© 2018, IJSRCSE All Rights Reserved 44
International Journal of Scientific Research in _______________________________ Research Paper .
Computer Science and Engineering
Vol.6, Issue.1, pp.44-49, Feb (2018) E-ISSN: 2320-7639
GSM devices Property proof and Tracking
Hussam Elbehiery
Department of Computer Networks, Ahram Canadian University (ACU), Giza, Egypt
*
Corresponding Author: hussam.elbehiery@gmail.com, Tel.: +201027199717
Available online at: www.isroset.org
Received 29/Jan/2018, Revised 05/Feb/2018, Accepted 18/Feb/2018, Online 28/Feb/2018
Abstract— All GSM network devices such as smart phones become a target of choice for thieves because they are small,
valuable, and there is a market for them. A thief can sell a stolen electronic device to an unsuspecting used computer store or
pawnshop, and easily receive up to half its value in cash. The penalties for a property crime are less severe than those of a
crime against a person is another reason of wide spreading of this crimes. Cost of this crimes is not just its replacement cost,
but also the cost of configuring and loading replacement software, and the cost of lost time for the owner while the device is
being replaced. An even greater cost is the potential exposure and liability that results from lost confidential corporate and
client information. Designed web page will be used to access these devices to take always a copy of the important data and will
be saved on the cloud area related to the web site which make it easier to retrieve the stored information in theft or lost case.
The introduced research explains how you can keep strangers from accessing your personal information, safely back up and
retrieve the stored data in the device. The introduced design will help in trying of minimization of the theft cases also
minimizing extortion by thieves or some of exploiters depending on that all GSM device especially cellular phones could be
tracked using IMEI (International Mobile Station Equipment Identity) or MEID (Mobile Equipment Identifier).
Keywords— Cellphone tracking, Property Proof, and Data Retrieval
I. INTRODUCTION
Unsurprisingly, the thefts grew most rapidly in urban areas
where cell phone density is highest. So they think firstly in
stored data on these devices as the world become live in the
digital life. However, because of their portability, mobile
devices are more susceptible than desktop systems to loss
and theft. Safeguards you can use to reduce the risk of
someone accessing personal and institutional data when your
mobile device is lost or stolen [1].
First of all some security features on smartphones which are
using the GSM services should be enabled which is also vary
between devices and operating systems (iOS, BlackBerry,
Android, Windows Phone, and Windows Mobile) to
configure security and encryption settings. [2] Use whichever
features your device offers that provide the best security for
your needs such as: Password, passcode, or PIN, Unlock
pattern, Device lockout, Auto-wipe, and Encryption.
The following common features are frequently useful, but
can also create security risks [3]. You may want to consider
disabling them: Bluetooth, and GPS.
The suggested system depend on developing a web
application system to verify an ownership for the customer's
cellular phones and the GSM devices. There will be an
employees who are responsible for client registration on the
tracking and protection site in addition to the possibility of
changing the ownership from the original client to any
another customer (who the original client could choose) and
the normal inheritance operations (son, daughter, brother,
sister, relatives, etc.). In case of theft, the customer can
contact the responsible employee in the suggested system or
go to nearest branch to complete or finalize any operation
related to this issue. Customer can see all the purchases of
cell phones or GSM devices directly through the system
website and all of the auxiliaries‟ customers [5,11].
There are specific websites are available for both
iOS and Android devices and combines security, tracking,
and anti-virus/malware protection. There are several
interesting features, such as the system recording a cell
phone‟s last location right before the battery dies, a chance to
backup contact data before a remote erase, and it‟ll even snap
a photo of any would-be thief and email it along with
location data to you. There‟s a free two-week trial, after
which it‟ll cost $5 per month approximately [6,9,10].
The rest of the paper is organized as follows: Section 2
highlights the system analysis and design for the proposed
work whereas the web application output framework is