Mobile Computing(CS634) Group 15 SMS controlled Security & Life Saving Application on Android

Size: px
Start display at page:

Download "Mobile Computing(CS634) Group 15 SMS controlled Security & Life Saving Application on Android"

Transcription

1 Mobile Computing(CS634) Group 15 SMS controlled Security & Life Saving Application on Android Amitesh Maheshwari Dept. of CSE Ravi Ranjan Dept. of CSE Supervisor: Dr. R. K. Ghosh Indian Institute of Technology, Kanpur Project Report April 13, 2013 Abstract In this project, we have developed a security cum lifesaving application for the Android mobile devices. This project provides the user with various facilities, which can be availed by him/her via any ordinary phone, which has the SMS(messaging) facility. The application provides various security and anti-theft features for the android device. The application, in itself, is also very much secure and provides four level security. As power consumption has always been a major issue with the Android mobiles, so we also kept in mind the power constraints of the device and tried to make the application as efficient and lightweight as possible. 1 Introduction Nowadays, a majority of the world s population use the Android phones or any other kind of smartphones and also, they carry it with them all the time. This mobile phone is so small and powerful that it can also be used for life saving purpose. Moreover, we perform huge amount of monetary transactions via these android phones. In such a scenario, if the phone is lost, then thief can quickly misuse it and put us into deep trouble. Therefore, for such a powerful device, there has to be a powerful and ultrasecure application, which will allow the protection of the user as well as the mobile device. In this project, we have developed such an application, which will provide the user with a variety of secure features without compromising on the efficiency of the Android device. 2 Previuos Work There are applications available in Android market, which cater to the issue of security of Android mobile devices. Examples of such applications are MobileProtect Pro[1] by KloudData, PhoneLocator Pro[2] etc. But, these applications are highly UI oriented, thus consuming a lot of Android battery. They require user registration, thus adding an extra burden for the users. Only one password is allowed in their case, which can be only changed if you have the access to the application on your Android mobile device. Moreover, the messages related to the application are relayed to inbox and sms notification, so an attacker can easily misuse the application. Also, in these applications, any body can uninstall the application, no protection is provided for this. 3 Features and their use cases We have broadly classified the various features of the application into three categories: Remote Call/Contact data access Life Saving Features System Features 1

2 3.1 Remote Call/Contact data access Fetch the contact by name from the phonebook Using this feature, the user can fetch any contact by name stored in the phonebook of his/her Android phone by sending a message from any ordinary mobile phone. It does a partial string matching on the name of the contact sent via SMS and fetches all those contacts. Command- Contact:<person name> Use Cases: Supppose you want to get phone number of a neighbour, which is in your father s mobile phone, but he is not picking up the phone right now, then you can use it. This feature can be very helpful in a company or municipal corporation, where contacts of the employees, clients and services can be stored on any central Android device and users can get whenever they want Fetch a specified number of last incoming calls Using this feature, the user can fetch a certain number of incoming calls on his Android device by sending a message. We send the number of incoming calls to be fetched alongwith the message. Command- Incoming:<number of calls> Fetch a specified number of last outgoing calls Using this feature, the user can fetch a certain number of outgoing calls on his Android device by sending a message. We send the number of outgoing calls to be fetched alongwith the message. Command- Outcoming:<number of calls> Use Cases: Suppose your Android phone is lost and then one can use this command to fetch the recent outgoing calls to know that to which mobile numbers the thief has called from it. This can be very helpful in tracking down the device Fetch a specified number of last missed calls Using this feature, the user can fetch a certain number of missed calls on his Android device by sending a message. We send the number of missed calls to be fetched alongwith the message. Command- Missed:<number of calls> Use Cases: Suppose that you have left your Android phone at home and want to know that who have contacted you during that period, then you can pick up any ordinary phone and sent an SMS query to retrieve a list of last missed calls on your Android. This feature can also be useful incase the android phone is lost. 3.2 Life Saving Features Get the current location of phone Using the feature, one can get the current location of the Android phone by sending a message to it. At the time of the receipt of the query message by the application, if the Internet is working and gps is enabled in the android, then it will fetch the current nearest location of the android by querying the Google Maps API. If the Internet is not working, then it will only send the latituse and longitude of the current phone location. Command- Where Use Cases: Suppose a child is not picking up his/her phone for a long time and the parent is worried sick about him/her, using this command the parent can know his location. Also, if the phone is lost, then we can also use this command to locate the android device Get the nearest hospital from the current phone location Using this feature, one can get the name, address and telephone number of the nearest hospital that is located to that of the current android phone location. Similarly, as above, if the Internet is not working, then it will only send the latituse and longitude of the current phone location. Command- Hospital Use Cases: Suppose the Android phone user is caught in some accident or natural calamity and his/her parents want to know that their child is fine, but is not picking up the phone and Where command is showing the location, which is same as that of the accident, then they can get contact details of the nearby Hospital using the above command, which would be helpful in getting the whereabouts of the child. 2

