4. Los control (Affected Components: All, system-level effect) Loss control includes theft, security breach attempts or damaged devices. Each of the three scenarios will be explored below* Theft.The auniversity of Nevada conducted a study and found that over 90% if people who stole phones would attempt to "unlock" the phone prior to subsequent steps toward utilization (e.g. change the SIM, connect via a USB cable, etc.) The objective when attempting to track a sloten device is to assure the smartphone is powered on and able to send location information. The theft control module will recognize when a face is within the forwars or rear (if available) cameras, take photos of that face as well as intermittent photographs every minute. This data, along with positional GPSdata can be retrieved from another smartphone device. The key to initiating " Theft Mode Services" is to accept any code entered. Receipt of the wrong code ( three times or as configured) will acticate the Theft Mode. Theft Mode is silent and the person holding the phone is unaware of the actions taken by the software. Additionally the user can configure immediate "Security Beach Protocols" as a precaution.
đang được dịch, vui lòng đợi..
