Mobile Computing(CS634) Group 15 SMS controlled Security & Life Saving Application on Android
|
|
- Annis Baker
- 8 years ago
- Views:
Transcription
1 Mobile Computing(CS634) Group 15 SMS controlled Security & Life Saving Application on Android Amitesh Maheshwari Dept. of CSE Ravi Ranjan Dept. of CSE Supervisor: Dr. R. K. Ghosh Indian Institute of Technology, Kanpur Project Report April 13, 2013 Abstract In this project, we have developed a security cum lifesaving application for the Android mobile devices. This project provides the user with various facilities, which can be availed by him/her via any ordinary phone, which has the SMS(messaging) facility. The application provides various security and anti-theft features for the android device. The application, in itself, is also very much secure and provides four level security. As power consumption has always been a major issue with the Android mobiles, so we also kept in mind the power constraints of the device and tried to make the application as efficient and lightweight as possible. 1 Introduction Nowadays, a majority of the world s population use the Android phones or any other kind of smartphones and also, they carry it with them all the time. This mobile phone is so small and powerful that it can also be used for life saving purpose. Moreover, we perform huge amount of monetary transactions via these android phones. In such a scenario, if the phone is lost, then thief can quickly misuse it and put us into deep trouble. Therefore, for such a powerful device, there has to be a powerful and ultrasecure application, which will allow the protection of the user as well as the mobile device. In this project, we have developed such an application, which will provide the user with a variety of secure features without compromising on the efficiency of the Android device. 2 Previuos Work There are applications available in Android market, which cater to the issue of security of Android mobile devices. Examples of such applications are MobileProtect Pro[1] by KloudData, PhoneLocator Pro[2] etc. But, these applications are highly UI oriented, thus consuming a lot of Android battery. They require user registration, thus adding an extra burden for the users. Only one password is allowed in their case, which can be only changed if you have the access to the application on your Android mobile device. Moreover, the messages related to the application are relayed to inbox and sms notification, so an attacker can easily misuse the application. Also, in these applications, any body can uninstall the application, no protection is provided for this. 3 Features and their use cases We have broadly classified the various features of the application into three categories: Remote Call/Contact data access Life Saving Features System Features 1
2 3.1 Remote Call/Contact data access Fetch the contact by name from the phonebook Using this feature, the user can fetch any contact by name stored in the phonebook of his/her Android phone by sending a message from any ordinary mobile phone. It does a partial string matching on the name of the contact sent via SMS and fetches all those contacts. Command- Contact:<person name> Use Cases: Supppose you want to get phone number of a neighbour, which is in your father s mobile phone, but he is not picking up the phone right now, then you can use it. This feature can be very helpful in a company or municipal corporation, where contacts of the employees, clients and services can be stored on any central Android device and users can get whenever they want Fetch a specified number of last incoming calls Using this feature, the user can fetch a certain number of incoming calls on his Android device by sending a message. We send the number of incoming calls to be fetched alongwith the message. Command- Incoming:<number of calls> Fetch a specified number of last outgoing calls Using this feature, the user can fetch a certain number of outgoing calls on his Android device by sending a message. We send the number of outgoing calls to be fetched alongwith the message. Command- Outcoming:<number of calls> Use Cases: Suppose your Android phone is lost and then one can use this command to fetch the recent outgoing calls to know that to which mobile numbers the thief has called from it. This can be very helpful in tracking down the device Fetch a specified number of last missed calls Using this feature, the user can fetch a certain number of missed calls on his Android device by sending a message. We send the number of missed calls to be fetched alongwith the message. Command- Missed:<number of calls> Use Cases: Suppose that you have left your Android phone at home and want to know that who have contacted you during that period, then you can pick up any ordinary phone and sent an SMS query to retrieve a list of last missed calls on your Android. This feature can also be useful incase the android phone is lost. 3.2 Life Saving Features Get the current location of phone Using the feature, one can get the current location of the Android phone by sending a message to it. At the time of the receipt of the query message by the application, if the Internet is working and gps is enabled in the android, then it will fetch the current nearest location of the android by querying the Google Maps API. If the Internet is not working, then it will only send the latituse and longitude of the current phone location. Command- Where Use Cases: Suppose a child is not picking up his/her phone for a long time and the parent is worried sick about him/her, using this command the parent can know his location. Also, if the phone is lost, then we can also use this command to locate the android device Get the nearest hospital from the current phone location Using this feature, one can get the name, address and telephone number of the nearest hospital that is located to that of the current android phone location. Similarly, as above, if the Internet is not working, then it will only send the latituse and longitude of the current phone location. Command- Hospital Use Cases: Suppose the Android phone user is caught in some accident or natural calamity and his/her parents want to know that their child is fine, but is not picking up the phone and Where command is showing the location, which is same as that of the accident, then they can get contact details of the nearby Hospital using the above command, which would be helpful in getting the whereabouts of the child. 2