3 3.2.3 Get the nearest police station from the current phone location Using this feature, one can get the name, address and telephone number of the nearest police station that is located to that of the current android phone location. Similarly, as above, if the Internet is not working, then it will only send the latituse and longitude of the current phone location. Command- Police Use Cases: This command can be used as an antitheft feature like if the android phone is lost, then using this command, we can get the contact details of the nearest police station and can contact them and tell them that phone is lost, which will help in retrieving the mobile phone quickly. Also, it can be used in case of an accident or any natural calamity as in the case of the previous Hospital query. 3.3 System Features Using these features, one can the change the state of the Android mobile device Puts the phone on silent mode Using this feature, one can put his Android phone into silent by sending an SMS command to it. Command- Silent Use Cases: Suppose you have left your Android phone at a place, where if it rings, it would create disturbance for the others and problems for you, but you cannot go to that place immediately, so this command, in such scenario, would prove to be very handy for you Makes the phone ring even if silent or vibrating mode Using this feature, one can make his Android phone ring at full volume by sending an SMS command to it. Once the mobile phone starts ringing, it will not stop until one cycle of its ringtone finishes, no matter what button you press on the mobile. Command- Ring Use Cases: Suppose you have kept your phone and forgot and also, it is currently in silent mode, then via this command, you can find your android phone by making it ring. Suppose your android device is stolen and thief has put it in silent mode, but you know that it is currently in the same room with you, then you can expose the thief by using this command. Also, he will not be able to do anything, as it would continue ringing until its cycle has finished Locks the phone if currently not locked without changing the current lock password Using this feature, the Android phone user can lock his phone as soon as the application receives the SMS corresponding to this command. It does not require the lock to be enabled in the android phone, but requires that a lock password be previously set on it. Since, this feature is a very much secured feature, so we do not want any user to get access of this feature. Therefore, this feature compulsarily requires a SMS password to be sent alogwith the query SMS. Command- <sms password>#locknow Use Cases: This feature can be used, in the case, if the phone is lost and you want your phone and its personal data to be protected from the thief, then we can lock the android phone then and there, by sending the above command to it Changes the lock password of the phone Using this command, the user can change the lock password of his/her android mobile phone. It does not require the lock to be enabled in the android phone and also does not require that a lock password be previously set on the phone. Also, this is a secured feature, so it compulsarily requires a SMS password to be sent alogwith the query SMS. Command- <sms password>#lock:<new password> Use Cases: This feature can be used, in the case, if the phone is lost and you want your phone and its personal data to be protected from the thief and in case, you doubt that he might be aware of the lock password of your android phone, then we can change its lock password and also lock the android phone then and there, by sending the above command to it Restores the phone to the factory settings Using this phone, the user can restore your Android phone to the factory settings. Since, this feature is an ultimate security feature, so it requires the SMS password as well as 3

