SlideShare une entreprise Scribd logo
1  sur  9
17 May 2010




Android Mobile Security Application




                           © Copyright 2010 | Aftek Limited
Mobile Security

 Phone robbery cases are increasing at such an alarming rate that many
    Government had called for “Improved Protection Against Mobile Theft”
   According to FBI the reported mobile phone thefts increased almost 33
    percent over last two years, from 60,100 to nearly 80,300.
   Mobile phones users in India suffer an annual loss of Rs 5 billion due to theft
    or misplaced handsets, industry experts suggest.
   Nearly three million Britons have had their phones stolen. Latest figures
    suggest that there are 228 mobile phone thefts every hour in the UK at
    present.

 Aftek introduces a Android Mobile device security solution that guarantees
    peace of mind.
   Provides a “multi-factor” voice authentication system that can secure
    mobile devices. Currently the solution is available on Android 2.0 phones only.
   A non-invasive voice biometrics algorithm (VoiceKeyID) is used to verify
    an individual’s identity before secure transactions can proceed.
   This technology is completely spoken language independent.

 A patented technology based on two decades of Interpol funded research and
    used by European government as a means for criminal identification.
   Being based on voice forensic science ensures a true physical biometric
    of an individual and not just a statistical analysis.
                                                                  © Copyright 2010 | Aftek Limited
Mobile security

   As secure as it can get
   A user gets 3 chances to provide his
    correct voice passphrase.
   If the user fails to do so then the mobile
    gets blocked. This essentially means that
    the mobile will becomes completely
    useless.
   Your buddies are the only people who can
    unblock your mobile device by sending
    specific SMS. Your buddies can
        Unblock your phone
        Unblock your phone and request forgot
         passphrase. This would enable to provide
         new passphrases.
   If blocked and then if the SIM card is
    changed then the mobile cannot be
    unblocked.
   The mobile phone cannot be formatted
    when blocked thus making it completely
    tamper proof.

                             © Copyright 2010 | Aftek Limited
Mobile Security




    © Copyright 2010 | Aftek Limited
Mobile Security




    © Copyright 2010 | Aftek Limited
Registration process

   A simple registration process
   Provide your contact information – When
    mobile is lost then the information can be
    seen where the person who has found the
    mobile can contact you.
   Provide a list of buddies mobile number –
    If by mistake you forgot your voice
    passphrase or your mobile is blocked, then
    the trusted buddies can unblock the
    mobile for you by sending specific SMS.
   Record your voice passphrase – This will
    act as the key to unlock your mobile.




                           © Copyright 2010 | Aftek Limited
Registration




 © Copyright 2010 | Aftek Limited
Registration




 © Copyright 2010 | Aftek Limited
Get the evaluation copy
now!
OR Write us to @
android@aftek.com

Aftek Limited




                          © Copyright 2010 | Aftek Limited

Contenu connexe

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Android Mobile Security Solution

  • 1. 17 May 2010 Android Mobile Security Application © Copyright 2010 | Aftek Limited
  • 2. Mobile Security  Phone robbery cases are increasing at such an alarming rate that many Government had called for “Improved Protection Against Mobile Theft”  According to FBI the reported mobile phone thefts increased almost 33 percent over last two years, from 60,100 to nearly 80,300.  Mobile phones users in India suffer an annual loss of Rs 5 billion due to theft or misplaced handsets, industry experts suggest.  Nearly three million Britons have had their phones stolen. Latest figures suggest that there are 228 mobile phone thefts every hour in the UK at present.  Aftek introduces a Android Mobile device security solution that guarantees peace of mind.  Provides a “multi-factor” voice authentication system that can secure mobile devices. Currently the solution is available on Android 2.0 phones only.  A non-invasive voice biometrics algorithm (VoiceKeyID) is used to verify an individual’s identity before secure transactions can proceed.  This technology is completely spoken language independent.  A patented technology based on two decades of Interpol funded research and used by European government as a means for criminal identification.  Being based on voice forensic science ensures a true physical biometric of an individual and not just a statistical analysis. © Copyright 2010 | Aftek Limited
  • 3. Mobile security  As secure as it can get  A user gets 3 chances to provide his correct voice passphrase.  If the user fails to do so then the mobile gets blocked. This essentially means that the mobile will becomes completely useless.  Your buddies are the only people who can unblock your mobile device by sending specific SMS. Your buddies can  Unblock your phone  Unblock your phone and request forgot passphrase. This would enable to provide new passphrases.  If blocked and then if the SIM card is changed then the mobile cannot be unblocked.  The mobile phone cannot be formatted when blocked thus making it completely tamper proof.  © Copyright 2010 | Aftek Limited
  • 4. Mobile Security © Copyright 2010 | Aftek Limited
  • 5. Mobile Security © Copyright 2010 | Aftek Limited
  • 6. Registration process  A simple registration process  Provide your contact information – When mobile is lost then the information can be seen where the person who has found the mobile can contact you.  Provide a list of buddies mobile number – If by mistake you forgot your voice passphrase or your mobile is blocked, then the trusted buddies can unblock the mobile for you by sending specific SMS.  Record your voice passphrase – This will act as the key to unlock your mobile. © Copyright 2010 | Aftek Limited
  • 7. Registration © Copyright 2010 | Aftek Limited
  • 8. Registration © Copyright 2010 | Aftek Limited
  • 9. Get the evaluation copy now! OR Write us to @ android@aftek.com Aftek Limited © Copyright 2010 | Aftek Limited