Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bully Blue Lock Midterm Presentation 2014 Senior Design II.

Similar presentations


Presentation on theme: "Bully Blue Lock Midterm Presentation 2014 Senior Design II."— Presentation transcript:

1 Bully Blue Lock Midterm Presentation 2014 Senior Design II

2 Team Members Trey Gary (Team Leader) Team Coordinator Hardware Assembly Travis Green Product Designer Software Developer Chase Wrenn Product Researcher Hardware Researcher Tope Daramola Web Designer Software Developer Dr. Morris Faculty Advisor

3 Overview Problem Solution Constraints System Overview Prototype Testing Improvements

4 Problem and Solution

5 Problem Sharing access is limited to keys or combinations both of which can be copied Sharing access is limited to keys or combinations both of which can be copied Basic padlocks do not have the capability of being monitored Basic padlocks do not have the capability of being monitored Loss of authority over padlock when access has been shared among other users Loss of authority over padlock when access has been shared among other users

6 Solution Create an electronic, wireless lock that doesn't rely on physical keys or combinations A Smartphone application will make the owner’s phone the “key” to the padlock The owner can share access with other users and never lose authority over the padlock

7 Design Constraints

8 Technical Constraints NameDescription Wireless Communication Blue Locks must communicate with a smart phone application to allow users to unlock the device from at least 1 yard. Power Supply The Blue Lock will rely on a main battery, while also providing a reserve battery for instances of main battery depletion. Application A smart phone application, initially iPhone, will allow owners to share access to the Blue Lock with one additional user. Physical Specifications The Blue Lock will not exceed physical dimensions of 4-1/2''x2-1/2''x1-1/4'' Manual Backup In instances of phone failure, the lock will provide a push button backup.

9 Practical Constraints NameDescription Manufacturability The Blue Lock will have a removable internal core to allow for battery and component replacement. Sustainability The Blue Lock will endure weather conditions and application will have updatable software.

10 Manufacturability The device has: an inner core that houses the locking, processing, and communication components. accessibility to the inner core to replace battery and inner core components. an outer core that encases the inner core for physical security.

11 Sustainability The Lock has: weather resistant components one year long battery lifespan The software has: application update can be easily downloaded from app store

12 System Overview

13 Internet Server Phone Application (owner) Phone Bluetooth Module Phone Bluetooth Module Lock Bluetooth Module Lock Bluetooth Module Unlocking Mechanism (i.e. motor) Unlocking Mechanism (i.e. motor) Phone Application (guest) ­ Power Supply

14 Prototype

15 Schematic (Updated)

16 Breadboard Layout

17 Breadboard & Lock

18 Application Screenshots Updates are in progress to support iOS 8

19 Testing

20 Testing: Range Blue Locks must communicate with a smart phone application to allow users to unlock the device from at least 1 yard 1.Lock and phone are set up 5 yards away 2.Attempted to connect 3.If connected, record signal strength 4.Move in 1 yard 5.Repeat steps 2-5 till lock and phone are within arms length

21 Testing: Power Consumption 1.Measure battery 2.Cycle motor until unlock 3.Measure battery 4.Take average 5.Extrapolate The Blue Lock will rely on a main battery, while also providing a reserve battery for instances of main battery depletion. Voltage range = Starting voltage – cutoff voltage Voltage range / voltage drop = cycles Voltage range = Starting voltage – cutoff voltage Voltage range / voltage drop = cycles

22 Testing: Manuel Backup

23 Testing: Sharing 1.Owner registers 2.Owner looks for other party’s user name 3.Permissions are sent to other party via internet connection 4.Other party receives permissions Sending and accepting permissions A smart phone application, initially iPhone, will allow owners to share access to the Blue Lock with one additional user.

24 Testing: Size Through – hole Layout 3.05 x 3.20 (in) The Blue Lock will not exceed physical dimensions of 4-1/2''x2-1/2''x1-1/4''

25 Testing: Size Surface Mount Layout 1.65 X 2.45 (in)

26 Improvements 1.9 x 0.7 in Continue improving PCB 1.78 x 2.35 in

27 Additional Improvements

28

29 Questions?

30 Bully Blue Lock Midterm Presentation 2014 Senior Design II


Download ppt "Bully Blue Lock Midterm Presentation 2014 Senior Design II."

Similar presentations


Ads by Google