4 the master password to be sent alongwith the query message. Command- <sms password>#wipe:<master password> Use Cases: This feature provides ultimate security of the personal data and contacts of your phone, if you do not want to take any risks. In that scenario, this feature provides the facility to restore the Android phone to its factory settings. This makes the phone completely useless for the thief. Another system feature of the application is that it is boot complete i.e. the application starts running on its own, when the phone is started. So, if a message is sent to it, when the phone was switched off, then the application will service the query requests, when it comes to power. 4 Application Security Such an application is not of much use, if it is not secure and cannot protect itself from outside attckers. To counter such attacks, we have provided 4-level security in the application. There is only one entry point to the settings of application restricted by the master password, so no one without having the master password can tamper with the settings of the application. There is facility to set SMS password. On setting it, the application serves only those queries, which come alongwith the SMS password. We have also provided flexibility to the user, so that he can enable or disable SMS password, depending upon his needs. Keeping all these passwords are useless if the app related messages go to the inbox of the receiving Android phone, in such a case, others can misuse the application. So, in to tackle this, the application prevents the broadcast of the application specific messages to other apps like inbox and sms notification. ChangePwd:<master password>:<new password> Moreover, the user can specify some specific numbers, which forces the app to service the requests if queries come from these numbers only. 5 Application Efficiency It is a fact that the Android mobile devices consume a lot of power. So, the battery can drain out pretty quickly, if runs a highly CPU-oriented application. This application has been developed keeping in mind the power constraints associated with the Android phones. Since, the entire application is a broadcast receiver, so it wakes up only when a new SMS arrives. If the message does not belong one of the application related messages, then it goes to sleep again. Otherwise, it fires an appropriate light-weight IntentService which terminates itself automatically once the task is complete. Moreover, there is no Data cache, and application data is only 4 KB. References [1] [2] rvo.plpro&feature=search result [3] /BroadcastReceiver.html [4] Also, if the thief knows that such an application is installed on the phone, then also he will not able to uninstall it, as it can be only be uninstalled on providing the master password. Also, we have provided the facility to change the SMS password by sending a message from an ordinary mobile. It requires the master password to sent alongwith the command and the corresponding command is: 4

5 Figure 1: App cannot be uninstalled as uninstall button is disabled, need to enter master password to unistall Figure 2: App can be uninstalled 5

6 Figure 3: SMS password is not enabled in the application Figure 4: App flexibility to select/deselect different features 6

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature

MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-4 E-ISSN: 2347-2693 MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature Neelam Salia

More information

NQ Mobile Security Frequently Asked Questions (FAQs) for Android

NQ Mobile Security Frequently Asked Questions (FAQs) for Android NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running

More information

Junos Pulse for Google Android

Junos Pulse for Google Android Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks

More information

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.

3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources. G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

-------------------------------------------------------------------------------------------------------------

------------------------------------------------------------------------------------------------------------- Fast Facts: On average, around one-third of employees travel regularly for work Just one in three companies, however, prepares for these trips by implementing security guidelines and other measures. This

More information

Are free Android virus scanners any good?

Are free Android virus scanners any good? Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)

More information

Using the Push Notifications Extension Part 1: Certificates and Setup

Using the Push Notifications Extension Part 1: Certificates and Setup // tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

Using your Encrypted BlackBerry

Using your Encrypted BlackBerry Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display

More information

User Manual. Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later

User Manual. Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later User Manual Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later 1 Table of Contents 1. Security Warnings...3 2. Installation...3 3. Configuration...4 4. Usage...5 2 Security Warnings -

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access

International Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

F-Secure Mobile Security. Android

F-Secure Mobile Security. Android F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from

More information

User's Guide. Copyright 2014 Bitdefender

User's Guide. Copyright 2014 Bitdefender User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced

More information

T1 QUICK START GUIDE

T1 QUICK START GUIDE T1 QUICK START GUIDE 1 T1 Quick Start Guide: English Microphones Indicator Light Multi- Function Button (MFB) Charging Port 2 Charge Your T1 Your T1 has been given an initial partial charge to get started,

More information

Spylamp2 Bicycle GPS Tracker Instruction Manual

Spylamp2 Bicycle GPS Tracker Instruction Manual Spylamp2 Bicycle GPS Tracker Instruction Manual Version 2.0.0.5 1 Getting Started Your GPS tracker is controlled via text message. You will need your mobile phone and a SIM card (2G) with credit on it

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

avast! Mobile Security User Guide avast! Mobile Security User Guide

avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...

