1 / 2

SECO

C. B. C. E. F. A. D. Physical case Dimensions - SECO is 7” by 11” by 12”; dimensions selected to fit the faculty mail slots in Broun Hall.

season
Télécharger la présentation

SECO

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. C B C E F A D Physical case • Dimensions - SECO is 7” by 11” by 12”; dimensions selected to fit the faculty mail slots in Broun Hall. • Material – SECO is constructed of 3/16” acrylic, which is rigid, durable, and easy to work with. It is transparent so the component connections can be easily viewed in this demonstration model. The final product would be opaque. • Component Placement • The detector is an NPN transistor that is reverse biased by incoming IR light • Once the infrared light is blocked the NPN transistor inside the detector will be forward biased to produce a collector voltage increase that one of the input pins of the NI sbRIO-1096 can detect. SECO Secure Electronic Communications in Offices A Technical Development Figure 14: Schematic of the detection circuit Figure 15: LabVIEW code for sending e-mail • As seen in Figure 20, if the voltage from the detector exceeds 2V, then program triggers an e-mail. User Contact Figure 3: FIM5360-LV Fingerprint Scanner Figure 4: Block diagram of FIM5360-LV board • E-mail • Program sends an email whenever the motion detector senses motion (Figure 16) and when an email has been successfully registered with a fingerprint. Figure 8: Rutherford 3510MS Electric Cabinet Lock • Hardware • A BJT switch is used to turn the lock on and off as shown in Figure 9. • A low signal is sent to the base of the BJT, high positive, low negative. • A 510 ohm resistor used on base of BJT • Magnets push door open when unlock C B Component Control • sbRIO • The primary piece of hardware that will integrate all of the components of the mailbox system together is a National Instruments Single Board RIO 9626 (Figure 2). • Features: 400 MHz processor, 512 MB of nonvolatile storage, a Xilinx FPGA, 16 16-bit analog inputs, 4 16-bit analog outputs, and 4 3.3V DIO lines. • The system software will run on the processor and interact with the signals coming in from the fingerprint scanner, lock system, key override system, and mail identification system. • The board features an Ethernet port that will allow the emailing capabilities to take place from the board. Figure 2: National Instruments Single Board RIO 9626 • LabVIEW • LabVIEWis a high level graphical programming language that allows the user to code using a flow chart rather than text. • The Academic Standard Suite includes toolkits necessary for simple Real-Time and Field Programmable Gate Array (FPGA) . • LabVIEWconsists of many readily available toolkits that will allow for rapid development. A • Figure 5: FIM 5360-LV circuit board (communications port highlighted) [2] Figure 6: 9-pin crimping port • Communicates at a bit rate of 9600, in hexadecimal, using machine code. One packet: • 1 byte Start byte • 4 byte Command • 8 byte Parameters • 4 byte Size indicator • 4 byte Error code • 4 byte checksum value • Necessary data • Data checksum value • Two serial commands run at mailbox startup: • 1 verifies communication with the device • 2 enters “mastermode;” new user registration mode • Serial commands provide advanced control, but most unneeded for mailbox system. • Example: Figure 7shows a command requests for the second scan in a fingerprint registration process. • The number 33 corresponds to registration in both strings • The first 1 indicates a successful action in the read string • The second 1 indicates that one user is registered in the read string Figure 16: LabVIEW Real-Time code that sends an email after mail has been sensed Figure 9: Electronic Lock BJT Switch Circuit • A: In the Real-Time code, an FPGA reference is opened so the values on the FPGA can be read in the Real-Time code. • B: The Boolean variable “Mail Sensed?” on the FPGA is read in order for the Real-Time system to determine whether an email should be sent. • C: If the “Mail Sensed?” variable is True, an email is sent. If false, then nothing happens. • Software (Figure 10) • A: The fingerprint scanner “scan is good” response and manual lock override are input into the sbRIO. • B: The two inputs are combined using an “or” function that outputs a “True” Boolean constant if either input is true. • C: The output of this “or” function is fed in to the selector terminal of a case structure • D: It is also fed through another “or” function that illuminates the green LED for either a good fingerprint scan, or successfully opening the manual lock. • E: This sends a logic high to unlock the lock meaning that one of the pushbuttons has been pressed. • F: After 0.3 seconds, a false constant is sent out to the port connected to the lock to reclose it. • User Interface • One button on the front of the mailbox requests a fingerprint authentication scan. • One green LED flashes upon successful registration, authentication, or deletion. • One red LED flashes when a registration or authentication is unsuccessful. • One button on the back sends a command to delete all users in the fingerprint scanner and clears the stored e-mail address in the sbRIO. • The second button begins a mailbox registration sequence, where two fingerprint scans are performed to store the fingerprint into memory. • The sbRIO prepares for the input of the associated e-mail address. The dot-matrix character display is activated. • The third button cycles through characters for e-mail entry, A-Z, 0-9, “.”, and “@”. --Because of limitations, only @auburn.edu addresses can be serviced, so the @ symbol ends email entry. • If an incorrect character has been selected, pressing the delete button will cancel the current address input. Security • Access Method Table 1: Pugh Chart of identification methods. Attributes rated on a scale from 1* to 10 with 10 representing a high level of desirability for a particular attribute. *The numbers in the Pugh Chart represent the research-based opinions of Matthew Thompson Figure 10: Electronic Lock Control Block Diagram in LabVIEW (True Case) • Manual Lock Override • A manual key lock (figure 11) triggers a switch (figure 12) which sends a logic high to the sbRIO, as if a positive fingerprint had been scanned. Figure 7: Sent and received serial communication packet Locking Mechanism Figure 11: Amico 16.5mm diameter cabinet tool box quarter turn cam lock Figure12: Manual Lock Override Switch Figure 17: LabVIEW FPGA code for idling the dot matrix display when no email input is necessary Table 2: Pugh Matrix evaluating lock choice. 5* = high, 1 = low. Figure 13: Mailbox unlock/lock process flow chart Table 4: Description of the labels from Figure 17 • FIM5360-LV Fingerprint Scanner (Figure 3 and 4) • Stores and analyzes fingerprints in circuit board which comes with scanner • Communication using nine pins to the embedded controller (Figure 9): • 1 voltage supply • 1 ground • 2 send and receive serial communications • 2 fingerprint scanner outputs • 1 input for requesting authentication • 1 input for requesting registration • 1 input for requesting deletion • Connected using a crimping port (Figure 10) • Scans twice to register new fingerprint • Scans once to identify a stored fingerprint • Can delete unwanted user Mail Detection *The numbers in the Pugh Chart represent the research-based opinions of Stephanie Smith *The numbers in the Pugh Chart represent the research-based opinions of Hassan Elrhazouani

