C Peace of mind is one step away Bluetooth Access Control System Product Presentation and Demo Copyright © 2007 Ztronicx Microsystems. All Rights Reserved.1/4/2007.

Slides:



Advertisements
Similar presentations
EBooks and Audiobooks. This class will give you an overview of eBooks and electronic Audiobooks available from the Library. We will also explain the basic.
Advertisements

A mobile single sign-on system Master thesis 2006 Mats Byfuglien.
Inventory System Application Design Document Tomer Peled Al Yaros Kobi Ruham.
Chapter 61 Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005.
Dec06-08 MotoFreedom Industrial Review Panel Presentation December 5 th 2006.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Sean Powers Florida Institute of Technology ECE 5525 Final: Dr. Veton Kepuska Date: 07 December 2010 Controlling your household appliances through conversation.
BuZZone for Trade Shows: Searching for New Partners and Efficiently Exchanging Information The product is developed by Bacup IT.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Department of Electrical & Computer Engineering Preliminary Design Review Team: Lucas Root Telin Kim Brandon Thorpe Michael Shusta Advisor: Professor Tessier.
University of Massachusetts Amherst InteLock TM Advisor: Professor Ganz Team: Emmanuel Seguin Christos Tsiokos Josh Coffin Anh-Kiet Huynh Remote Access.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
PROJECT PROPOSAL Lennie Giannone, Ryan Savino, Carrie Johnston, and Jessica Fernandes.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
GeneXpert Installation and Xpert MTB/RIF Set-up
Scams Stevie's Scam School videos
Intel Do-It-Yourself Challenge Lab 1: Intel Galileo’s Arduino side Nicolas Vailliet
Sales Card Dell Confidential – Internal Use Only Microsoft Windows 10 OVERALL DELL MESSAGE: Let Dell help you migrate to take advantage of new Windows.
HOME AUTOMATION THROUGH ANDROID MOBILE. What is Home Automation?  Home automation involves introducing a degree of computerized or automatic control.
X X A SIMPLE APPROACH TO ACCESS CONTROL SmartLock ® Pro more info: EVERYTHING YOU NEED TO GET STARTED MANAGING YOUR SYSTEM EXTEND YOUR OPTIONS SmartLock.
Software Solutions for Product Developers Copyright 2005 Software Technologies Group, Inc. All Rights Reserved. An Overview of ZigBee The Power of the.
© 2013 The McGraw-Hill Companies, Inc. All rights reserved Mike Meyers’ CompTIA A+ ® Guide to 802: Managing and Troubleshooting PCs Fourth Edition (Exam.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Introduction to USB Development. USB Development Introduction Technical Overview USB in Embedded Systems Recent Developments Extensions to USB USB as.
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
Adviser: Yih-Ran Sheu Adviser : Yih-Ran Sheu Student : Shin-hao Wang SN:MA Mohammed A Qadeer Dept of Computer Engg Aligarh Muslim University, Aligarh,
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
ENVIROTRAC: A Premier Chamber Monitoring and Data Acquisition System Envirotrac A Guided Tour.
DECT Data Applications Contents DECT Data Application Scenarios DECT Data Interoperability DECT Data Standards DECT Data Trends Conclusions.
