0% found this document useful (0 votes)
197 views11 pages

SRS of Trucaller

Truecaller is a smartphone application that allows users to identify unknown callers based on information from other users. It has features like caller ID, call blocking, messaging and social networking capabilities. The document outlines requirements for key features including managing call blocking lists, accessing local emergency and business services, recording calls for later playback, and viewing who has viewed a user's profile. Non-functional requirements around performance, safety and security are also specified.

Uploaded by

PRABHAT RANJAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
197 views11 pages

SRS of Trucaller

Truecaller is a smartphone application that allows users to identify unknown callers based on information from other users. It has features like caller ID, call blocking, messaging and social networking capabilities. The document outlines requirements for key features including managing call blocking lists, accessing local emergency and business services, recording calls for later playback, and viewing who has viewed a user's profile. Non-functional requirements around performance, safety and security are also specified.

Uploaded by

PRABHAT RANJAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

SOFTWARE REQUIREMENTS SPECIFICATION(SRS)

For
TRUECALLER

SUMMITED BY – VIMAL ARYA


REGISTRATION NO. – 12116274
SUMITTED TO – DR. DIMPLE NAGPAL
Table of Contests
1. Introduction…………………………………………………………………………………………..

Purpose…………………………………………………………………………

Document Conventions………………………………………………….

Product Scope………………………………………………………………

2. Overall Description…………………………………………………………………………………….
Product Perspective………………………………………………………
Product Functions……………………………………………………….
User Classes and Characteristics…………………………………
Operating Environment……….……………………………………………
Design and Implementation Constraints………………………….
User Documentation………………………………………………………
3. External Interface Requirements……………………………………………………..
User Interfaces…………………………………………………………..
Hardware Interfaces…………………………………………………
Software Interfaces…………………………………………………
Communications Interfaces……………………………………
4. System Features…………………………………………………………………………………………..
Manage Blocking……………………………………………
Local Services…………………………………………………
Call Recording………………………………………………..
Who Viewed My Profile………………………………..
Invite Friends………………………………………………
5. Other Nonfunctional Requirements………………………………..

Performance Requirement………………………………..

Safety Requirements…………………………………………..

Security Requirements………………………………………..
NTRODUCTION
allows theperson’s
unknown user know
detail
about any
1. INTRODUCTION

Purpose

The purpose of the software True-caller is to overcome the situations of responding to an

Unknown contact. Here the software acts as a guard and allows the user know any unknown

Person’s details.

DOCUMENTS CONVENTIONS

Writing an S-R-S documents for the software ensures the safety, security, and

Acknowledgment of the customer. Also it ensures that if there are any kind of errors

Posed by the software, then the customer has the right to hold responsible the

Developers or the organization.

PRODUCT SCOPE

True-caller, one of the going-to-be successful software in the app market, has an excellent

Feature of allowing the user to know about any unknown person’s details if he/she has phoned

Developments and upgrades were to be done according to that, and most importantly,

Maintenance is to be done with every upcoming version of this product.

2. OVERALL DESCRIPTION

PRODUCT PERSPECTIVE

True-caller is a smartphone application which has features of Calleridentification, call-blocking,

Flash-messaging, Chat &Voice which uses the internet. The service requires users to provide a

Standard cellular mobile number for registering with the service.

PRODUCT FUNCTIONS

True-caller contains the following input-output functions:

• QR Scanner
• Manage Blocking
• Local Services
• Call Recording
• Who viewed my profile
• Invite friends
• UPI
• Premium
• Setting (such as General, Caller ID, Messaging, Block, Backup, Call Recording,
Appearance, etc.)
• Contacts

USER CLASSES AND CHARACTERISTICS

Based on frequency of use, subset of product functions used, technical expertise, security levels

Educational level, or experience, we can say that this software is much required among the
customers. User class may include the different types of end-user, such as Free-user or Premium
users. Certain requirements may pertain only to certain users. Free-users can have access to the
functions provided, but some extra features will be restricted to them know, or recording the call
during responding to it.

OPERATING ENVIROMENT

An operating environment is the place where users run application software


or programs. It is not necessarily a full operating system (OS) but it does act
like a middleware, that is, the software that makes the OS work with a
specific application.

Initially, operating environments helped an OS improve and extend its


capabilities to more than just providing a reliable user interface (UI).

DESIGN AND IMPLEMENTATION CONSTRAINTS


Design constraints are those constraints that are imposed on the
design solution, which in this example refers to the ESS design.
These constraints are typically imposed by the customer, by the
development organization, or by external regulations. The
constraints may be imposed on the hardware, software,
data, operational procedures, interfaces, or any other part of the
system.
USER DOCUMENTATION
User documentation (also called end user manuals, end user guides,
instruction manuals, etc.) is the content you provide end users with
to help them be more successful with your product or service.
These are the instructional materials that go with your product to
help someone learn to properly use it or — in the case of physical
products — even assemble it.

3. EXTERNAL INTERFACE REQUIREMENTS


USER INTERFACES
The logical characteristics of True-caller is such that user will find it easy to use in the latest version.
GUI standards or product family style guides that are to be followed, screen layout constraints,
standard buttons and functions will appear on every screen, keyboard shortcuts, error message
display standards. The software components for which a user interface is needed are Contacts,
Messaging, Storage, Phone, and Location. Details of the user interface design is documented in a
separate user interface specification.

