Academic Journals Database
Disseminating quality controlled scientific knowledge

A New Approach to Theftware-Efficient Solution

ADD TO MY LIST
 
Author(s): Prabhat Kumar | Abhishek, Milan Jain | Niraj Upadhyay | Avinash Thakur

Journal: Advanced Computing : an International Journal
ISSN 2229-726X

Volume: 3;
Issue: 4;
Start page: 87;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Pre-boot authentication | Centralized server | Remote login | Remote lock | Sysinfo.

ABSTRACT
Theftware is software cum a proposed firmware which helps to track down a laptop in case of theft. Now a days, cases of laptop theft are becoming too frequent and prominent as it’s a pretty easy as well as rewarding affair for the burglars. Especially in the second and third world countries, where the hitherto technologies are not up to the international standards i.e. there is a big lacunae between the westerncountries and the developing countries in terms of technological infrastructure. In such places to prevent, stop, and track down of such cases of nuisance, we propose a model named Theftware which is a sinequa-non as it’s being developed with an eye that it’s for the masses and not for the few selected. We also purpose a central server with a database of all the registered laptop users in the world which will beunder the control of a government regulatory authority or it may be an autonomous one, depending on the requirements, need and power required to be vested in them. All the companies i.e. laptop manufacturers or service providers needs to enter all the details of their customers along with the information of laptop sold to them. The registered users in case of theft will report to this regulatory authority that will verify the request and report to the server if required. The work of Theftware starts from here as it periodically checks the central database to verify that the laptop has been stolen or not. If the laptop is found under scrutiny it will report to the server with the detailed information of its present location, so that it can be tracked by the regulating authority. In this paper we have proposed how an ordinary laptop can be vested with a Theftware process and how this process collects the system details along with the process of communication with the remote server. In this paper we have also discussed the scheduling algorithm for the Theftware which is a sine-qua-non for the laptop’s efficient performance along with the algorithm for the various processes inside Theftware. We have also prepared a comparative study which shows the laptops performance degradation on vesting with this software.
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Rapperswil
Tango Rapperswil