Truecallerr
Truecallerr
TRUE-CALLER
1.1 Purpose......................................................................................................................................1
1.2 Document Conventions .............................................................................................................1
1.3 Intended Audience and Reading Suggestions ...........................................................................1
1.4 Product Scope............................................................................................................................1
1.5 References .................................................................................................................................1
2. Overall Description......................................................................................................................................... 2
INTRODUCTION
PURPOSE
The purpose of the software Truecaller is to overcome the situations of
responding to an unknown contact. Here the software acts as a guard and
allows the user to know about any unknown person’s details.
DOCUMENT CONVENTIONS
Writing an S-R-S document for the software ensures the safety, security and
acknowledgment of the customer. Also, it ensures that if there are any kind of
errors posed by the software, then the customer has the right to hold
responsible the developers or the organization.
INTENDED AUDIENCE AND READING SUGGESTIONS
Readers include developers, users, testers, and documentation writers. If any
misconceptions regarding the software is written, any not imposed, then the
whole of the writer’s team or the developer’s team should be held responsible.
A sequence for reading the document should be there, beginning with the
overview sections and proceeding through the sections that are most pertinent
to each reader type.
PRODUCT SCOPE
True-caller, one of the going-to-be successful software in the app market, has
an excellent feature of allowing the user to know about any unknown person’s
details if he/she has phoned. Developments and upgrades were to be done
according to that, and most importantly, maintenance is to be done with every
upcoming version of this product.
REFERENCES
References taken from “https://www.uccs.edu/Documents/tboult/srs.doc”.
OVERALL DESCRIPTION
PRODUCT PERSPECTIVE
True-caller is a smartphone application which has features of caller
identification, call-blocking, flash-messaging, call-recording, Chat & Voice
which uses the internet. The service requires users to provide a standard
cellular mobile number for registering with the service.
PRODUCT FUNCTIONS
True-caller contains the following input-output functions:
• QR Scanner
• Manage Blocking
• Local Services
• Call Recordings
• Invite Friends
• UPI
• Premium
• Contacts
OPERATING ENVIRONMENT
True-caller is a software that can run on both iOS and Android, with any kind
of hardware. It can also run on any kind of operating system. The current
version of True-caller is version 10.50.8.
USER DOCUMENTATION
User manual will be delivered along with the software. Online help is available
at “https://www.truecaller.com”.
The logical characteristics of True-caller is such that user will find it easy to
use in the latest version. GUI standards or product family style guides that are
to be followed, screen layout constraints, standard buttons and functions (e.g.,
help) will appear on every screen, keyboard shortcuts, error message display
standards. The software components for which a user interface is needed are
Contacts, Messaging, Storage (if necessary), Phone, and Location.
Details of the user interface design is documented in a separate user interface
specification.
HARDWARE INTERFACES
The logical and physical characteristics of each interface between the software
product and the hardware components of the system may include the
supported device types, i.e., a cell phone or a system, the nature of the data,
i.e., some kind of in-built data handler, e.g. storage inside the device and
control interactions between the software and the hardware, i.e., the user
interface through which the user can communicate.
SOFTWARE INTERFACES
The connections between this product and other specific software components
is that this software does not have any dependencies among other software,
including databases, operating systems, tools, libraries, and integrated
commercial components. The data items or messages coming into the system
and going out and describe the purpose of each. The services needed and the
nature of communications is a proper network signal for communicating and
gathering the details of the person who is calling. The documents that describe
detailed application programming interface protocols is the user manual. The
data that will be shared across software components is the details of the caller.
The data sharing mechanism must be implemented in a specific way i.e., using
of a database inside the software for the purpose of gathering the details and
showing it to those who require it.
COMMUNICATIONS INTERFACES
The requirements associated with any communications functions required by
this product are e-mail, phone number and some personal details like name,
address and so on. Define any pertinent message formatting. Communication
standards that will be use is HTTP. Communication security or encryption
issues are there, no data transfer rates, synchronization mechanisms are
there such as proper data visualization.
