C Peace of mind is one step away Bluetooth Access Control System Product Presentation and Demo...

31
c Peace of mind is one step away Bluetooth Access Control System Product Presentation and Demo ight © 2007 Ztronicx Microsystems. All Rights Reserved. 1/4/2007
  • date post

    20-Dec-2015
  • Category

    Documents

  • view

    212
  • download

    0

Transcript of C Peace of mind is one step away Bluetooth Access Control System Product Presentation and Demo...

c

Peace of mind is one step away

Bluetooth Access Control System

Product Presentation and Demo

Copyright © 2007 Ztronicx Microsystems. All Rights Reserved. 1/4/2007

2

Ztronicx Panel

Halim Soetanto (CTO)

May Liu (VP of Marketing) – Not Present

Shahin Teymouri (CEO)

Rick Liu (VP R&D)

3

Overview• The Two Problems

– Protecting Loved Ones at Home– Day to Day Key Access

• The Solution• How Does It Work?• How Does the Software Work?• How Does the Hardware?• Future Plans• Conclusion• Questions?• Demo

4

Problem One Protecting Loved Ones at Home - Alzheimer or Dementia Patients

• Two million people suffering from extreme dementia in Canada alone

• They have poor judgment• They forget that they have left an

equipment turned ON, or how to operate an equipment

• There are many problems created by dementia patients, for them or people around them by misuse of dangerous equipment

5

Problem One Continue … Protecting Loved Ones at Home – Small Children

• There are many dangerous appliances at home (oven, fireplace meat grinder, etc …)

• Hard to keep children away from them

• But how do we keep patients or children safe at home?

6

Problem Two Day to Day Key Access

• Everyday you carry 5-10 keys or access cards

• They could get stolen, lost or left behind

• Temporary access for guests can be a problem

• Customized access not possible with keys

7

The Solution

• Using the VirtualKey System (also named VK)• Have appliances automatically disable when a parent or

caregiver is not around• Extremely simple to use, effective and cheap to own• The dementia patients and children will not be able to

operate dangerous appliances that are VirtualKey enabled• The VirtualKey enabled appliances only work when a

caregiver or a parent are nearby• Unlock all your doors with your cellular phone

8

• VK System has two components: VK hardware module and Cell phone software

• The hardware module can be integrated into any device or appliances such as oven, power saw, fireplace or into a power bar

• VK module can disable the appliance when a caregiver or parent is not around

• The module can be installed in any appliance• It listens for a pass code transmitted automatically from caregiver’s

cellular phone nearby, and enables itself.• It uses the existing Bluetooth protocol on the cell phone• The VK hardware installed inside appliances will automatically

enable/disable the appliance with caregiver’s proximity

How Does Virtual Key Work?

9

How Does the Hardware Work? • The VirtualKey hardware module listens for incoming Bluetooth connections from

nearby cellular phones• The wireless Bluetooth connection must be encrypted• The pass code transmitted to hardware must be valid• After all these requirements are met, the hardware will enable the appliance• After the cellular phone leaves the room where the appliance is the hardware

module will disable• The cell phone can enable the hardware when both are on the same room• The phone can be left in care givers pocket, and all the communications takes

place automatically• All the time delays for enable/disable period are adjustable

10

The VirtualKey Hardware Module Implemented Into a Power bar

VirtualKey Module in a Power Bar Final VirtualKey Product

11

The Hardware Details• AVR ATmega32 Running at

4MHz for power consumption and using UART at 9600 bps to communicate with the Bluetooth module

• Blue Radios Bluetooth module Version 1.1, with SPP Stack

• 3.3, 5.0, 12.0 V Power supply with surge protection

• Brownout protection as well as extreme temperate capable components

• Firmware upgradeable using port JTAG

12

How Does the Software Work?

• Java based software is installed on the cellular phone

• Any Bluetooth enabled cell phone can be used

• VK software currently supports 90% of the cell phones offered today

13

• The software is programmed using J2ME language

• It can run on any java-enabled brand of phone and completely operating system independent

• JSR-82 API is needed on the cellular phones

14

Java Software on Your Cell Phone

15

Java Software on Your Cell Phone - Login

16

Java Software on Your Cell Phone - Security Settings

17

Java Software on Your Cell Phone - Search Devices I (No Devices)

18

Java Software on Your Cell Phone - Search Devices II

19

Java Software on Your Cell Phone - Enable Devices

20

Java Software on Your Cell Phone - Disable Devices

21

Java Software on Your Cell Phone - Change Password I

22

Java Software on Your Cell Phone - Change Password II (Confirmation Fail)

23

Java Software on Your Cell Phone - Change Password III (Change Successful)

24

Future Plans

• Testing VK where children/dementia patients are present

• Further improve the product

• Demonstrate for future funding

• Patent and commercialize

• Simple device, market should adapt quickly

25

Conclusion• VirtualKey is a cheap/effective way to control your

appliances and protect your loved ones• Even control your door locks with VK module and

your cellular phone • Cost as low as $10 a module, on a mass produced

basis• Current hardware cost for a single item is $110 (our

cost)

26

Conclusion

• What was learned:– AVR Assembly programming– AT command set– Bluetooth structure and protocol– J2ME Programming– Encryption in Java and Bluetooth

This slide was added on Jan6/2007

27

Acknowledgments

• ENSC 305,440• Andrew Rawicz• Steve Whitmore• Bradley E. Oldham

• SparkFun Electronics

• Blue Radios Inc.

This slide was added on Jan6/2007

28

Questions?

• Please feel free to discuss any questions you may have.

29

Demo of VirtualKey and Hardware Pictures

30

31

References

• Please refer to VirtualKey Post-Mortem document for full reference to all the images and technical data