More information

Mobile Operating Systems & Security

Mobile Operating Systems & Security Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Vodafone Guardian app User Guide

Vodafone Guardian app User Guide Vodafone Guardian app User Guide With Vodafone Guardian, you and your child can select the best smartphone settings to support safe and responsible mobile use at any age. What is Vodafone s Guardian app?

More information

GS503 Elderly Phone. User Manual. This model is with Location-based service, SIM with GPRS is required

GS503 Elderly Phone. User Manual. This model is with Location-based service, SIM with GPRS is required GS503 Elderly Phone User Manual This model is with Location-based service, SIM with GPRS is required 1. Phone overview 2. Definition of Keys Buttons Function Dial/Confirmation Dial Key Pick up At standby

More information

Quick Start Guide: Iridium GO! Advanced Portal

Quick Start Guide: Iridium GO! Advanced Portal Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...

More information

Pakhtunkhwa, Pakistan Email: 1 salman@awkum.edu.pk

Pakhtunkhwa, Pakistan Email: 1 salman@awkum.edu.pk VFAST Transitions on Software Engineering http://www.vfast.org/index.php/xxx@ 2015 ISSN(e): 2309-3978, ISSN(p) 2411-6246 Volume 7, Number 02, July-August, 2015 pp. 12-17 A RESEARCH ON MOBILE APPLICATIONS

More information

A Report on. One week Short Term Training Program On

A Report on. One week Short Term Training Program On A Report on One week Short Term Training Program On Recent trends in Android Applications Development and Advancements in Brain Machine Technology 5 th January to 9 th January 2015 Organized by Electronics

More information

QUICK INSTALLATION GUIDE ACTIVATE

QUICK INSTALLATION GUIDE ACTIVATE ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.

More information

Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2

Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Assistant Professor B.E. Student Computer Department Computer Department Shree Swami Atmanand Saraswati

More information

Mobile Device Management Version 8. Last updated: 16-09-14

Mobile Device Management Version 8. Last updated: 16-09-14 Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Sprint WeGo User Guide

Sprint WeGo User Guide Sprint WeGo User Guide [UG template version 14a] [Sprint_OEM_S155_ug_en_140305_d1] i Table of Contents Get Started... 4 Your Phone at a Glance... 4 Set Up Your Phone... 5 Activate Your Phone... 8 Sprint

More information

Mobile i-phonenet User Guide Android

Mobile i-phonenet User Guide Android Chapter 1 : Getting Started 1. Client Download and Installation Step 1: Go to Google Play on your PC or your android device and search for < Mobile ipn >. Step 2: Download and install Mobile ipn. Note

More information

U.S. Cellular Mobile Data Security. User Guide Version 00.01

U.S. Cellular Mobile Data Security. User Guide Version 00.01 U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4

More information

IsItUp Quick Start Manual

IsItUp Quick Start Manual IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com

More information

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT

Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization

More information

MOBILE BANKING. Why should I use Mobile Banking?

MOBILE BANKING. Why should I use Mobile Banking? MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data

More information

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app.

The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app. PayClip User Guide The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Contents Getting started made easy 2 Information for Merchants....................................................2

More information

User Guide. Memo S580. www.poshmobile.com

User Guide. Memo S580. www.poshmobile.com User Guide Memo S580 www.poshmobile.com Welcome to POSH S580 Memo Quick Guide S580 is designed with Android system, support dual Sim and dual stand-by. Except for the standard communication function, it

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

NetSafe Smartphone Security Report 2014

NetSafe Smartphone Security Report 2014 NetSafe Smartphone Security Report 2014 Smartphone Security Report 2014 Smartphone Security Advice 1. Lock your smartphone Use a pin, password, complex swipe or other option to restrict access to your

More information

Mobile Connect for USA Mobility Pagers for iphone

Mobile Connect for USA Mobility Pagers for iphone User Guide for Mobile Connect for USA Mobility Pagers for iphone Amcom Software, Inc. Copyright Mobile Connect 3.5 Document Version 1.0 Last Saved Date: September 19, 2013 Copyright 2003-2013 Amcom Software,

More information

Key words: GPS, Geocoder, WWO Server, Google Server, Android, RAM, Mobile Equipment, OS.