HARDWARE INTERFACES

The logical and physical characteristics of each interface between the


software product and the hardware components of the system may
include the supported device types, i.e., a cell phone or a system, the
nature of the data i.e., some kind of in-built data handler, e.g. storage
inside the device and control interaction between the software and
the hardware, i.e., the user interface through which the user can
communicate.
SOFTWARE INTERFACES

The connections between this product and other specific software


components is that this software does not have any dependencies
among other software, including databases, operating systems, tools,
libraries, and integrated commercial components. The data items or
messages coming into the system and going out and describe the
purpose of each. The services needed and the nature of
communications is proper network signal for communicating and
gathering the details of the person who is calling. The documents that
describe detailed application programming interface protocols is the
user manual. The data that will be shared across software
components is the details of the caller.

COMMUNICATION INTERFACES

The requirements associated with any communications functions


required by this product are e-mail, phone number and some
personal details like name , address and so on. Define any pertinent
message formatting. Communication standards that will be use in
HTTP. Communication security or encryption issues are there, no data
transfer rates, synchronization mechanisms are there such as proper
data visualization.

4. SYSTEM FEATURES.

MANAGING BLOCKING

On Android, this feature automatically blocks the worst culprits in


your region without you lifting a finger. To enable this feature is iOS,
Go to Setting >Phone>Call> Blocking and Identification.
1.Auto-block top spammers
Since spammers go through numbers faster than laundromats lose socks, Truecaller updates our
spam lists every day. Tap to toggle next to Truecaller to “Allow these apps to block calls and provide
caller ID”.

2.Auto-update top spammers

This feature protects you with the latest intel. Automatic updates means that even the most recent
top spammer will be labelled spam on your caller ID. The list is specific to your region so that it’s the
most relevant to you.

3.Extended top spammers list

This Premium option is for everyone who wants to stop even low-volume spammers from getting
through. With this setting, even callers who haven’t yet reached top spammer status won’t be
bothering anymore.

4. Block hidden numbers

There’s usually no mystery to an “unknown” or “private” number these days. 9times out of 10, those
number belongs to someone you have no interest in speaking to. With Truecaller, that’s your
prerogative! Block all hidden numbers for free in Android.

LOCAL SERVICES
A Short description of the feature to indicate that it is of Medium priority. This feature includes
providing the official contacts (such as Emergency, Airlines, Indian Railways, Banks, Healthcare, etc.)
apart from the unofficial contacts (the list of phonebooks). Ratings, based on benefits, penalty, and
risk:

The sequence of user action is to open the software and to right swipe the screen and to click on
Local Services and to select any of the options for this feature. These will result in accessing the
options so that one can use them if necessary.

The detailed functional requirement associated with this feature are:-

Under normal version Under Premium version

Access to the contacts of: Same as the normal version.

• Emergency
• Bank Balance
• Airlines
• Indian Railways
• Couriers/Packers
• Electronics
• Banks
• DTH
• Automobiles
• Healthcare
• Hotel and Insurance

These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond to anticipated
error conditions or invalid inputs. Requirements are concise, complete, unambiguous, verifiable,
and necessary.

CALL RECORDING
A short description of the feature to indicate that it is of Medium priority. This feature includes
recording of calls to for later purpose. Ratings, based on benefits, penalty, cost and risk:

The sequences of user actions is to open the software and to right swipe the screen and to click on
View Recording Settings and to click on Call Recording and click on Start Recording on the pooped up
window, so that the system responses to that feature.

The detailed functional requirements associated with feature are:-

Under normal version Under premium version

This feature is available only for a limited This feature is available permanently under

Period of time, say 1 month. After that, the premium version so as to ensure the

It will expire safety of the user from the caller.

These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond to anticipated
error conditions or invalid inputs. Requirements are concise, complete, unambiguous, verifiable, and
necessary.

5.WHO VIEWED MY PROFILE


A short description of the feature to indicate that it is of High priority. This feature includes
gaining access to those person’s details who viewed the user’s profile. Rating, based on benefit,
penalty, cost, and risk:

The sequence of user actions is to open the software and to right swipe the screen and to click on
Who Viewed My Profile, and as a result the system will respond to that feature.

The detailed functional requirements associated with this feature are:

Under normal version Under premium version

This feature is not available. This feature is available permanently

Under the premium version so as to

Ensure the safety of the user from

The caller.
These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond to anticipated
error conditions or invalid inputs. Requirements are concise, complete, unambiguous, verifiable, and
necessary.

5. OTHER NONFUNCTIONAL REQUIREMENTS


PERFORMANCE REQUIREMENTS

Truecaller has been around and living consistently on millions of


users’ home screens for years. However, if there’s one criticism it is
still not able to escape is its aggressive resource demands. The
addition of a multitude of new features such as flash messaging, digital
payments didn’t obviously make situations any better. Hence, in this
article, we will walk you through a couple of tips for ensuring the app
doesn’t choke your Android phone’s performance.

SAFETY REOUIREMENTS

The requirements that are concerned with possible loss, damage, or harm could result from the use
of the product . These may includes disclosing of the data, i.e., data leak, or such kind of thing ,which
will result in huge loss to the end-user . The safeguard or actions that must be taken are proper use
of database so as to maintain the data as well as actions that must be done in order to prevent data
leak. Referring to any external policies or regulations that state safety issues that affect the
product’s design or use.

SECURITY REQUIREMENTS

The requirements regarding security, such as data leak or privacy issues, such as disclosing the
details of a person to some other person. Identify authentication requirements such as while
creating an account, a verification code will appear which will ensure the presence of the user as the
only user of that account. Referring to any external policies or regulations that state safety that
affect the product’s design or use.

You might also like