“…Various studies have been done before to deal with such weaknesses as research conducted by Kumar and Qadeer [2], Zhang, Hui, Qizhen, and Kim Tai-hoon [3], Kuppusamy and Aghila [4], Rohitaksha, Madhu, Nalini, and Nirupama [5], Punjabi, Pooja, Mantur, and Sneha [6], Gupta and Reddy [7], Dave and Welekar [8], Chandran [9], using Short Message Service (SMS) service to control distance Much as did Rayarikar, Sanket, and Pimpale [10], and Jongseok and Kim Howon [11]. However, in the research done by Kumar and Qadeer [2] and Zhang, Hui, Qizhen, and Kim Tai-hoon [3] the message used to perform the remote has not been using encryption so it must include the password and the keyword plain text. Then in the research Kuppusamy and Aghila [4] have been using the process of encryption and decryption in the system, but not using the server so that the response that can be accepted by the user only in the form of text-based information.…”