Key words: GPS, Geocoder, WWO Server, Google Server, Android, RAM, Mobile Equipment, OS. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Weather Monitoring

More information

SMS Alarm Messenger. Setup Software Guide. SMSPro_Setup. Revision 090210 [Version 2.2]

SMS Alarm Messenger. Setup Software Guide. SMSPro_Setup. Revision 090210 [Version 2.2] SMS Alarm Messenger SMSPro_Setup Revision 090210 [Version 2.2] ~ 1 ~ Contents 1. How to setup SMS Alarm Messenger?... 3 2. Install the SMSPro_Setup software... 5 3. Connection Type... 6 4. Connection Port

More information

Sophos Mobile Control User guide for Android. Product version: 4

Sophos Mobile Control User guide for Android. Product version: 4 Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up

More information

MDM User Guide June 2012

MDM User Guide June 2012 June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

mobile uc client End user guide

mobile uc client End user guide mobile uc client End user guide 1 Mobile Unified Communications User Guide About Mobile UC Currently, the following five Droid Phones are supported for Mobile UC: + Droid X + Droid X2 + Droid 2 Global

More information

OfficeSuite Simplicity Phone and System Features. General Settings. Phone status (Icon is i ) Time and date (The Settings icon is a wrench)

OfficeSuite Simplicity Phone and System Features. General Settings. Phone status (Icon is i ) Time and date (The Settings icon is a wrench) OfficeSuite Simplicity Phone and System Features General Settings Phone status (Icon is i ) Press OK and use the navigation keys to select the Status menu. Select item SIP Account Status to view the associated

More information

How to Remotely Track Any Lost Smartphone, Tablet, or PC

How to Remotely Track Any Lost Smartphone, Tablet, or PC How to Remotely Track Any Lost Smartphone, Tablet, or PC Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don t wait until you ve l hardware to think about this

More information

LA-9011 GSM/GPS Tracker User Manual

LA-9011 GSM/GPS Tracker User Manual LA-9011 GSM/GPS Tracker User Manual GSM/GPS Tracker A GSM and GPS Tracking solution to locate and track the whereabouts of your vehicle in real time via the Internet on a computer or Smart phone. The device

More information

Sophos Mobile Control User guide for Android

Sophos Mobile Control User guide for Android Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control

More information

TABLE OF CONTENTS. Legend:

TABLE OF CONTENTS. Legend: user guide Android Ed. 1.1 TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 Indicators on the top tool bar... 5 1.2 First control bar... 7 1.3 Second control bar... 7 1.4 Description of the icons in the main

More information

Managing Mobility. 10 top tips for Enterprise Mobility Management

Managing Mobility. 10 top tips for Enterprise Mobility Management Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind

More information

Q3 USER GUIDE. Read Me to Get the Most Out of Your Device...

Q3 USER GUIDE. Read Me to Get the Most Out of Your Device... Q3 USER GUIDE Read Me to Get the Most Out of Your Device... TO GET STARTED 1. Turn The Q3 On 2. Put It On 3. Listen In Model: Q3 Contents Charge Your Earpiece 6 Wearing the Q3 7 Pair Your Earpiece 7 Use

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

Mobile App Testing Guide. Basics of Mobile App Testing

Mobile App Testing Guide. Basics of Mobile App Testing 2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and

More information

User Guide for the Orchid Key Phones KP416 & KP832

User Guide for the Orchid Key Phones KP416 & KP832 User Guide for the Orchid Key Phones KP416 & KP832 Contents Page Introduction 2 Setting Up 2 Setting Date & Time 2 Making & Answering Calls 2 Call Pick 3 Call Transfer 3 Calls On Hold 3 Caller Display