1 PULZE™: Wireless Heart Attack Detector Copyright© Precision Lifestyle Technologies Inc. December 17, The Heart of Medical Advances.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
© 2008 Delmar, Cengage Learning Property Security, Emergency Response, and Fire Protection Systems Chapter 13.
October 3, 2015 SILENCER 1 October 3, 2015 SILENCER 1 The Silencer Milestone Old Dominion University CS 410 Red Group.
Abstract Other Resources Financial Resources Project Schedule Personnel Efforts Item DescriptionCost STK300 Microcontrollerdonated (Kanda) GM28 Cellular.
Computer Concepts 2014 Chapter 5 Local Area Networks.
Presentation for ENSC 440/305 Instructors: Patrick Leung, Steve Whitmore Department of Engineering Science Simon Fraser University.
1 © 2008 Avaya Inc. All rights reserved. IPOffice Configuration Service Emil Ratnam.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
10/14/2015www.itcsoftware.com1 Real Time Solutions.
An innovative, electronic personal health record Overview.
“TK8 Safe” – Easy-to-use, secure password manager Download a free trial copy: Product Info Highlights TK8 Safe is a perfect password manager.
Security Solutions from SurfersNet and TimePilot [Overview] [Benefits] [Time Clock] [Security]
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
1350 TAC Training © 2000, Cisco Systems, Inc. Cisco Aironet 350 Series Product and Software Update WNBU Technical Marketing.
Chapter Six Maintaining a Computer Part II: Installing, Repairing, and Removing Applications.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Curt Priest CIST 1451 April 21, 2014 Enabling remote access and control from anywhere PIC18F97J60 Based Ethernet Controller.
Bully Blue Lock Midterm Presentation 2014 Senior Design II.
The Smart/Safe Car Seat SENIOR DESIGN I FINAL PRESENTATION.
Residential and Retail Energy Conservation Products and Services CEO: Mark W Jago CrystalRenewablePower.com.
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 1, Introduction to the Internet, World Wide Web and Wireless Outline 1.1 Introduction 1.2History.
HardSSH Cryptographic Hardware Key Team May07-20: Steven Schulteis (Cpr E) Joseph Sloan (EE, Cpr E, Com S) Michael Ekstrand (Cpr E) Taylor Schreck (Cpr.
The Memory Mate CS 410 Preston Noe. “Within the last eight months, I’ve been at war with the cooker. …I also forget what time I put things in the oven.
Umm… What does this anagram mean ???. N EAR F IELD C OMMUNICATION (NFC)
B LUETOOTH CONTROLLED ELECTRONIC HOME APPLIANCES Prepared by : GROUP 15 Enrollment No : 1. RAHUL VEMULA ( ) 2. ABILASH S. ( ) 3.
PROJECT OVERVIEW GSM SECTION BLUE TOOTH SECTION SOFTWARE DEVELOPMENT CIRCUIT DEVELOPMENT LESSONS LEARNED AND CHALLENGES FACED.
Mobile Device Security Management Leyna Belinsky.
 This work confers an application which makes possible to use a Bluetooth enabled mobile phone to remote control home appliances such electric fan, LEDs.
SECURE LAB: CREATING A CISCO 3550 VLSM NETWORK
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Blue eye technology Prepared by VINIT SHAH 08 CE 099.
Voice Controlled Robot by Cell Phone with Android App
Instructor Materials Chapter 6 Building a Home Network
GCSE ICT Revision Topic 2: Connectivity.
A mobile single sign-on system
Presentation transcript:

