Kuppusamy et al., 2012 - Google Patents
A model for remote access and protection of smartphones using short message serviceKuppusamy et al., 2012
View PDF- Document ID
- 7747390933707234006
- Author
- Kuppusamy K
- Aghila G
- et al.
- Publication year
- Publication venue
- arXiv preprint arXiv:1203.3431
External Links
Snippet
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as well as provides options to access a smartphone through …
- 238000005516 engineering process 0 description 15
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72563—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances
- H04M1/72572—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status with means for adapting by the user the functionality or the communication capability of the terminal under specific circumstances according to a geographic location
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/72—Substation extension arrangements; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selecting
- H04M1/725—Cordless telephones
- H04M1/72519—Portable communication terminals with improved user interface to control a main telephone operation mode or to indicate the communication status
- H04M1/72522—With means for supporting locally a plurality of applications to increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
- H04M1/677—Preventing the dialling or sending of predetermined telephone numbers or selected types of telephone numbers, e.g. long distance
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kuppusamy et al. | A model for remote access and protection of smartphones using short message service | |
US11641583B2 (en) | Methods and systems for addressing unreported theft or loss of mobile communications devices | |
US8548443B2 (en) | System and method for selectively restricting portable information handling system features | |
JP6568355B2 (en) | Method and apparatus for mutual communication of accounts between apps | |
CA2837779C (en) | System and method for managing identity information after a sim swap | |
US11677696B2 (en) | Architecture for performing action in a third-party service by an email client | |
US20120066738A1 (en) | System and Method for automatic Data Security Back-up and control for Mobile Devices | |
US20140094141A1 (en) | Apparatus and Methods for Preventing Information Disclosure | |
US9699656B2 (en) | Systems and methods of authenticating and controlling access over customer data | |
US10582005B2 (en) | Architecture for performing actions in a third-party service by an email client | |
US20160381552A1 (en) | Handling risk events for a mobile device | |
Prabhavathy et al. | Smart phone user assistance application for android | |
US20140310780A1 (en) | Communication system | |
JP6938579B2 (en) | Mobile device privacy protection methods and devices, as well as mobile devices | |
JP2015518665A (en) | System and method for remotely activated voice communication | |
US9854444B2 (en) | Apparatus and methods for preventing information disclosure | |
Zhang et al. | Android platform-based individual privacy information protection system | |
KR101690850B1 (en) | Systems and methods for encrypted mobile voice communications | |
Surendiran | A Secure Command Based Approach to find Stolen Mobiles | |
Chandegra et al. | A Review on Android Spotter | |
Kumar et al. | Mobile information catalog surveillance | |
Mangal et al. | To Enhance the Security System of Mobile Phones by Using GSM Technology | |
CN107277804B (en) | Operation execution method and device and terminal | |
CN105721436A (en) | Wi-Fi hot spot sharing method and mobile terminal | |
Abdallah et al. | Design and implementation of Android Security App against Mobile Theft using GPS and SMS |