3 3.2.3 Get the nearest police station from the current phone location Using this feature, one can get the name, address and telephone number of the nearest police station that is located to that of the current android phone location. Similarly, as above, if the Internet is not working, then it will only send the latituse and longitude of the current phone location. Command- Police Use Cases: This command can be used as an antitheft feature like if the android phone is lost, then using this command, we can get the contact details of the nearest police station and can contact them and tell them that phone is lost, which will help in retrieving the mobile phone quickly. Also, it can be used in case of an accident or any natural calamity as in the case of the previous Hospital query. 3.3 System Features Using these features, one can the change the state of the Android mobile device Puts the phone on silent mode Using this feature, one can put his Android phone into silent by sending an SMS command to it. Command- Silent Use Cases: Suppose you have left your Android phone at a place, where if it rings, it would create disturbance for the others and problems for you, but you cannot go to that place immediately, so this command, in such scenario, would prove to be very handy for you Makes the phone ring even if silent or vibrating mode Using this feature, one can make his Android phone ring at full volume by sending an SMS command to it. Once the mobile phone starts ringing, it will not stop until one cycle of its ringtone finishes, no matter what button you press on the mobile. Command- Ring Use Cases: Suppose you have kept your phone and forgot and also, it is currently in silent mode, then via this command, you can find your android phone by making it ring. Suppose your android device is stolen and thief has put it in silent mode, but you know that it is currently in the same room with you, then you can expose the thief by using this command. Also, he will not be able to do anything, as it would continue ringing until its cycle has finished Locks the phone if currently not locked without changing the current lock password Using this feature, the Android phone user can lock his phone as soon as the application receives the SMS corresponding to this command. It does not require the lock to be enabled in the android phone, but requires that a lock password be previously set on it. Since, this feature is a very much secured feature, so we do not want any user to get access of this feature. Therefore, this feature compulsarily requires a SMS password to be sent alogwith the query SMS. Command- <sms password>#locknow Use Cases: This feature can be used, in the case, if the phone is lost and you want your phone and its personal data to be protected from the thief, then we can lock the android phone then and there, by sending the above command to it Changes the lock password of the phone Using this command, the user can change the lock password of his/her android mobile phone. It does not require the lock to be enabled in the android phone and also does not require that a lock password be previously set on the phone. Also, this is a secured feature, so it compulsarily requires a SMS password to be sent alogwith the query SMS. Command- <sms password>#lock:<new password> Use Cases: This feature can be used, in the case, if the phone is lost and you want your phone and its personal data to be protected from the thief and in case, you doubt that he might be aware of the lock password of your android phone, then we can change its lock password and also lock the android phone then and there, by sending the above command to it Restores the phone to the factory settings Using this phone, the user can restore your Android phone to the factory settings. Since, this feature is an ultimate security feature, so it requires the SMS password as well as 3
4 the master password to be sent alongwith the query message. Command- <sms password>#wipe:<master password> Use Cases: This feature provides ultimate security of the personal data and contacts of your phone, if you do not want to take any risks. In that scenario, this feature provides the facility to restore the Android phone to its factory settings. This makes the phone completely useless for the thief. Another system feature of the application is that it is boot complete i.e. the application starts running on its own, when the phone is started. So, if a message is sent to it, when the phone was switched off, then the application will service the query requests, when it comes to power. 