SYSTEM FEATURES
Illustrating the organization of the functional requirements for the product by
system features, such as Call Blocking, Call Recording, who viewed my
profile, etc. and the major services provided by the product, such as
Payments, Inviting Friends, Premium Version, etc. It is preferred to
organize this section by use case, mode of operation, user class, object class,
functional hierarchy, or combinations of these, whatever makes the most
logical sense for your product. So, here it goes:
MANAGE BLOCKING
4.1.1 Description and Priority
A short description of the feature to indicate that it is of High priority. This feature includes
updating the list of most reported spam calls to detect them quickly even when offline.
Ratings, based on benefit, penalty, cost, and risk: - 8/9
These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond
to anticipated error conditions or invalid inputs. Requirements are concise, complete,
unambiguous, verifiable, and necessary.
LOCAL SERVICES
4.1.1 Description and Priority
A short description of the feature to indicate that it is of medium priority. This feature includes
providing the official contacts (such as Emergency, Airlines, Indian Railway, Banks,
Healthcare, etc.) apart from the unofficial contacts (the list of phonebooks). Ratings,
based on benefit, penalty, cost, and risk: - 8/9
These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond
to anticipated error conditions or invalid inputs. Requirements are concise, complete,
unambiguous, verifiable, and necessary.
REQ-1: We must have a registered account in the software (which is not necessary)
CALL RECORDING
4.1.1 Description and Priority
A short description of the feature to indicate that it is of medium priority. This feature includes
recording of calls to for later purpose. Ratings, based on benefit, penalty, cost, and
risk: - 7/9
These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond
to anticipated error conditions or invalid inputs. Requirements are concise, complete,
unambiguous, verifiable, and necessary.
These are the software capabilities that must be present in order for the user to carry out the
services provided by the feature, or to execute the use case. The product will respond
to anticipated error conditions or invalid inputs. Requirements are concise, complete,
unambiguous, verifiable, and necessary.
PERFORMANCE REQUIREMENTS
There are performance requirements for the product (that are in-built inside it)
such as
After call Details: - A caller details are shown every time as a pop-
up during the call and after the call from an unknown person. In most
cases, this floating alert is both redundant and a serious memory
hogger.
• Remind me of missed calls: - Essentially sends you
notifications every hour nudging you to call the person back.
It probably won’t have any significant impact on the app’s
performance but hey, who doesn’t like lesser notifications?
SAFETY REQUIREMENTS
The requirements that are concerned with
possible loss, damage, or harm could result from
the use of the product. These may include
disclosing of the data, i.e., data leak, or such kind
of thing, which will result in huge loss to the end-
user. The safeguards or actions that must be
taken are proper use of database so as to
maintain the data as well as actions that must be
done in order to prevent data leak. Referring to
any external policies or regulations that state
safety issues that affect the product’s design or
use, one can visit the site
“https://www.truecaller.com/privacy-policy” to get
quick tips to ensure the safety certifications that
must be satisfied.
SECURITY REQUIREMENTS
Gold Specific, Specific and Specific, Specific and Specific and Specific,
Version Quantitative, Verifiable Quantitative, Verifiable Quantitative Quantitative
and Verifiable and Verifiable , and
Verifiable
BUSINESS RULES
No operating principles about the product, such
as which individuals or roles can perform which
functions under specific circumstances. There
are no functional requirements in themselves,
and they do not imply any functional requirements
to enforce the rules. This is a general-purpose
software, no there is no commercial purpose of
that, so apart from the privacy policies, no other
restrictions are imposed on it.
OTHER REQUIREMENTS
There are requirements not covered elsewhere in
the SRS. This might include database
requirements, a huge database to store the
amount of data they collect; internationalization
requirements such as using various kind of
languages. One such feature is available inside
the software which lets the user to operate it as
per the language requirement. Reuse objectives
for the project, such as data backup for more
storage for further use.
Appendix A: Glossary
Internationalization localization (means of
adapting computer software to different
languages, regional peculiarities and technical
requirements of a target locale)
Appendix B: Analysis Models
Open the software
Device opens the
software
Click on settings
Enter the settings
TRUECALLE
R
(Login
Process
)
Manag
eBlockin
g
Loca Cal
lServic Recordin
l
es gs
TRUECALL
ER
(Logi
Proces
n
s)
Manag
eBlocki
ng