Preview

Cell Phone Theft Indication

Satisfactory Essays
Open Document
Open Document
20840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cell Phone Theft Indication
Cell phone theft indicator

Index

1. Abstract 2. Description 3. Introduction a. Brief introduction of project b. Block diagram c. Block required d. Hardware required e. Software required 4. Power supply a. Introduction b. Functions and Operation c. Design and explanation d. Power consumption table e. Circuit diagram 5. GSM module a. Functions b. About GSM mobile 6. Max 232 a. Functions b. Operation c. Futures d. Pin details e. Connection diagram 7. Micro controller a. Functions b. Operation c. Futures d. Pin details e. Connection diagram 8. Over all circuit design 9. Project specification 10. Conclusion? 11. Reference?

Abstract: To avoid cell phone theft, this indicator is used. While theft, this cell phone automatically sends SMS to our familiar cell phone number.

Description: By our careless or unfortunately some time our cell phone thefts. It makes big problem to many ways like we are loss several contract numbers and also we are loss our money. So avoid this situation we are designed and developed this cell phone theft identification project. By using our concept, we can easily identify the theft person. Now we are developed the demo level project by using GSM module and Microcontroller. We are not able to reprogram the cell phone for that we are used GSM module and Microcontroller. Whenever switched ON the cell phone, at the same time it will checks the SIM number with previous SIM number. If it is not matching means it will send SMS to particular cell phone (our believing person cell) and also after change the SIM the theft person can be call some cell phone. These cell numbers is also sent to our believing person cell.

3. Introduction

Brief explanation of project: In this fast moving world,

You May Also Find These Documents Helpful

  • Good Essays

    Mobile phones can be easily lost or stolen. It is a good idea to set up a PIN lock on your…

    • 1176 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Mobile Phone

    • 608 Words
    • 3 Pages

    It is clear that mobile phones are an invasion of privacy as they can be hacked, giving criminals access to your data which increasingly is coming to contain financial access data such as credit card numbers, bank account numbers and etc. It is also possible for criminals to “clone” phones, or for them to steal your phone and modify the chip, allowing your details to be used outside your network area. Hackers are now seeing these devices as a new way of making money, a new way of getting data about people. The cell phone hacker can even access your camera phone and speaker, to keep track of your every move.…

    • 608 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Expensive mobile phone handsets are desirable items, and so unfortunately are at risk from theft. Children and young people may be particularly vulnerable to such crime.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Better Essays

    device into the phones, so that phones cannot be on while in a moving vehicle. It’s like when…

    • 1419 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In today's world mass shootings are becoming a regular thing. It is the sad truth. But, if Apple could lower it's ego and disturbed policies the FBI could find more information on terrorist attacks. There is a very real possibility that these men were part of a terrorist group or organization. Yet it is impossible to know whether or not they truly were a part of a bigger picture without accessing their phone. It is crucial that Apple develops the software to access the shooter's cellphone as it may hold information that can help protect the people of the United…

    • 797 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Cell Phone Cloning

    • 3056 Words
    • 13 Pages

    This paper describes about the cell phone cloning with implementation in GSM and CDMA technology phones. It gives an insight into the security mechanism in CDMA and GSM phones along with the loop holes in the systems and discusses on the different ways of preventing this cloning. Moreover, the future threat of this fraud is being elaborated.…

    • 3056 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    When a business like Hong Leong group relies mainly on mobile devices, it must consider insisting its employees as well as customers to install mobile security software programs in their devices. Installing of security software like Antivirus and firewall can prove to be of great help. These programs detect and prevent any malicious software from entering the systems. Also software regarding visual notification and Biometric identifications can be used. Visual Notifications tend to warn the user of any unauthorized action that is happening on his device. Biometric Identification is a far superior technique of user identification and access to the device than password protection. It relies on identification of a person and granting him access to the device based on his morphology like fingerprint, eye retina images etc. As morphology of ever person is unique it provides a very…

    • 856 Words
    • 4 Pages
    Good Essays
  • Good Essays

    crime report

    • 2419 Words
    • 10 Pages

    When you will discuss this particular topic in public, you will be surprised to see that every person has a story to tell about having their purse or wallet of cell phone stolen. It has been observed that these crimes takes place largely in big cities, where there are homeless people in large numbers and where people have a founding for expensive unnecessary luxuries of life. It is highly regretted that these incidents are on the rise instead of decline.…

    • 2419 Words
    • 10 Pages
    Good Essays
  • Good Essays

    Snatch Theft

    • 252 Words
    • 2 Pages

    Next point is,individu must avoid themself from go out at night especially when you are alone.This is because the snatch theft will have a big chance to snatch at night.At night,there will be no people walk and go out.So,there are no one can help the victims when they are being snatch.…

    • 252 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Diwali Vacation

    • 279 Words
    • 2 Pages

    On getting the message on a designated number, the owner can reply with a message code. This will activate the alarm on the stolen mobile which can only be snoozed on entering a password which the actual owner only…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Antitheft Switch Essay

    • 660 Words
    • 3 Pages

    The New York Times article, “New York Asks Cellphone Carriers to Explain Why They Rejected Antitheft Switch” addresses the growing trend of cell phone theft in the United States. The article recaps recent steps taken by government, police officials, cell phone carriers, cell phone manufactures, and trade groups in this sector. The concern presented by government and police is that the cell phone industry is not doing enough to prevent these crimes on society. The two largest issues relating to the course are possible actions resulting in tort law and actions implying collusion on behalf of cell phone carriers.…

    • 660 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ruff Ryders

    • 724 Words
    • 3 Pages

    The most popular electronic device that is found in almost every single individuals hand in North America is a cell phone. People are dependent on it for almost every minute of the day, since technology has reached to a point where we can do absolutely anything with this magical wonder. They are used in urgent situations, along with helping people keep in touch with their loved ones. Overall, this is a remarkable device with many of its features to come in handy in everyone’s life.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Digital Evidence

    • 342 Words
    • 2 Pages

    Information stored inside mobile phones such as phone numbers, calendar entries, text messages can be manipulated by employees or any personnel to commit crimes such as telemarketing fraud, pornography, stealing of company’s information or GPS location, etc. For example, a message was retrieved from a mobile phone which helped to acquit Patrick Lumumba in the murder of Meredith Kercher. (Trutv, n.d.).…

    • 342 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Abtract to Detect Mobile

    • 370 Words
    • 2 Pages

    The circuit can detect the incoming and outgoing calls, SMS and video transmission even if the mobile phone is kept in the silent mode. The moment the bug detects RF transmission signal from an activated mobile phone, it starts sounding a beep alarm and the LED blinks. The alarm continues until the signal transmission ceases.…

    • 370 Words
    • 2 Pages
    Good Essays

Related Topics