More information

Quick Start Guide. Version R9. English

Quick Start Guide. Version R9. English Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Final Year Project Interim Report

Final Year Project Interim Report 2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

Bell Mobile Device Management (MDM)

Bell Mobile Device Management (MDM) Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Feature List for Kaspersky Security for Mobile

Feature List for Kaspersky Security for Mobile Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance

More information

Battery Wall Controller. Manual

Battery Wall Controller. Manual Battery Wall Controller Manual 009303 Battery Wall Controller Manual Quick Start... 2 Product Description... 3 Installation Guidelines... 3 Behavior within the Z-Wave Network... 4 Operating the Device...

More information

CLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE

CLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE CLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE B.Dhivya 1 G.Lakshmiprabha 2 P.Nivethitha 3, K.Kala 4 123 UG Scholar, 4Assistant Professor 1234 Department of Computer Science and Engineering

More information

Android OS Mobile Dialer Application Manual. Make low cost Internet calls from Android Smartphone or Tablet

Android OS Mobile Dialer Application Manual. Make low cost Internet calls from Android Smartphone or Tablet Android OS Mobile Dialer Application Manual Make low cost Internet calls from Android Smartphone or Tablet Android Mobile Dialer Application 1. Introduction... 2 2. Signup... 3 3. Download & Setup... 5

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

TAXI-TRACK. Taxi tracking, availability system. (for taxi passengers / customers)

TAXI-TRACK. Taxi tracking, availability system. (for taxi passengers / customers) TAXI-TRACK Taxi tracking, availability system (for taxi passengers / customers) The TAXI-TRACK system is an integrated solution that provides to passengers the ability to locate 10 of the nearest available

More information

7 Ways your Fax Machine is Putting You at Risk for Identity Theft. How is your company protecting private information in everyday transactions?

7 Ways your Fax Machine is Putting You at Risk for Identity Theft. How is your company protecting private information in everyday transactions? WHITEPAPER 7 Ways your Fax Machine is Putting You at Risk for Identity Theft How is your company protecting private information in everyday transactions? 2010 DPD International All Rights Reserved. This

More information

Mobile Android App User Guide

Mobile Android App User Guide Mobile Android App User Guide Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks,

More information

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted

More information

Help Document for utsonmobile - Android Phone (Paperless Ticket)

Help Document for utsonmobile - Android Phone (Paperless Ticket) Help Document for utsonmobile - Android Phone (Paperless Ticket) Unreserved Ticketing System is the predominant ticketing system on Indian Railways in terms of the number of passengers it serves. As of

More information

CSIS0801 - Final Year Project 2013-2014. Mobile Application Taxi Express. Interim Report

CSIS0801 - Final Year Project 2013-2014. Mobile Application Taxi Express. Interim Report CSIS0801 - Final Year Project 2013-2014 Mobile Application Taxi Express Interim Report Group Number : 13012 Supervisor : Dr. C. Wu Group Members : Fu Chun Wai (3035011539) Tang Casey Wing Yan (2011517307)

More information

1. Vehicle Security/Tracking Device

1. Vehicle Security/Tracking Device GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and

More information

Installation & User Manual

Installation & User Manual Installation & User Manual 1 User Manual: 1. Safety Please read the simple rules, and non-compliance with these rules may be dangerous or illegal. Be sure to go through the entire user manual for more

More information

Vehicle Monitoring Quick Reference Guide

Vehicle Monitoring Quick Reference Guide Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined

More information

SysAid MDM User Guide for Android

SysAid MDM User Guide for Android SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction

More information

3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e

3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e User Manual Generali Mobile application iphone и Android 1. MOBILE APPLICATION INSTALLMENT Generali Mobile application can be used after installation from the application markets Play Store (Android) and

More information

Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net

Super Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home

More information

Rojone BikeBANDITTM Personal Vehicle Tracking System

Rojone BikeBANDITTM Personal Vehicle Tracking System Rojone BikeBANDITTM Personal Vehicle Tracking System User s Manual Operation & Use for Global Positioning System Personal Vehicle Monitor Model # BKBPVM-2003 Patent Australia # 40291 Manual Issue : August

