Presentation is loading. Please wait.

Presentation is loading. Please wait.

Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh.

Similar presentations


Presentation on theme: "Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh."— Presentation transcript:

1 Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh

2 Project Concept/Motivation Concept: This project will act as deterrence against laptop thefts, providing the owner a greater degree of security. The prototype integrates off-the-shelf embedded components, such as motion-sensing accelerometer, buzzer, RFID reader and tags for passive activation of the device and the Tmote Sensor. Motivation: A laptop owner today is unable to leave his/her laptop unattended without risk of the laptop being stolen. Using our prototype system, an alarm will be activated if the laptop is being handled by unauthorized personnel.

3 Competitive Analysis: Caveo Anti-Theft PC Card: http://caveo.com/products/anti-theft.htm The product works by sensing motion and emitting an alarm when its moved. Our product will automatically activate the lock when it does not sense the user’s presence Kensingstone Cable Lock: http://us.kensington.com/html/11179.html The product works by physically locking the laptop to a secure object. Our product requires less user input and is a smaller and lighter solution.

4 Requirements: Functional Requirements: Detects the presence of the user when in range and disarms the device. Arms the device when user is out of range. Allows software arming and disarming of device. Detects movement of laptop when armed and sounds alarm accordingly. Non-functional Requirements: Reliability: When armed, the device will detect significant movement and sound the alarm. Usability: The device will require minimal user input after installation. Threshold: Non-extended small movements will be tolerated by the system. Timing: The alarm will trigger within 5 seconds of detection of motion.

5 Technical Specifications: Microcontroller: Moteiv “Tmote Sky” http://www.moteiv.com/products/tmotesky.php Buzzer: Generic “Buzzer” http://export.farnell.com/jsp/endecaSearch/partDetail.jsp?sku=1192515 $2.50 ea Motion sensor: Freescale “MMA7260QT Accelerometer” http://www.freescale.com/files/sensors/doc/data_sheet/MMA7260QT.pdf http://www.freescale.com/files/sensors/doc/data_sheet/MMA7260QT.pdf $5.68 ea Rechargeable battery : Generic “3V Rechargeable Lithium Battery” http://www.action-electronics.com/batcomp.htm Quote pending Wireless keycard components: RFID Reader: Texas Instruments “Series 2000 Micro Reader RI-STU-MRD1” http://www.ti.com/rfid/docs/manuals/pdfSpecs/RI-STU-MRD1.pdf Quote pending RFID Tag: Texas Instruments “Card Transponder TRP-R4FF” http://www.ti.com/rfid/docs/manuals/pdfSpecs/TRP-R4FF.pdf Quote pending Voltage step-up converter: Texas Instruments “TPS61027” http://focus.ti.com/docs/prod/folders/print/tps61027.html $3.15 ea

6 Architecture Block Diagram

7 State Chart for Laptop

8 State Chart for Microcontroller

9 State chart for RFID reader State chart for Buzzer State chart for Accelerometer

10 List of Use Cases Bootstrapping TearDown

11 User leaves laptop User moves laptop List of Use Cases(continued…)

12 Thief moves laptop User approaches laptop List of Use Cases(continued…)

13 Risks R1. Compatibility between RFID reader and Telos Motes R2. Compatibility between voltage regulator, RFID reader and Telos Motes R3. Compatibility of rechargeable battery with rechargeable mechanisms on Telos Motes R4. Real-world performance of RFID reader with respect to range R5. Constraints with respect to the ports available on Telos Motes R6. Difficulty in finding suitable algorithms differentiating significant and non-significant movements R7. Usage under different laptop operating environments

14 Mitigation of Risks Worst case usage of Zigbee protocol and Telos Motes for passive device  (R1, R2, R4) Requires device to always be plugged into laptop  (R3) Usage of 18-348 board to meet specific port requirements  (R5) Usage of multiplexers to meet port requirements  (R5) For worst case, any slight movement would trigger alarm  (R6) Requires Windows as main Operating System  (R7)


Download ppt "Can’tTouchThis KSM Hammer Jun Wei Chuah Shihong Ng Ming Yang Koh."

Similar presentations


Ads by Google