4 Application Security Such an application is not of much use, if it is not secure and cannot protect itself from outside attckers. To counter such attacks, we have provided 4-level security in the application. There is only one entry point to the settings of application restricted by the master password, so no one without having the master password can tamper with the settings of the application. There is facility to set SMS password. On setting it, the application serves only those queries, which come alongwith the SMS password. We have also provided flexibility to the user, so that he can enable or disable SMS password, depending upon his needs. Keeping all these passwords are useless if the app related messages go to the inbox of the receiving Android phone, in such a case, others can misuse the application. So, in to tackle this, the application prevents the broadcast of the application specific messages to other apps like inbox and sms notification. ChangePwd:<master password>:<new password> Moreover, the user can specify some specific numbers, which forces the app to service the requests if queries come from these numbers only. 5 Application Efficiency It is a fact that the Android mobile devices consume a lot of power. So, the battery can drain out pretty quickly, if runs a highly CPU-oriented application. This application has been developed keeping in mind the power constraints associated with the Android phones. Since, the entire application is a broadcast receiver, so it wakes up only when a new SMS arrives. If the message does not belong one of the application related messages, then it goes to sleep again. Otherwise, it fires an appropriate light-weight IntentService which terminates itself automatically once the task is complete. Moreover, there is no Data cache, and application data is only 4 KB. References [1] [2] rvo.plpro&feature=search result [3] /BroadcastReceiver.html [4] Also, if the thief knows that such an application is installed on the phone, then also he will not able to uninstall it, as it can be only be uninstalled on providing the master password. Also, we have provided the facility to change the SMS password by sending a message from an ordinary mobile. It requires the master password to sent alongwith the command and the corresponding command is: 4
5 Figure 1: App cannot be uninstalled as uninstall button is disabled, need to enter master password to unistall Figure 2: App can be uninstalled 5
6 Figure 3: SMS password is not enabled in the application Figure 4: App flexibility to select/deselect different features 6
MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature
International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-4 E-ISSN: 2347-2693 MOBITRACK: GPS Reminder, Location Tracker and Anti Theft Feature Neelam Salia
More informationNQ Mobile Security Frequently Asked Questions (FAQs) for Android
NQ Mobile Security Frequently Asked Questions (FAQs) for Android Introducing Mobile Security NQ Mobile Security protects your mobile device against viruses and malware, while keeping your system running
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More information3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
More informationplatforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential
Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.
More information-------------------------------------------------------------------------------------------------------------
Fast Facts: On average, around one-third of employees travel regularly for work Just one in three companies, however, prepares for these trips by implementing security guidelines and other measures. This
More informationAre free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
More informationUsing the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
More informationavast! Mobile Security User Guide avast! Mobile Security User Guide
avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...
More informationUsing your Encrypted BlackBerry
Using your Encrypted BlackBerry How do I change the Language on my BlackBerry? 1. On the Home screen or in a folder, click the Options icon. 2. Click Typing and Input > Language. 3. To change the display
More informationUser Manual. Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later
User Manual Gold Lock 3G Military Grade Encryption For Android OS 2.1 and Later 1 Table of Contents 1. Security Warnings...3 2. Installation...3 3. Configuration...4 4. Usage...5 2 Security Warnings -
More informationInternational Journal of Software and Web Sciences (IJSWS) www.iasir.net. GPS and GSM Based Database Systems for User Access
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
More informationF-Secure Mobile Security. Android
F-Secure Mobile Security Android F-Secure Mobile Security TOC 2 Contents Chapter 1: Installation...4 1.1 Installing...5 1.2 Activating...6 1.3 Configuring the product...7 1.4 Uninstalling the product from
More informationUser's Guide. Copyright 2014 Bitdefender
User's Guide Copyright 2014 Bitdefender Bitdefender Mobile Security User's Guide Publication date 2014.05.23 Copyright 2014 Bitdefender Legal Notice All rights reserved. No part of this book may be reproduced
More informationT1 QUICK START GUIDE
T1 QUICK START GUIDE 1 T1 Quick Start Guide: English Microphones Indicator Light Multi- Function Button (MFB) Charging Port 2 Charge Your T1 Your T1 has been given an initial partial charge to get started,
More informationSpylamp2 Bicycle GPS Tracker Instruction Manual
Spylamp2 Bicycle GPS Tracker Instruction Manual Version 2.0.0.5 1 Getting Started Your GPS tracker is controlled via text message. You will need your mobile phone and a SIM card (2G) with credit on it
More informationSophos Mobile Control user help. Product version: 6.1
Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6
More informationavast! Mobile Security User Guide avast! Mobile Security User Guide
avast! Mobile Security User Guide avast! Mobile Security User Guide Created by Trevor Robinson Avast Software October, 2012 1 avast! Mobile Security User Guide Contents Welcome to avast! Mobile Security...
