Download
intelock tm n.
Skip this Video
Loading SlideShow in 5 Seconds..
InteLock TM PowerPoint Presentation
Download Presentation
InteLock TM

InteLock TM

82 Views Download Presentation
Download Presentation

InteLock TM

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Remote Access and Proximity Key InteLockTM Advisor: Professor Ganz Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos

  2. Background & Motivation • Currently there are many solutions for keyless entry systems • Combination locks, remote key locks, electronic card key locks, fingerprint identification locks • Each of these solutions provide a more convenient alternative to the standard key and lock system • Minimizes required user actions for ease of use

  3. Background & Motivation • Another alternative to keyless entry systems • Propose a new wireless product designed for residential market that fits into existing standard doors • Convenience of having the key located on user eliminates need to manually unlock door • User key never has to be taken out of their pocket, wallet, purse, etc. • Key is detected by keyless entry system • User needs only to turn doorknob for access into the home

  4. Background & Motivation • Allow Remote Access to Keyless Entry System • Connect system to internet so that the lock status can be queried and changed remotely. • Enables user to lock or unlock door from anywhere when necessary. • Integrate system with PC so that user events can be logged and tracked. • Allows home owner to monitor home security and user access.

  5. Design Challenges • Form factor • Require small wireless components that are easily integrated into existing residential doors • Power consumption • Devices that require minimum power to operate • Security • Technology that provides a secure network • Efficiency • Data reliability and quick response time

  6. Design Solution • User will be able to lock/unlock their door provided that a special key is range of the keyless system • When the special key is in range of the system, the user can simply lock/unlock their door with a turn of the doorknob • Turning the doorknob right denotes a lock command, while left denotes an unlock command • Non-valid keys will be detected by the system and access will be denied

  7. Design Solution • System will be integrated with existing PC and internet gateway. • Software on PC will log events and allow for system monitoring and updating • Server running on PC will allow for remote monitoring and control of keyless entry system

  8. Design Solution • Utilize new wireless technology: ZigBee • New up and coming standard for home automation • Small form factor make ZigBee easy to integrate into system design • Low power consumption enable ZigBee devices to run on same batteries for years • Support for a large number of nodes in network • Provides strong reliability and security

  9. ZigBee Security Features • Provides freshness check to prevent replay attacks (an attacker from replaying messages) • Provides message integrity to prevent an attacker from modifying the message in transit or forging message • Up to 128 bits of integrity • Authentication and encryption protection possible at network and device levels

  10. Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node

  11. Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node

  12. Review MDR Specifications • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node

  13. Demonstration • Doorknob trigger will now be demonstrated • Breadboard will simulate wireless communication between the doorknob microcontroller and the control unit Doorknob trigger mechanism

  14. Review MDR Specifications Met • Pseudo-code for embedded firmware on each system component • Assemble and test trigger mechanism for Door Knob • Establish communication between ZigBee coordinator and at least one node • Establish communication between coordinator and one node using SPI… (revised spec)

  15. Deliverables: -Phase I (1) Command unit (1) Door knob (1) Deadbolt (2) Keys Associated Source Code User Manual -Phase II Server Software for PC Source Code Interface between PC and Control unit User Manual Deliverables • Acceptance Tests: • -Phase I • Door must unlock only • if valid Key is within range • Deadbolt must disengage within a few seconds • of knob turning • -Phase II • Software must be active whenever PC is running • Interface must only allow authorized users • to operate the system

  16. Project Milestones • Complete AVR RISC code for Phase I devices • Assemble and test Phase I system • Integrate system with PC using a ZigBee USB interface. • Write and test Software interface for system log and system control. • Write and Test server for Remote access and control

  17. Demo Day! • Phase I will be installed in functioning door with standard hardware placement for demonstration • Phase II will be installed on PC and will be demonstrated on a laptop with wireless access.

  18. Budget Overview

  19. Q & A ? ? ? ? ? ? ? ? ? ? ? ? ? ?