seco

2
SECO Secure Electronic Communications in Offices Physical case Dimensions - SECO is 7” by 11” by 12”; dimensions selected to fit the faculty mail slots in Broun Hall. Material – SECO is constructed of 3/16” acrylic, which is rigid, durable, and easy to work with. It is transparent so the component connections can be easily viewed in this demonstration model. The final product would be opaque. Component Placement Technical Development Component Control sbRIO The primary piece of hardware that will integrate all of the components of the mailbox system together is a National Instruments Single Board RIO 9626 (Figure 2). Features: 400 MHz processor, 512 MB of nonvolatile storage, a Xilinx FPGA, 16 16-bit analog inputs, 4 16-bit analog outputs, and 4 3.3V DIO lines. The system software will run on the processor and interact with the signals coming in from the fingerprint scanner, lock system, key override system, and mail identification system. The board features an Ethernet port that will allow the emailing capabilities to take place from the board. Figure 2: National Instruments Single Board RIO 9626 LabVIEW LabVIEW is a high level graphical programming language that allows the user to code using a flow chart rather than text. The Academic Standard Suite includes toolkits necessary for simple Real-Time and Field Programmable Gate Array (FPGA) . LabVIEW consists of many readily available toolkits that will allow for rapid development. Security Access Method Cost Speed Reliabi lity Convenience Personal Intrusiven ess Securi ty Tota l Key 8 7 9 5 10 5 44 Keypad Code 7 6 9 6 10 5 43 ID Card 7 7 9 5 8 6 42 Fingerpri nt 6 9 9 9 6 8 47 Palm Print 4 8 9 8 5 9 43 Voiceprin t 5 7 5 7 5 7 36 Facial Recogniti on 4 7 7 7 3 7 35 Retinal Scan 3 7 9 5 1 10 35 Table 1: Pugh Chart of identification methods. Attributes rated on a scale from 1* to 10 with 10 representing a high level of desirability for a particular attribute. *The numbers in the Pugh Chart represent the research-based opinions of Matthew Thompson FIM5360-LV Fingerprint Scanner (Figure 3 and 4) Stores and analyzes fingerprints in circuit board which comes with scanner Communication using nine pins to the embedded controller (Figure 9): 1 voltage supply 1 ground 2 send and receive serial communications 2 fingerprint scanner outputs 1 input for requesting authentication 1 input for requesting registration 1 input for requesting deletion Connected using a crimping port (Figure 10) Scans twice to register new fingerprint Scans once to identify a stored fingerprint Can delete unwanted user Figure 3: FIM5360-LV Fingerprint Scanner Figure 4: Block diagram of FIM5360-LV board Figure 5: FIM 5360-LV circuit board (communications port highlighted) [2] Figure 6: 9-pin crimping port Communicates at a bit rate of 9600, in hexadecimal, using machine code. One packet: 1 byte Start byte 4 byte Command 8 byte Parameters 4 byte Size indicator 4 byte Error code 4 byte checksum value Necessary data Data checksum value Two serial commands run at mailbox startup: 1 verifies communication with the device 2 enters “mastermode;” new user registration mode Serial commands provide advanced control, but most unneeded for mailbox system. Example: Figure 7 shows a command requests for the second scan in a fingerprint registration process. The number 33 corresponds to registration in both strings The first 1 indicates a successful action in the read string The second 1 indicates that one user is registered in the read string Figure 7: Sent and received serial communication packet Price Range Power Consumption Total Infrared Emitter & Detector 5 ($1.95) 5 5 15 Photocell resistor 5 (1.95) 5 5 15 Sharp IR Range Finder 1 ($14.00) 5 3 9 Garage Door sensor 1 ($16.95) 1 1 3 *The numbers in the Pugh Chart represent the research- based opinions of Hassan Elrhazouani The detector is an NPN transistor that is reverse biased by incoming IR light Once the infrared light is blocked the NPN transistor inside the detector will be forward biased to produce a collector voltage increase that one of the input pins of the NI sbRIO-1096 can detect. Figure 14: Schematic of the detection circuit Figure 15: LabVIEW code for sending e- mail As seen in Figure 20, if the voltage from the detector exceeds 2V, then program triggers an e-mail. User Contact E-mail Program sends an email whenever the motion detector senses motion (Figure 16) and when an email has been successfully registered with a fingerprint. A C Figure 16: LabVIEW Real-Time code that sends an email after mail has been sensed B C A A: In the Real-Time code, an FPGA reference is opened so the values on the FPGA can be read in the Real- Time code. B: The Boolean variable “Mail Sensed?” on the FPGA is read in order for the Real-Time system to determine whether an email should be sent. C: If the “Mail Sensed?” variable is True, an email is sent. If false, then nothing happens. User Interface One button on the front of the mailbox requests a fingerprint authentication scan. One green LED flashes upon successful registration, authentication, or deletion. One red LED flashes when a registration or authentication is unsuccessful. One button on the back sends a command to delete all users in the fingerprint scanner and clears the stored e-mail address in the sbRIO. The second button begins a mailbox registration sequence, where two fingerprint scans are performed to store the fingerprint into memory. The sbRIO prepares for the input of the associated e- mail address. The dot-matrix character display is activated. The third button cycles through characters for e-mail entry, A-Z, 0-9, “.”, and “@”. --Because of limitations, only @auburn.edu addresses can be serviced, so the @ symbol ends email entry. If an incorrect character has been selected, pressing the delete button will cancel the current address input. Locking Mechanism Electric Dead- Bolt Lock, Fail Safe [5] 168GSCD Security Wired Door Controls Electric Bolt Lock [6] Rutherford 3510 Electric Cabinet Lock [7] Rutherford 3513 Electric Cabinet Lock [8] Cost 5 5 4 3 Size 1 1 5 4 Ease of Installation 1 1 5 5 Instruction availability 1 1 5 5 Security 5 5 2 5 Totals 13 13 21 22 Table 2: Pugh Matrix evaluating lock choice. 5* = high, 1 = low. *The numbers in the Pugh Chart represent the research-based opinions of Stephanie Smith Figure 8: Rutherford 3510MS Electric Cabinet Lock Hardware A BJT switch is used to turn the lock on and off as shown in Figure 9. A low signal is sent to the base of the BJT, high positive, low negative. A 510 ohm resistor used on base of BJT Magnets push door open when unlock Figure 9: Electronic Lock BJT Switch Circuit Software (Figure 10) A: The fingerprint scanner “scan is good” response and manual lock override are input into the sbRIO. B: The two inputs are combined using an “or” function that outputs a “True” Boolean constant if either input is true. C: The output of this “or” function is fed in to the selector terminal of a case structure D: It is also fed through another “or” function that illuminates the green LED for either a good fingerprint scan, or successfully opening the manual lock. E: This sends a logic high to unlock the lock meaning that one of the pushbuttons has been pressed. F: After 0.3 seconds, a false constant is sent out to the port connected to the lock to reclose it. A B E F C D Figure 10: Electronic Lock Control Block Diagram in LabVIEW (True Case) Manual Lock Override A manual key lock (figure 11) triggers a switch (figure 12) which sends a logic high to the sbRIO, as if a positive fingerprint had been scanned. Figure 11: Amico 16.5mm diameter cabinet tool box quarter turn cam lock Figure12: Manual Lock Override Switch Figure 13: Mailbox unlock/lock process flow chart Mail Detection Table 3:The suggested sensors w ere rated on a scale of1* to 5, 1 being leastdesirable,5 m ostdesirable,based on three criteria. Figure 17: LabVIEW FPGA code for idling the dot matrix display when no email input is necessary Table 4: Description of the labels from Figure 17 Figure Label Description A Registration button Input from FPGA. B Wait functions that pause briefly to avoid any bouncing from the button press. C Email Input Boolean from Real-Time Operating System. True if there was a successful fingerprint scan and the email address is now ready to be input. D Cluster of Boolean outputs to send to the dot matrix representing each individual character. E Selects the next value to be sent out to the dot matrix. “Blank” if false, and “A” if true. &ŝŐƵƌĞ ϭ VD ĂŝůďŽdž ǁ ŝƚŚ Žŵ ƉŽŶĞŶƚ>ĂLJ ŽƵƚ

