Mobile Device Theft Recovery Applicaiton Platform Independent and Subscription Free

نویسندگان

  • Peter Hsieh
  • Troy Steinbauer
چکیده

The constant access to information and computing resources brought by mobile devices had changed the nature of computing and communication experience. With more and more cell phones and laptops sold every year, stolen and lost devices have become a rising concern. Several theft recovery applications have been developed targeted specifically for mobile devices, but none for what we came across have combined affordability, deployability, privacy, and ease of use in one single package. We propose a new mobile device theft recovery system, codenamed gTracker, which utilizes Google’s spreadsheet and web album service as our remote storage server. We believe by utilizing Google’s reliable service and Java’s cross-platform nature, our mobile device theft recovery application would be a better alternative to existing theft recovery applications on the market. Keywords-component; mobile device; theft recovering; java; tracking; cell phone; Google; Google Documents; Picasa; Android

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mobile Device Theft Recovery Application Platform Independent and Subscription Free

The constant access to information and computing resources brought by mobile devices had changed the nature of computing and communication experience. With more and more cell phones and laptops sold every year, stolen and lost devices have become a rising concern. Several theft recovery applications have been developed target specifically for mobile devices, but none, for what we came across, h...

متن کامل

Practical Attacks against Virtual Desktop Infrastructure (VDI) Solutions

The Virtual Desktop Infrastructure (VDI) technology is considered one such practical solution. Since VDI provides a remote workstation offering so that no data is stored locally on an endpoint device, it is touted as the security solution against data theft. While such a solution comes in handy when a mobile device is stolen, how does VDI scale when the device itself is compromised by a threat ...

متن کامل

A Model for Remote Access and Protection of Smartphones using Short Message Service

The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access a smartphone through other smartphone or a normal mobile via Short Message Service. This model provides option to track and secure the mobile by locking it. I...

متن کامل

SmartBike: an IoT Crowd Sensing Platform for Monitoring City Air Pollution

In recent years, the Smart City concept is emerging as a way to increase efficiency, reduce costs, and improve the overall quality of citizen life. The rise of Smart City solutions is encouraged by the increasing availability of Internet of Things (IoT) devices and crowd sensing technologies. This paper presents an IoT Crowd Sensing platform that offers a set of services to citizens by exploiti...

متن کامل

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010