Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Mobile Tracking Using GSM


Affiliations
1 MIT College of Engineering, Pune, Maharashtra, India
     

   Subscribe/Renew Journal


Mobile communication is one of the leading field where one can achieve the specified work. Mobile computing is a generic term describing one's ability to use technology whilemoving,as opposed to portable computers, which are only practical for use while deployed in a stationary configuration. Mobile tracing is one of the challenging job in today’s world. This paper locates the lost mobile using mobile computing technologies. The application is advanced anti-theft for Symbian S60 devices. It starts automatically when the mobile phone is turned on and checks the SIM card in the process. If the unauthorized SIM card has been placed in the phone, an SMS will be send containing information about the new phone number, IMEI number and current network details to the pre defined number. The current user will not be notified about the SMS and it will not appear in the logs or send SMS folders.


Keywords

GSM, Server, Client, Symbain, IMEI.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 162

PDF Views: 2




  • Mobile Tracking Using GSM

Abstract Views: 162  |  PDF Views: 2

Authors

Bharati Sanjay Ainapure
MIT College of Engineering, Pune, Maharashtra, India

Abstract


Mobile communication is one of the leading field where one can achieve the specified work. Mobile computing is a generic term describing one's ability to use technology whilemoving,as opposed to portable computers, which are only practical for use while deployed in a stationary configuration. Mobile tracing is one of the challenging job in today’s world. This paper locates the lost mobile using mobile computing technologies. The application is advanced anti-theft for Symbian S60 devices. It starts automatically when the mobile phone is turned on and checks the SIM card in the process. If the unauthorized SIM card has been placed in the phone, an SMS will be send containing information about the new phone number, IMEI number and current network details to the pre defined number. The current user will not be notified about the SMS and it will not appear in the logs or send SMS folders.


Keywords


GSM, Server, Client, Symbain, IMEI.