ijiret siri hp a remote phone access for smartphone events

4

Click here to load reader

Category:

Documents


0 download

TRANSCRIPT

Page 1: IJIRET Siri HP a Remote Phone Access for Smartphone Events

ISSN: XXXX-XXXX Volume X, Issue X, Month Year

A Remote Phone Access for

Smartphone Events

Siri H.P

Dept of Computer Science and Engineering

BTL Institute of Technology

Bangalore, India

[email protected]

Abstract: Remote Phone Access is the eventual remote control

tool for the Android Smartphones event access. The

events like application actions such as your phone

may unlock when you are away and remove the stor-

age drive card on your Smartphone or making Blue-

tooth on for sending the any kind of personal data

from your Smartphone etc. Trust event logger will

give you the information of all these actions of what

happened and when. To perform all these operations

manually, it takes more time to access the device

information and also the physical presence of user is

needed. To overcome these problems we represent an

application called “Trust Event Logger”.

1. INTRODUCTION Android OS environment provide platform for us-

ers to develop their own applications for the

Smartphones. Android applications run in a sandbox.

This is a separated area of the system that does not

have access to the rest of the system’s resources, un-

less access permissions are explicitly conceded by the

user when the application is installed. Before in-

stalling an application, the Play Store displays all

required permissions. After reviewing the permis-

sions, the user can choose to accept or refuse the in-

stalling an application [1]. The Trust Event Logger is

an android application developed for the

Smartphones. There exist some situations where we

may want to access our devices wirelessly. For ex-

ample consider you may leave your Smartphone in

your home or any of the places in the case moving

somewhere very immediately. Those kinds of situa-

tions will make the Smartphone users to feel bad be-

cause the user has to go and get back the phone. This

may cause more time consumable or any kind of data

may be loss or accessed by unauthorized user of the

phone by the time you get the phone back. The Trust

Event Logger is designed for accessing the

Smartphone remotely wherever you are of the place.

This application will provide the Smartphone user to

feel free of condition about the above situations. The

application requires the internet access to remotely

access the Smartphone events. 2. SYSTEM DESIGN

ARCHITECTURE

The system design architecture will give you brief

introduction about the how the Trust Event Logger

application has been designed. The Trust Event Log-

ger consist of four components namely Remote Sys-

tem, Web Server, GCM (Google Cloud Messaging)

and the Smartphone Application.

REMOTE SYSTEM

The Remote System will provide the services for

user to access their Smartphone events from the re-

mote area by sending a request to the Smartphone

and retrieving the information with the use of inter-

net.

Page 2: IJIRET Siri HP a Remote Phone Access for Smartphone Events

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 2

Fig. 1 The Trust Event Logger Architecture.

WEB SERVER

The Web Server provides the server facility to the

user to store their Smartphone details and it also acts

an intermediate layer to serve the responses from the

Smartphone to the remote system.

GCM (Google Cloud Messaging)

GCM (Google Cloud Messaging) is service provid-

ed to the android developer to send the data from the

web server to the Trust Event Logger application.

The GCM will generate the Registration ID for the

user application, using the Register Id the user can

able to get the response from the server.

MOBILE APPLICATION

The Trust Event Logger application will provide

response to the user request about the particular

events successfully. The events may include like re-

moved media, Bluetooth on or off, battery percentage

and phone is unlock or not etc.

3. SYSTEM IMPLEMENTA-

TION

The implementation of the above system design

involves three major modules, which are Smartphone

Application Module, Communication Software Mod-

ule and the Remote Data Retrieval Software Module.

A. SMARTPHONE APPLICA-

TION MODULE

The Smartphone application module which includes

all the Smartphone events like battery power, SD

card, removed media, Wi-Fi, Bluetooth and ring

mode actions etc. this application is used to get these

events action immediately from the remote area using

internet of Wi-Fi facility. This application requires

some of the android packages to get the data and re-

spond to the remote system. Once the application has

implemented, run the application and make sure you

have internet or Wi-Fi connection in the Smartphone.