More informationMobile Operating Systems & Security
Mobile Operating Systems & Security How can I protect myself? Operating Systems Android Apple Microsoft What do they do? operate smartphones, tablets, watches and other mobile devices includes touchscreens
More informationNorton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
More informationVodafone Guardian app User Guide
Vodafone Guardian app User Guide With Vodafone Guardian, you and your child can select the best smartphone settings to support safe and responsible mobile use at any age. What is Vodafone s Guardian app?
More informationGS503 Elderly Phone. User Manual. This model is with Location-based service, SIM with GPRS is required
GS503 Elderly Phone User Manual This model is with Location-based service, SIM with GPRS is required 1. Phone overview 2. Definition of Keys Buttons Function Dial/Confirmation Dial Key Pick up At standby
More informationQuick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
More informationPakhtunkhwa, Pakistan Email: 1 salman@awkum.edu.pk
VFAST Transitions on Software Engineering http://www.vfast.org/index.php/xxx@ 2015 ISSN(e): 2309-3978, ISSN(p) 2411-6246 Volume 7, Number 02, July-August, 2015 pp. 12-17 A RESEARCH ON MOBILE APPLICATIONS
More informationA Report on. One week Short Term Training Program On
A Report on One week Short Term Training Program On Recent trends in Android Applications Development and Advancements in Brain Machine Technology 5 th January to 9 th January 2015 Organized by Electronics
More informationQUICK INSTALLATION GUIDE ACTIVATE
ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.
More informationPhone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2
Phone Pal: Remote Mobile Access through Short Message Service Prof. Mitul K. Patel 1 Gadhiya Janki D. 2 Assistant Professor B.E. Student Computer Department Computer Department Shree Swami Atmanand Saraswati
More informationMobile Device Management Version 8. Last updated: 16-09-14
Mobile Device Management Version 8 Last updated: 16-09-14 Copyright 2013, 2X Ltd. http://www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationSprint WeGo User Guide
Sprint WeGo User Guide [UG template version 14a] [Sprint_OEM_S155_ug_en_140305_d1] i Table of Contents Get Started... 4 Your Phone at a Glance... 4 Set Up Your Phone... 5 Activate Your Phone... 8 Sprint
More informationMobile i-phonenet User Guide Android
Chapter 1 : Getting Started 1. Client Download and Installation Step 1: Go to Google Play on your PC or your android device and search for < Mobile ipn >. Step 2: Download and install Mobile ipn. Note
More informationU.S. Cellular Mobile Data Security. User Guide Version 00.01
U.S. Cellular Mobile Data Security User Guide Version 00.01 Table of Contents Install U.S. Cellular Mobile Data Security...3 Activate U.S. Cellular Mobile Data Security...3 Main Interface...3 Checkup...4
More informationIsItUp Quick Start Manual
IsItUp - When you need to know the status of your network Taro Software Inc. Website: www.tarosoft.com Telephone: 703-405-4697 Postal address: 8829 110th Lane, Seminole Fl, 33772 Electronic mail: Contact1@tarosoft.com
More informationFeature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
More informationMOBILE BANKING. Why should I use Mobile Banking?
MOBILE BANKING What is Mobile Banking? With Mobile Banking, you can access your account, conduct transfers, and pay and manage bills from any mobile device that has web browsing capabilities and a data
More informationThe easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Mobile Users... 2. Charging your PayClip. 2. Downloading the PayClip app.
