1 / 23

InteLock TM

Remote Access and Proximity Key. InteLock TM. Advisor: Professor Ganz Team: Emmanuel Seguin Christos Tsiokos Josh Coffin Anh-Kiet Huynh. Background & Motivation. Getting into the front door of one’s home can present a troublesome situation Fishing around in pockets for keys

obert
Download Presentation

InteLock TM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Remote Access and Proximity Key InteLockTM Advisor: Professor Ganz Team: Emmanuel Seguin Christos Tsiokos Josh Coffin Anh-Kiet Huynh

  2. Background & Motivation • Getting into the front door of one’s home can present a troublesome situation • Fishing around in pockets for keys • Finding the correct key to unlock the door • Problems arise when it is dark outside • Loss or misplacement of keys • Inconvenient to find keys when hands are tied up

  3. Background & Motivation • Various keyless entry systems have been developed • Combination Lock • Gain entry into a home by inputting preset code into door keypad

  4. Background & Motivation • Remote Door Lock • Gain access to home utilizing a small remote device similar to that of a keyless car remote • Electronic Card Key Lock • Gain access to home utilizing an electronic card key • Electronic card key must be placed over card reader • Door unlocks if proper card key is in place • Some locks require sliding of key

  5. Background & Motivation • Fingerprint Identification Lock • User places finger in fingerprint identification scanner • Scanner checks for record of the fingerprint • Allows access through door if fingerprint matches records

  6. Background & Motivation • All products are great alternatives • Each individual keyless system provides its own unique security protocols • Cost can be a huge downside

  7. Background & Motivation • Another alternative to keyless entry systems • Propose a new product designed for residential population • Easy to use, easy to install • Will fit in existing doors in the home • Ability to be upgradeable (i.e. new security features) and expandable (i.e. home automation, lighting controls, temperature controls, etc) • Low power consumption

  8. Background & Motivation • What’s the plan? • Homeowner with a special electronic key will be able to access door (discussed in detail later) • Utilize wireless devices that operate on cell, AA, AAA batteries • Wireless device will operate for years without having to constantly change batteries • Wireless devices must be small for easy integration into existing door • User keys must also contain small wireless devices

  9. Background & Motivation • Additional features • How to overcome the misplacement or loss of electronic key? • Each key has a unique ID tag • Can set system so that the loss ID tag will not be accepted • Integrate keyless system with internet • Home entry control from remote location

  10. Requirements • Phase (1) will involve the interaction of the parts: doorknob, access key, deadbolt and coordinator • Phase (2) will involve interaction between a PC and coordinator of phase (1), and a http web site

  11. REQUIREMENTS Phase (1) • Zigbee is used for any wireless interaction • Door unlocks in presence of a valid key when Door Knob is turned • Independent and wireless units run on batteries • Quick system response

  12. Requirements (Phase (1)) • The key has a practical size • Encryption (AES-128) • Doorknob turning tolerance will be about 20 degrees

  13. REQUIREMENTS Phase (2) • Phase (1) interfaces with phase (2) • The system connects to the internet • Access through a http web site • User controls the door and checks its status

  14. Design Characteristics • Water fall method • Component Based • Design Simplicity • Expandability • User Friendly

  15. Door Knob Trigger:

  16. Electronic Deadbolt • Existing electric deadbolt • New microcontroller • Existing power supply

  17. Software Developement • Phase I • WinAVR Development Environment • Familiarity with environment • Familiarity with command structure and library • C++ embedded software • Phase II • Text Pad Java D.E. and compiler? • Familiarity • M.S. Visual Studio? • Graphic Objects

  18. Design Alternatives for Technology

  19. Design Alternatives for ZigBee Technology Development Kits

  20. Deliverables: -Phase I (1) Command unit (1) Door knob (1) Deadbolt (2) Keys Associated Source Code User Manual -Phase II Server Software for PC Source Code Interface between PC and Control unit User Manual Deliverables and Demo Tests • Acceptance Tests: • -Phase I • Door must unlock only • if valid Key is within range • Deadbolt must disengage within 1 second • of knob turning • -Phase II • Software must be active whenever PC is running • Interface must only allow authorized users • to operate the system

  21. Proposed MDR Specifications • Psuedo-code for embedded firmware on each system components • Establish communication between ZigBee coordinator and at least one node • Generate associated documentation • Assemble and test trigger mechanism for Door Knob

  22. Q & A ? ? ? ? ? ? ? ? ? ? ? ? ? ?

More Related