B. COMMUNICATION MODULE The communication module provides the

Smartphone user to get the access of Smartphone

from the remote place. This module require user to

create an account to register their Smartphone appli-

cation with application website. The Smartphone

registration can be done by using the Smartphone

IMEI number or using device name. The web server

will send a verification ID to the Smartphone for the

verification of the Smartphone details. Once the veri-

fication is done, the server identifies each device that

has registered to retrieve Smartphone events from the

remote area.

C.REMOTE DATA RETRIEVAL

SOFTWARE MODULE The remote data retrieval module helps the

Smartphone user to retrieve their Smartphone events

details from the remote system. This module requires

user to login with the application website. Once the

login has done successfully, the user can able to se-

lect the device using the device name or IMEI num-

ber to send a request to the Smartphone. There will

be a list of event functions, the user can select with

their own interest to retrieve the details by single

event or complete details of the Smartphone. By

choosing particular function the notification of re-

quested data has been sent to the Smartphone through

the GCM service, the Smartphone will provide the

response to the user request through the web server

successfully.

4. EXPERIMENTAL

RESULTS

A. USER LOGIN PAGE

Page 3: IJIRET Siri HP a Remote Phone Access for Smartphone Events

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year

3

Fig. 2 Smartphone User Login Page

B. ADDING THE DEVICE

Fig. 3 Add the Device to Register

C. DEVICE VERIFICATION

Fig. 4 Successful Verification of Device

D. CHOOSE THE DEVICE AND

FUNCTIONS

Fig. 5 View Details By Selecting Device and the Function.

E. RETRIEVE THE DATA

Fig. 6 Complete Event Details of Smartphone

5. CONCLUSION The system presented above can be helpful for all

Smartphone users. It saves man power and time con-

sumption by providing a remote access to the

Smartphone. The Trust Event Logger application will

not only retrieve the data from the remote place, it

will know you whether the Smartphone is used by

unauthorized persons or not by knowing the event

actions. It also allows multiple users to use multiple

Smartphone to retrieve data from the remote place.

Future design is to include the function like word,

gallery or any Smartphone data from the remote

place.

6. REFERENCES [1]http://www.androiddevelop.com

[2] Jaya Bharathi chintalapati,” Remote computer

access through Android mobiles” IJCSI International

Journal of Computer Science Issues,Vol. 9, Issue 5,

No 3, September 2012 ISSN (Online): 1694-0814.

[3] Ajit Kotkar,” Android Based Remote Desktop

Page 4: IJIRET Siri HP a Remote Phone Access for Smartphone Events

International Journal of Innovatory research in Engineering and Technology - IJIRET

ISSN: XXXX-XXXX Volume X, Issue X, Month Year 4

Client” International Journal of Innovative Research

in Computer and Communication Engineering. Vol.

1, Issue 2, April 2013 ISSN (Print): 2320 – 9798

ISSN (Online): 2320 – 9801.

[4] Prof. P.L.Ramteke, Dr. D.N.Choudhary,” Smart

Phone Access, Control & Security: A Survey” Inter-

national Journal of Emerging Technology and Ad-

vanced Engineering Website: www.ijetae.com (ISSN

2250-2459, Volume 2, Issue 6, June 2012).

[5] Anjumara Inamdar, Heena Aggarwal, Sayali Ka-

dam, Mayuri Kadhane, COMPDROID -Remote

Desktop Access through Android Mobile Phone In-

ternational Journal of Science and Modern Engineer-

ing (IJISME) ISSN: 2319-6386, Volume-2, Issue-1,

December 2013.

[6] Blase Ur Carnegie Mellon University-

[email protected], Jaeyeon JungMicrosoft Research

[email protected], Stuart SchechterMicrosoft

Research [email protected]” The Current State of

Access Control for Smart Devices in Homes” Work-

shop on Home Usable Privacy and Security (HUPS)

2013, July 24–26,2013, Newcastle, UK.

[7] Cheng-Lin Tsao, Sandeep Kakumanu, and

Raghupathy Sivakumar, “SmartVNC: An Effective

Remote Computing Solution for Smartphones” Mo-

biCom’11, September 19–23, 2011, Las Vegas, Ne-

vada, USA.