft Indication
Cell phone theft indicator

Index

1. Abstract 2. Description 3. Introduction a. Brief introduction of project b. Block diagram c. Block required d. Hardware required e. Software required 4. Power supply a. Introduction b. Functions and Operation c. Design and explanation d. Power consumption table e. Circuit diagram 5. GSM module a. Functions b. About GSM mobile 6. Max 232 a. Functions b. Operation c. Futures d. Pin details e. Connection diagram 7. Micro controller a. Functions b. Operation c. Futures d. Pin details e. Connection diagram 8. Over all circuit design 9. Project specification 10. Conclusion? 11. Reference?

Abstract: To avoid cell phone theft, this indicator is used. While theft, this cell phone automatically sends SMS to our familiar cell phone number.

Description: By our careless or unfortunately some time our cell phone thefts. It makes big problem to many ways like we are loss several contract numbers and also we are loss our money. So avoid this situation we are designed and developed this cell phone theft identification project. By using our concept, we can easily identify the theft person. Now we are developed the demo level project by using GSM module and Microcontroller. We are not able to reprogram the cell phone for that we are used GSM module and Microcontroller. Whenever switched ON the cell phone, at the same time it will checks the SIM number with previous SIM number. If it is not matching means it will send SMS to particular cell phone (our believing person cell) and also after change the SIM the theft person can be call some cell phone. These cell numbers is also sent to our believing person cell.

3. Introduction

Brief explanation of project: In this fast moving world,

You May Also Find These Documents Helpful

  • Good Essays

    Business & Admin Level 2

    • 2181 Words
    • 9 Pages

    | This is used to leave a message if nobody is there to answer the phone.…

    • 2181 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Expensive mobile phone handsets are desirable items, and so unfortunately are at risk from theft. Children and young people may be particularly vulnerable to such crime.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ruff Ryders

    • 724 Words
    • 3 Pages

    The most popular electronic device that is found in almost every single individuals hand in North America is a cell phone. People are dependent on it for almost every minute of the day, since technology has reached to a point where we can do absolutely anything with this magical wonder. They are used in urgent situations, along with helping people keep in touch with their loved ones. Overall, this is a remarkable device with many of its features to come in handy in everyone’s life.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    cell phone privacy

    • 814 Words
    • 4 Pages

    Our cellphones today are just devices for spying on people across the country. The government looks in on phone records, text records, social media, and mostly everything on our cellular device. The things the government can do with cell phones are crazy as they can track our every move. Since the beginning of cellphones, the government has been tracking them and invading everyone’s privacy.…

    • 814 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Source 1 HTMT’s mission is to develop unique, flexible, world-class customer solutions for our clients through personal collaboration,…

    • 5363 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    carjack

    • 8399 Words
    • 34 Pages

    message is sent by the phone to a cellular shield. The cellular shield is a device that…

    • 8399 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Cell phones are having a great influence in our lives, and are very convenient to keep with us. Cell phones are a faster and more effective way to transfer information. Indeed, it is a resource that gives its user’s great advantages.…

    • 913 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Everywhere a person may go, people have cell phones, and if they are not talking on them, they are texting, playing games, watching programs, or surfing the Internet. Technology has significantly advanced when it comes to cell phones. Cell phones can be used for everything a person could imagine, including starting a car. Cell phones have many applications; they include music, e-mail, social networking, GPS navigation, games, ringtones, movies, TV, entertainment, and much more. Not that long ago, a cell phone was bulky, large, and it had a big bag to carry the phone inside. Cell phones today can have different covers to fit over it to match any fashionable outfit or just be sleek, attractive and, it is so slim it can slide into almost any pocket. A person could hide a cell phone anywhere either on his or her person, car, backpack, or in a handbag.…

    • 1400 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Identity Theft

    • 1418 Words
    • 6 Pages

    “People must be vigilant in protecting their identities” this is the argument that the police department uses to be able to get personal information of people from their cellphones. Unfortunately, as long as identity theft is a profitable venture, it will not disappear. The only way consumers and businesses can deal with it is to learn how to prevent it and then take those preventative measures. The most important action anyone can take to prevent against identity theft is to be aware of how personal or financial information is disseminated and the ways in which such information is vulnerable to misuse.…

    • 1418 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Digital Evidence

    • 342 Words
    • 2 Pages

    Information stored inside mobile phones such as phone numbers, calendar entries, text messages can be manipulated by employees or any personnel to commit crimes such as telemarketing fraud, pornography, stealing of company’s information or GPS location, etc. For example, a message was retrieved from a mobile phone which helped to acquit Patrick Lumumba in the murder of Meredith Kercher. (Trutv, n.d.).…

    • 342 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Agile Logistics

    • 458 Words
    • 2 Pages

    Agile Logistics, a Singapore based warehousing and logistics specialist, is a well-recognized third-party logistics (3PL) provider. Agile Logistics has the know-how to power their customers’ supply-chain - delivering intelligent solutions that streamline efficiencies and boost their customers’ bottom line.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cell Phones are Dangerous

    • 785 Words
    • 4 Pages

    Firstly, cell phones are easily used as crime devices as they are very mobile friendly. This however, caused some individuals to misuse it in conducting personal and intrusive crimes. In 2012, ABC News reported a teenager caught brazenly slipping his cell phone camera under a woman’s skirt capturing a video. It is reasonable to argue that voyeurisms can be conducted using actual hidden cameras. However, with cell phones being the more common and personal device, peeping toms often turn to cell phones to discreetly commit these crimes. Despite that, smartphones and cell phones are useful to overcome these crimes. They have become a regular part of criminal investigations because they are now owned by most people and provide information about a person’s whereabouts and contacts. The police these days often encourage citizens to use their cell phones to report crimes and send in tips (South Source,n.d). This, as Sue (2013) proclaims, helps victims feel more comfortable as they know where a criminal is. However, one can dispute that cell phones may be the main cause of these crimes. The availability of cheap cell phone spyware makes it easier for stalkers to track their victims ( News 10 abc, 2013). Clearly then, cell phones are easily used as crime devices.…

    • 785 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Substation

    • 9545 Words
    • 39 Pages

    As we have seen many types of remote controls like Infra-red controlled, RF controlled, DTMF controlled etc. The present model is also intended to control devices using GSM technology i.e. just by sending code (containing numerical numbers) to the appliance/devices status. So the present project model can be used in the substations, homes, industries etc. In substations feeders are located which carry the power close to the…

    • 9545 Words
    • 39 Pages
    Powerful Essays
  • Good Essays

    Snatch Theft

    • 252 Words
    • 2 Pages

    Next point is,individu must avoid themself from go out at night especially when you are alone.This is because the snatch theft will have a big chance to snatch at night.At night,there will be no people walk and go out.So,there are no one can help the victims when they are being snatch.…

    • 252 Words
    • 2 Pages
    Good Essays

Related Topics