Upload: season

Post on 24-Feb-2016

55 views

Category:

Documents


0 download

DESCRIPTION

C. B. C. E. F. A. D. Physical case Dimensions - SECO is 7” by 11” by 12”; dimensions selected to fit the faculty mail slots in Broun Hall. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: SECO

SECOSecure Electronic Communications in Offices

Physical case Dimensions - SECO is 7” by 11” by 12”; dimensions selected to

fit the faculty mail slots in Broun Hall. Material – SECO is constructed of 3/16” acrylic, which is rigid,

durable, and easy to work with. It is transparent so the component connections can be easily viewed in this demonstration model. The final product would be opaque.

Component Placement Technical Development

Component Control sbRIO

The primary piece of hardware that will integrate all of the components of the mailbox system together is a National Instruments Single Board RIO 9626 (Figure 2).

Features: 400 MHz processor, 512 MB of nonvolatile storage, a Xilinx FPGA, 16 16-bit analog inputs, 4 16-bit analog outputs, and 4 3.3V DIO lines.

The system software will run on the processor and interact with the signals coming in from the fingerprint scanner, lock system, key override system, and mail identification system.

The board features an Ethernet port that will allow the emailing capabilities to take place from the board.

Figure 2: National Instruments Single Board RIO 9626 LabVIEW

LabVIEW is a high level graphical programming language that allows the user to code using a flow chart rather than text.

