Preview

Cell Phone Theft Indication

Satisfactory Essays
Open Document
Open Document
20840 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cell Phone Theft Indication
Cell phone theft indicator

Index

1. Abstract 2. Description 3. Introduction a. Brief introduction of project b. Block diagram c. Block required d. Hardware required e. Software required 4. Power supply a. Introduction b. Functions and Operation c. Design and explanation d. Power consumption table e. Circuit diagram 5. GSM module a. Functions b. About GSM mobile 6. Max 232 a. Functions b. Operation c. Futures d. Pin details e. Connection diagram 7. Micro controller a. Functions b. Operation c. Futures d. Pin details e. Connection diagram 8. Over all circuit design 9. Project specification 10. Conclusion? 11. Reference?

Abstract: To avoid cell phone theft, this indicator is used. While theft, this cell phone automatically sends SMS to our familiar cell phone number.

Description: By our careless or unfortunately some time our cell phone thefts. It makes big problem to many ways like we are loss several contract numbers and also we are loss our money. So avoid this situation we are designed and developed this cell phone theft identification project. By using our concept, we can easily identify the theft person. Now we are developed the demo level project by using GSM module and Microcontroller. We are not able to reprogram the cell phone for that we are used GSM module and Microcontroller. Whenever switched ON the cell phone, at the same time it will checks the SIM number with previous SIM number. If it is not matching means it will send SMS to particular cell phone (our believing person cell) and also after change the SIM the theft person can be call some cell phone. These cell numbers is also sent to our believing person cell.

3. Introduction

Brief explanation of project: In this fast moving world,

You May Also Find These Documents Helpful

  • Good Essays

    Business & Admin Level 2

    • 2181 Words
    • 9 Pages

    | This is used to leave a message if nobody is there to answer the phone.…

    • 2181 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    With all of the latest hullabaloo about cell phones being used as bugging devices, you may be feeling a bit creeped out at the prospect of being monitored without your knowing it. Although some cell phones can be remotely programmed, most modern cell phones would require physical access to your phone to tamper with it. Luckily, when cell phones are transmitting, certain tell-tale signs can be a dead giveaway that your phone is being monitored.…

    • 464 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Expensive mobile phone handsets are desirable items, and so unfortunately are at risk from theft. Children and young people may be particularly vulnerable to such crime.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cell Phone Privacy

    • 655 Words
    • 3 Pages

    A. Whenever you use your cell phone, you are being tracked. Whether you are using an app or connecting to Wi-Fi, your phone company knows where you are and what you are doing.…

    • 655 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Mobile phones can be easily lost or stolen. It is a good idea to set up a PIN lock on your…

    • 1176 Words
    • 6 Pages
    Good Essays
  • Good Essays

    cell phone privacy

    • 814 Words
    • 4 Pages

    Our cellphones today are just devices for spying on people across the country. The government looks in on phone records, text records, social media, and mostly everything on our cellular device. The things the government can do with cell phones are crazy as they can track our every move. Since the beginning of cellphones, the government has been tracking them and invading everyone’s privacy.…

    • 814 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Source 1 HTMT’s mission is to develop unique, flexible, world-class customer solutions for our clients through personal collaboration,…

    • 5363 Words
    • 22 Pages
    Powerful Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Digital Evidence

    • 342 Words
    • 2 Pages

    Information stored inside mobile phones such as phone numbers, calendar entries, text messages can be manipulated by employees or any personnel to commit crimes such as telemarketing fraud, pornography, stealing of company’s information or GPS location, etc. For example, a message was retrieved from a mobile phone which helped to acquit Patrick Lumumba in the murder of Meredith Kercher. (Trutv, n.d.).…

    • 342 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Ruff Ryders

    • 724 Words
    • 3 Pages

    The most popular electronic device that is found in almost every single individuals hand in North America is a cell phone. People are dependent on it for almost every minute of the day, since technology has reached to a point where we can do absolutely anything with this magical wonder. They are used in urgent situations, along with helping people keep in touch with their loved ones. Overall, this is a remarkable device with many of its features to come in handy in everyone’s life.…

    • 724 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    carjack

    • 8399 Words
    • 34 Pages

    message is sent by the phone to a cellular shield. The cellular shield is a device that…

    • 8399 Words
    • 34 Pages
    Powerful Essays
  • Good Essays

    Identity Theft

    • 1418 Words
    • 6 Pages

    “People must be vigilant in protecting their identities” this is the argument that the police department uses to be able to get personal information of people from their cellphones. Unfortunately, as long as identity theft is a profitable venture, it will not disappear. The only way consumers and businesses can deal with it is to learn how to prevent it and then take those preventative measures. The most important action anyone can take to prevent against identity theft is to be aware of how personal or financial information is disseminated and the ways in which such information is vulnerable to misuse.…

    • 1418 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Agile Logistics

    • 458 Words
    • 2 Pages

    Agile Logistics, a Singapore based warehousing and logistics specialist, is a well-recognized third-party logistics (3PL) provider. Agile Logistics has the know-how to power their customers’ supply-chain - delivering intelligent solutions that streamline efficiencies and boost their customers’ bottom line.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Substation

    • 9545 Words
    • 39 Pages

    As we have seen many types of remote controls like Infra-red controlled, RF controlled, DTMF controlled etc. The present model is also intended to control devices using GSM technology i.e. just by sending code (containing numerical numbers) to the appliance/devices status. So the present project model can be used in the substations, homes, industries etc. In substations feeders are located which carry the power close to the…

    • 9545 Words
    • 39 Pages
    Powerful Essays
  • Good Essays

    Snatch Theft

    • 252 Words
    • 2 Pages

    Next point is,individu must avoid themself from go out at night especially when you are alone.This is because the snatch theft will have a big chance to snatch at night.At night,there will be no people walk and go out.So,there are no one can help the victims when they are being snatch.…

    • 252 Words
    • 2 Pages
    Good Essays

Related Topics