PayClip User Guide The easy way to accept EFTPOS, Visa and MasterCard payments on the spot. Contents Getting started made easy 2 Information for Merchants....................................................2
More informationUser Guide. Memo S580. www.poshmobile.com
User Guide Memo S580 www.poshmobile.com Welcome to POSH S580 Memo Quick Guide S580 is designed with Android system, support dual Sim and dual stand-by. Except for the standard communication function, it
More informationSophos Mobile Control User guide for Apple ios. Product version: 4
Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set
More informationNetSafe Smartphone Security Report 2014
NetSafe Smartphone Security Report 2014 Smartphone Security Report 2014 Smartphone Security Advice 1. Lock your smartphone Use a pin, password, complex swipe or other option to restrict access to your
More informationMobile Connect for USA Mobility Pagers for iphone
User Guide for Mobile Connect for USA Mobility Pagers for iphone Amcom Software, Inc. Copyright Mobile Connect 3.5 Document Version 1.0 Last Saved Date: September 19, 2013 Copyright 2003-2013 Amcom Software,
More informationKey words: GPS, Geocoder, WWO Server, Google Server, Android, RAM, Mobile Equipment, OS.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Weather Monitoring
More informationSMS Alarm Messenger. Setup Software Guide. SMSPro_Setup. Revision 090210 [Version 2.2]
SMS Alarm Messenger SMSPro_Setup Revision 090210 [Version 2.2] ~ 1 ~ Contents 1. How to setup SMS Alarm Messenger?... 3 2. Install the SMSPro_Setup software... 5 3. Connection Type... 6 4. Connection Port
More informationSophos Mobile Control User guide for Android. Product version: 4
Sophos Mobile Control User guide for Android Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set up
More informationMDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationmobile uc client End user guide
mobile uc client End user guide 1 Mobile Unified Communications User Guide About Mobile UC Currently, the following five Droid Phones are supported for Mobile UC: + Droid X + Droid X2 + Droid 2 Global
More informationOfficeSuite Simplicity Phone and System Features. General Settings. Phone status (Icon is i ) Time and date (The Settings icon is a wrench)
OfficeSuite Simplicity Phone and System Features General Settings Phone status (Icon is i ) Press OK and use the navigation keys to select the Status menu. Select item SIP Account Status to view the associated
More informationHow to Remotely Track Any Lost Smartphone, Tablet, or PC
How to Remotely Track Any Lost Smartphone, Tablet, or PC Whether your device was stolen or simply lost, you can remotely track, lock, and wipe it. Don t wait until you ve l hardware to think about this
More informationLA-9011 GSM/GPS Tracker User Manual
LA-9011 GSM/GPS Tracker User Manual GSM/GPS Tracker A GSM and GPS Tracking solution to locate and track the whereabouts of your vehicle in real time via the Internet on a computer or Smart phone. The device
More informationSophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
More informationTABLE OF CONTENTS. Legend:
user guide Android Ed. 1.1 TABLE OF CONTENTS 1 INTRODUCTION... 4 1.1 Indicators on the top tool bar... 5 1.2 First control bar... 7 1.3 Second control bar... 7 1.4 Description of the icons in the main
More informationManaging Mobility. 10 top tips for Enterprise Mobility Management
Managing Mobility 10 top tips for Enterprise Mobility Management About Trinsic Trinsic is a new kind of business communications specialist, built from the ground up to help your organisation leave behind
More informationQ3 USER GUIDE. Read Me to Get the Most Out of Your Device...
Q3 USER GUIDE Read Me to Get the Most Out of Your Device... TO GET STARTED 1. Turn The Q3 On 2. Put It On 3. Listen In Model: Q3 Contents Charge Your Earpiece 6 Wearing the Q3 7 Pair Your Earpiece 7 Use
More informationSYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.
SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support
More informationMobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
More informationUser Guide for the Orchid Key Phones KP416 & KP832
User Guide for the Orchid Key Phones KP416 & KP832 Contents Page Introduction 2 Setting Up 2 Setting Date & Time 2 Making & Answering Calls 2 Call Pick 3 Call Transfer 3 Calls On Hold 3 Caller Display
More informationQuick Start Guide. Version R9. English
Mobile Device Management Quick Start Guide Version R9 English February 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationFinal Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
More informationFlexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
More informationBell Mobile Device Management (MDM)
Bell MDM Technical FAQs 1 Bell Mobile Device Management (MDM) Frequently Asked Questions INTRODUCTION Bell Mobile Device Management provides business customers an all in one device administration tool
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationBattery Wall Controller. Manual
Battery Wall Controller Manual 009303 Battery Wall Controller Manual Quick Start... 2 Product Description... 3 Installation Guidelines... 3 Behavior within the Z-Wave Network... 4 Operating the Device...
More informationCLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE
CLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE B.Dhivya 1 G.Lakshmiprabha 2 P.Nivethitha 3, K.Kala 4 123 UG Scholar, 4Assistant Professor 1234 Department of Computer Science and Engineering
More informationAndroid OS Mobile Dialer Application Manual. Make low cost Internet calls from Android Smartphone or Tablet
Android OS Mobile Dialer Application Manual Make low cost Internet calls from Android Smartphone or Tablet Android Mobile Dialer Application 1. Introduction... 2 2. Signup... 3 3. Download & Setup... 5
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationTAXI-TRACK. Taxi tracking, availability system. (for taxi passengers / customers)
TAXI-TRACK Taxi tracking, availability system (for taxi passengers / customers) The TAXI-TRACK system is an integrated solution that provides to passengers the ability to locate 10 of the nearest available
More information7 Ways your Fax Machine is Putting You at Risk for Identity Theft. How is your company protecting private information in everyday transactions?
WHITEPAPER 7 Ways your Fax Machine is Putting You at Risk for Identity Theft How is your company protecting private information in everyday transactions? 2010 DPD International All Rights Reserved. This
More informationMobile Android App User Guide
Mobile Android App User Guide Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks,
More informationTOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
More informationHelp Document for utsonmobile - Android Phone (Paperless Ticket)
Help Document for utsonmobile - Android Phone (Paperless Ticket) Unreserved Ticketing System is the predominant ticketing system on Indian Railways in terms of the number of passengers it serves. As of
More informationCSIS0801 - Final Year Project 2013-2014. Mobile Application Taxi Express. Interim Report
CSIS0801 - Final Year Project 2013-2014 Mobile Application Taxi Express Interim Report Group Number : 13012 Supervisor : Dr. C. Wu Group Members : Fu Chun Wai (3035011539) Tang Casey Wing Yan (2011517307)
More information1. Vehicle Security/Tracking Device
GPS Vehicle Tracking Devices 1. Vehicle Security/Tracking Device The size of a pack of cigarettes, the SuperGuardreports to you directly with alarm details and GPS location through SMS text messaging and
More informationInstallation & User Manual
Installation & User Manual 1 User Manual: 1. Safety Please read the simple rules, and non-compliance with these rules may be dangerous or illegal. Be sure to go through the entire user manual for more
More informationVehicle Monitoring Quick Reference Guide
Vehicle Monitoring Quick Reference Guide Powered by Delphi Welcome You re about to experience a powerful device that will deliver a new level of convenience and peace of mind with your vehicle. When combined
More informationSysAid MDM User Guide for Android
SysAid MDM User Guide for Android Table of Contents Introduction Enrolling Your Android Mobile Device in SysAid MDM Unenrolling Your Android Mobile Device from SysAid MDM Have Any Questions? Introduction
More information3. GENERALI MOBILE APPLICATION CONTENT. 3 P a g e
User Manual Generali Mobile application iphone и Android 1. MOBILE APPLICATION INSTALLMENT Generali Mobile application can be used after installation from the application markets Play Store (Android) and
More informationSuper Manager User Manual. English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net
Super Manager User Manual English v1.0.3 2011/06/15 Copyright by GPC Http://gpc.myweb.hinet.net How to launch Super Manager? Click the Super Manager in Launcher or add a widget into your Launcher (Home
More informationRojone BikeBANDITTM Personal Vehicle Tracking System
Rojone BikeBANDITTM Personal Vehicle Tracking System User s Manual Operation & Use for Global Positioning System Personal Vehicle Monitor Model # BKBPVM-2003 Patent Australia # 40291 Manual Issue : August
More informationEncrypted Email Services
Encrypted Email Services Version 2.1 General Level Instructions HIPAA Compliant Solution for Secured Communications via Email 2012-2013 Page 1 of 13 Table of Contents 1. Introduction 1.1 Description 1.2
More informationUser Manual. Genius GPS / GSM 810 Real Time GPS Tracker. Android App Download. Iphone App Download ENGLISH. Genius Advanced Technologies
Genius GPS / GSM 810 Real Time GPS Tracker User Manual Android App Download Iphone App Download www.geniuscaralarm.com 1 Genius GPS / GSM 810 Real Time GPS Tracker Welcome to use this real time car GPS
More informationGUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES
IMPORTANT SUPPORT RESOURCES Subscriber Portal Go to https://portal.coxhomelife.com to log in to your account and manage your system features online. Online Support Go to www.cox.com/homelifesupport to
More informationYour HTC Desire What s new?