  2. User Contact SECO Secure Electronic Communications in Offices Project Planning Figure 18: LabVIEW FPGA code for character selection and dot matrix interaction Table 5: Description of the labels from Figure 18 Team Members Timeline • Proposal Phase (8/16/2012 – 9/5/2012): • Project Brainstorming • Management approach • Motion Detector Research and Ordering • Email vs. SMS Text Research • Fingerprint Scanner Research and Ordering • Mailbox Research and design • NI Singleboard RIO donation – coordinate with NI Sales • Lock Research and Ordering • Standards Research • Website design • Cycle 1 (9/5/2012 – 10/3/2012) • Project Organization • Build Fingerprint Scanner • Program Fingerprint Scanner • Build Lock System • Program Locking System • Program Email system • Assemble Mailbox • LabVIEW Build Your Own Embedded Systems Course • Cycle 2 (10/3/2012 – 11/14/2012) • Finalize Fingerprint Scanner accuracy • Test Lock System Security • Finalize Total Mailbox Assembly • Project Organization • Integrate All Systems • Finalize Project (11/14/2012 – 11/28/2012) • Wrap Up (11/28/2012) Impact • Economic • Extra expenditure to companies could cause increased costs or lowered salaries. • Save money if it prevented property from being stolen. • Social • Possible employee distrust as people assume that increased security means there was an increase in dishonesty. • Increased security and confidence in delivering valuable or confidential materials via mail. • Ethical • Employees forced to record their fingerprint. • Not directly prohibited by HIPAA or other laws. • - Manual override allows alternate means of entry. Intended Use of Final Project The finished prototype of this secure mailbox system shall be donated to the Electrical Engineering Department of the Auburn University Samuel Ginn College of Engineering. It may be used as an example for future designers and if the product is sufficiently successful and desired, may be installed for use in the office of the department. If it is deemed that the parts of this prototype are better used in another capacity in another project, the prototype may be dismantled and recycled as is necessary. Jimmie Lyn Jackson Matthew Thompson Stephanie Smith Della Killingsworth Hassan Elrhazouani Project Description SECO is an electronic mailbox designed to work in office settings. SECO is a physical mailbox as seen in post offices or outside homes, but with high tech advancements and security features. The mailbox is made from a secure material to prevent breaking and entering. The owner who uses SECO no longer needs to remember a key to collect their mail: the mailbox has a fingerprint identification lock to release the door when it recognizes the owners fingerprint. For cases where the fingerprint identification needs to be overridden, a key lock is used to access the box. When mail is placed though the slot, an infrared transmitter and receiver reacts due to light being blocked. This signals that mail has been placed in the mailbox. Immediately upon receiving mail an email is sent automatically from SECO to the owner. Having this form of mail notification, the owner no longer has to make a special trip to check their mailbox, nor worry about the security of their correspondence. Figure 19: LabVIEW Real-Time code for concatenating selected and letters and creating an email address Table 6: Description of Labels from Figure 19 • Project Planning • Management • Proposal • Team members researched a component and made a recommendation on the part to be used • Cycle 1 • Programming: Stephanie and Hassan • Hardware and Fingerprint Scanner: Jimmie Lyn and Matthew • Box Construction: Della • Cycle 2 • Component assembly: Jimmie Lyn and Della • Hardware and Software testing: Matthew, Stephanie, and Hassan Hours Table 7: Description of Task Hours (Planned vs. Actual) Budget • Facilities • Broun Hall Greene Room • Broun Hall Senior Design Lab • Team member’s homes Table 8: Description of Individual Hours Spent on Task Additional Unit cost:

More Related