c Peace of mind is one step away Bluetooth Access Control System Product Presentation and Demo Copyright © 2007 Ztronicx Microsystems. All Rights Reserved.1/4/2007

2 Ztronicx Panel Halim Soetanto (CTO) May Liu (VP of Marketing) – Not Present Shahin Teymouri (CEO) Rick Liu (VP R&D)

3 Overview The Two Problems –Protecting Loved Ones at Home –Day to Day Key Access The Solution How Does It Work? How Does the Software Work? How Does the Hardware? Future Plans Conclusion Questions? Demo

4 Problem One Protecting Loved Ones at Home - Alzheimer or Dementia Patients Two million people suffering from extreme dementia in Canada alone They have poor judgment They forget that they have left an equipment turned ON, or how to operate an equipment There are many problems created by dementia patients, for them or people around them by misuse of dangerous equipment

5 Problem One Continue … Protecting Loved Ones at Home – Small Children There are many dangerous appliances at home (oven, fireplace meat grinder, etc …) Hard to keep children away from them But how do we keep patients or children safe at home?

6 Problem Two Day to Day Key Access Everyday you carry 5-10 keys or access cards They could get stolen, lost or left behind Temporary access for guests can be a problem Customized access not possible with keys

7 The Solution Using the VirtualKey System (also named VK) Have appliances automatically disable when a parent or caregiver is not around Extremely simple to use, effective and cheap to own The dementia patients and children will not be able to operate dangerous appliances that are VirtualKey enabled The VirtualKey enabled appliances only work when a caregiver or a parent are nearby Unlock all your doors with your cellular phone

8 VK System has two components: VK hardware module and Cell phone software The hardware module can be integrated into any device or appliances such as oven, power saw, fireplace or into a power bar VK module can disable the appliance when a caregiver or parent is not around The module can be installed in any appliance It listens for a pass code transmitted automatically from caregiver’s cellular phone nearby, and enables itself. It uses the existing Bluetooth protocol on the cell phone The VK hardware installed inside appliances will automatically enable/disable the appliance with caregiver’s proximity How Does Virtual Key Work?

9 How Does the Hardware Work? The VirtualKey hardware module listens for incoming Bluetooth connections from nearby cellular phones The wireless Bluetooth connection must be encrypted The pass code transmitted to hardware must be valid After all these requirements are met, the hardware will enable the appliance After the cellular phone leaves the room where the appliance is the hardware module will disable The cell phone can enable the hardware when both are on the same room The phone can be left in care givers pocket, and all the communications takes place automatically All the time delays for enable/disable period are adjustable

10 The VirtualKey Hardware Module Implemented Into a Power bar VirtualKey Module in a Power BarFinal VirtualKey Product

11 The Hardware Details AVR ATmega32 Running at 4MHz for power consumption and using UART at 9600 bps to communicate with the Bluetooth module Blue Radios Bluetooth module Version 1.1, with SPP Stack 3.3, 5.0, 12.0 V Power supply with surge protection Brownout protection as well as extreme temperate capable components Firmware upgradeable using port JTAG

12 How Does the Software Work? Java based software is installed on the cellular phone Any Bluetooth enabled cell phone can be used VK software currently supports 90% of the cell phones offered today

13 The software is programmed using J2ME language It can run on any java-enabled brand of phone and completely operating system independent JSR-82 API is needed on the cellular phones

14 Java Software on Your Cell Phone

15 Java Software on Your Cell Phone - Login

16 Java Software on Your Cell Phone - Security Settings

17 Java Software on Your Cell Phone - Search Devices I (No Devices)

18 Java Software on Your Cell Phone - Search Devices II

19 Java Software on Your Cell Phone - Enable Devices

20 Java Software on Your Cell Phone - Disable Devices

21 Java Software on Your Cell Phone - Change Password I

22 Java Software on Your Cell Phone - Change Password II (Confirmation Fail)

23 Java Software on Your Cell Phone - Change Password III (Change Successful)

24 Future Plans Testing VK where children/dementia patients are present Further improve the product Demonstrate for future funding Patent and commercialize Simple device, market should adapt quickly

25 Conclusion VirtualKey is a cheap/effective way to control your appliances and protect your loved ones Even control your door locks with VK module and your cellular phone Cost as low as $10 a module, on a mass produced basis Current hardware cost for a single item is $110 (our cost)

26 Conclusion What was learned: –AVR Assembly programming –AT command set –Bluetooth structure and protocol –J2ME Programming –Encryption in Java and Bluetooth This slide was added on Jan6/2007

27 Acknowledgments ENSC 305,440 Andrew Rawicz Steve Whitmore Bradley E. Oldham SparkFun Electronics Blue Radios Inc. This slide was added on Jan6/2007

28 Questions? Please feel free to discuss any questions you may have.

29 Demo of VirtualKey and Hardware Pictures

30

31 References Please refer to VirtualKey Post-Mortem document for full reference to all the images and technical data