Your HTC Desire What s new? HTC Desire What you ll find in this guide HTC Desire uses the latest Android 2.2 (Froyo) platform which makes your mobile experience more exciting and engaging than ever. Whether
More informationMobile Device Management Solution Hexnode MDM
Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode
More informationAvira Antivirus Security. HowTo
Avira Antivirus Security HowTo Table of contents 1. Introduction... 3 2. Supported Manufacturers... 3 3. Product Overview...4 4. Installation... 5 4.1 Installing the app... 5 4.2 Updating the app... 5
More informationProject Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud
Project Plan 365 Collaboration with Microsoft Project Files (MPP) in OneDrive cloud White Paper Housatonic Software - Project Plan 365 App 2014 Contents 1. Introduction... 3 2. Prerequisites... 4 3. What
More informationSmartCart Design Description
SmartCart Design Description Version 1.0 Revision History Date Version Description Author 2011-10-20 0.1 Initial draft SmartCart Team 2011-24-10 0.8 Revised draft SmartCartTeam 2011-27-10 0.9 Revised draft
More informationHow To Protect Your Smartphone From Attack From A Hacker (For Business)
White paper Mobile security issues in a corporate environment Be Ready for What s Next. Mobile security issues in a corporate environment The smartphone market is accelerating at a rapid rate. According
More informationCan I transfer money to accounts I have at other Financial Institutions through Mobile Banking? No, we don t currently offer this service.
Mobile Banking Questions and Answers How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text messaging and data usage
More informationExchange Administrators will be able to use a more secure authentication mechanism compared with username and password
Summary Product: Version: Mail for Exchange for Nokia Mail Symbian Anna Date: May 2011 What s New? Support for Certificate Based Authentication Exchange Administrators will be able to use a more secure
More informationNETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL.
NETWORK SERVICES WITH SOME CREDIT UNIONS PROCESSING 800,000 TRANSACTIONS ANNUALLY AND MOVING OVER 500 MILLION, SYSTEM UPTIME IS CRITICAL. Your Credit Union information is irreplaceable. Data loss can result
More informationManagement Website User Guide. SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete
Management Website User Guide SecureAnywhere AntiVirus SecureAnywhere Internet Security Plus SecureAnywhere Complete Copyright Management Website User Guide July, 2013 2012-2013 Webroot Software, Inc.
More informationDocument Number: 13004.25-4.5.2-6/15/2012
Mobile Android App User Guide Copyright 2012 icontrol Networks, Inc. All rights reserved. No reproduction in whole or in part without prior written approval. icontrol Networks, icontrol, and icontrol logo
More informationJunos Pulse Mobile Security Dashboard. User Guide. Release 4.2. February 2013 Revision 1.0. 2013, Juniper Networks, Inc.
Junos Pulse Mobile Security Dashboard User Guide Release 4.2 February 2013 Revision 1.0 2013, Juniper Networks, Inc. Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000
More informationTaxi Service Design Description
Taxi Service Design Description Version 2.0 Page 1 Revision History Date Version Description Author 2012-11-06 0.1 Initial Draft DSD staff 2012-11-08 0.2 Added component diagram Leon Dragić 2012-11-08
More informationManaging Conferences & Events using Mobile Apps
Managing Conferences & Events using Mobile Apps A RapidValue Solutions Whitepaper Contents Executive Summary... Which Platforms: Native or Web Based?... Important Features to Consider... Content Management
More information1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5
User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation
More informationAndroid App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationMobile i-phonenet User Guide iphone
Chapter 1 : Getting Started 1. Client Download and Installation Step 1: Go to itunes and search for < Mobile ipn >. Step 2: Download and install Mobile ipn. te : Minimum Requirements : IOS 4 Singapore
More informationWhat Is BYOD? Challenges and Opportunities
Wor k s pac es Mobi l i t ysol ut i ons Bl uewi r esol ut i ons www. bl uewi r e. c o. uk What Is BYOD? Challenges and Opportunities What is BYOD How Secure is Your BYOD Environment? Bring your own device
More informationMiniPOS and BluePad-50 user manual
MiniPOS and BluePad-50 user manual Welcome to MiniPOS application for mobile and card payments! +386 (30) 70 4444 +386 (30) 70 5555 sales@intech.si www.paywiser.si Slovenska ulica 54 Ljubljana, Slovenija
More information