More information

Encrypted Email Services

Encrypted Email Services Encrypted Email Services Version 2.1 General Level Instructions HIPAA Compliant Solution for Secured Communications via Email 2012-2013 Page 1 of 13 Table of Contents 1. Introduction 1.1 Description 1.2

More information

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies

User Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies Genius GPS / GSM 810 Real Time GPS Tracker User Manual Android App Download Iphone App Download www.geniuscaralarm.com 1 Genius GPS / GSM 810 Real Time GPS Tracker Welcome to use this real time car GPS

More information

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES IMPORTANT SUPPORT RESOURCES Subscriber Portal Go to https://portal.coxhomelife.com to log in to your account and manage your system features online. Online Support Go to www.cox.com/homelifesupport to

More information

Your HTC Desire What s new?

Your HTC Desire What s new? Your HTC Desire What s new? HTC Desire What you ll find in this guide HTC Desire uses the latest Android 2.2 (Froyo) platform which makes your mobile experience more exciting and engaging than ever. Whether

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Avira Antivirus Security. HowTo

Avira Antivirus Security. HowTo Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5

More information

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud

Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3. What

More information

SmartCart Design Description

SmartCart Design Description SmartCart Design Description Version 1.0 Revision History Date Version Description Author 2011-10-20 0.1 Initial draft SmartCart Team 2011-24-10 0.8 Revised draft SmartCartTeam 2011-27-10 0.9 Revised draft

More information

How To Protect Your Smartphone From Attack From A Hacker (For Business)

How To Protect Your Smartphone From Attack From A Hacker (For Business) White paper Mobile security issues in a corporate environment Be Ready for What s Next. Mobile security issues in a corporate environment The smartphone market is accelerating at a rapid rate. According

More information

Can I transfer money to accounts I have at other Financial Institutions through Mobile Banking? No, we don t currently offer this service.

Can I transfer money to accounts I have at other Financial Institutions through Mobile Banking? No, we don t currently offer this service. Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage

More information

Exchange Administrators will be able to use a more secure authentication mechanism compared with username and password

Exchange Administrators will be able to use a more secure authentication mechanism compared with username and password Summary Product: Version: Mail for Exchange for Nokia Mail Symbian Anna Date: May 2011 What s New? Support for Certificate Based Authentication Exchange Administrators will be able to use a more secure

More information

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.

NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result

More information

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete

Management Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.

More information

Document Number: 13004.25-4.5.2-6/15/2012

Document Number: 13004.25-4.5.2-6/15/2012 Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo

More information

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.

Junos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc. Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Taxi Service Design Description

Taxi Service Design Description Taxi Service Design Description Version 2.0 Page 1 Revision History Date Version Description Author 2012-11-06 0.1 Initial Draft DSD staff 2012-11-08 0.2 Added component diagram Leon Dragić 2012-11-08

More information

Managing Conferences & Events using Mobile Apps

Managing Conferences & Events using Mobile Apps Managing Conferences & Events using Mobile Apps A RapidValue Solutions Whitepaper Contents Executive Summary... Which Platforms: Native or Web Based?... Important Features to Consider... Content Management

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Mobile i-phonenet User Guide iphone

Mobile i-phonenet User Guide iphone Chapter 1 : Getting Started 1. Client Download and Installation Step 1: Go to itunes and search for < Mobile ipn >. Step 2: Download and install Mobile ipn. te : Minimum Requirements : IOS 4 Singapore

More information

What Is BYOD? Challenges and Opportunities

What Is BYOD? Challenges and Opportunities Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device

More information

MiniPOS and BluePad-50 user manual

MiniPOS and BluePad-50 user manual MiniPOS and BluePad-50 user manual Welcome to MiniPOS application for mobile and card payments! +386 (30) 70 4444 +386 (30) 70 5555 sales@intech.si www.paywiser.si Slovenska ulica 54 Ljubljana, Slovenija

More information