The Academic Standard Suite includes toolkits necessary for simple Real-Time and Field Programmable Gate Array (FPGA) .

LabVIEW consists of many readily available toolkits that will allow for rapid development.Security

Access Method

  Cost

Speed

Reliability

Convenience

Personal Intrusiveness

Security

Total

Key 8 7 9 5 10 5 44Keypad Code

7 6 9 6 10 5 43

ID Card 7 7 9 5 8 6 42Fingerprint

6 9 9 9 6 8 47

Palm Print

4 8 9 8 5 9 43

Voiceprint 5 7 5 7 5 7 36Facial Recognition

4 7 7 7 3 7 35

Retinal Scan

3 7 9 5 1 10 35

Table 1: Pugh Chart of identification methods. Attributes rated on a scale from 1* to 10 with 10 representing a high level of desirability for a particular attribute.

*The numbers in the Pugh Chart represent the research-based opinions of Matthew Thompson FIM5360-LV Fingerprint Scanner (Figure 3 and 4) Stores and analyzes fingerprints in circuit board which comes

with scanner Communication using nine pins to the embedded controller

(Figure 9): • 1 voltage supply • 1 ground • 2 send and receive serial communications • 2 fingerprint scanner outputs• 1 input for requesting authentication• 1 input for requesting registration• 1 input for requesting deletion

Connected using a crimping port (Figure 10) Scans twice to register new fingerprint Scans once to identify a stored fingerprint Can delete unwanted user

Figure 3: FIM5360-LV Fingerprint Scanner Figure 4: Block diagram of FIM5360-LV board

Figure 5: FIM 5360-LV circuit board (communications port highlighted) [2]

Figure 6: 9-pin crimping port

Communicates at a bit rate of 9600, in hexadecimal, using machine code. One packet:

• 1 byte Start byte• 4 byte Command• 8 byte Parameters• 4 byte Size indicator• 4 byte Error code• 4 byte checksum value • Necessary data• Data checksum value

Two serial commands run at mailbox startup:• 1 verifies communication with the device• 2 enters “mastermode;” new user registration mode

  Serial commands provide advanced control, but most unneeded for

mailbox system. Example: Figure 7 shows a command requests for the second scan in

a fingerprint registration process. • The number 33 corresponds to registration in both

strings• The first 1 indicates a successful action in the read

string• The second 1 indicates that one user is registered in

the read string

Figure 7: Sent and received serial communication packet

  Price Range Power Consumption Total

Infrared Emitter & Detector

5 ($1.95) 5 5 15

Photocell resistor 5 (1.95) 5 5 15

Sharp IR Range Finder

1 ($14.00) 5 3 9

Garage Door sensor

1 ($16.95) 1 1 3

*The numbers in the Pugh Chart represent the research-based opinions of Hassan Elrhazouani

The detector is an NPN transistor that is reverse biased by incoming IR light

Once the infrared light is blocked the NPN transistor inside the detector will be forward biased to produce a collector voltage increase that one of the input pins of the NI sbRIO-1096 can detect.

 Figure 14: Schematic of the

detection circuit Figure 15: LabVIEW code for

sending e-mail As seen in Figure 20, if the

voltage from the detector exceeds 2V, then program triggers an e-mail. User Contact

E-mail Program sends an email whenever the motion detector

senses motion (Figure 16) and when an email has been successfully registered with a fingerprint.

A

C

Figure 16: LabVIEW Real-Time code that sends an email after mail has been sensed

B C

A

A: In the Real-Time code, an FPGA reference is opened so the values on the FPGA can be read in the Real-Time code.

B: The Boolean variable “Mail Sensed?” on the FPGA is read in order for the Real-Time system to determine whether an email should be sent.

C: If the “Mail Sensed?” variable is True, an email is sent. If false, then nothing happens. User Interface

One button on the front of the mailbox requests a fingerprint authentication scan.

One green LED flashes upon successful registration, authentication, or deletion.

One red LED flashes when a registration or authentication is unsuccessful.

One button on the back sends a command to delete all users in the fingerprint scanner and clears the stored e-mail address in the sbRIO.

The second button begins a mailbox registration sequence, where two fingerprint scans are performed to store the fingerprint into memory.

The sbRIO prepares for the input of the associated e-mail address. The dot-matrix character display is activated.

The third button cycles through characters for e-mail entry, A-Z, 0-9, “.”, and “@”. --Because of limitations, only @auburn.edu addresses can be serviced, so the @ symbol ends email entry.

If an incorrect character has been selected, pressing the delete button will cancel the current address input.

Locking MechanismElectric Dead-Bolt Lock, Fail Safe [5]

168GSCD Security Wired Door Controls Electric Bolt Lock [6]

Rutherford 3510 Electric Cabinet Lock [7]

Rutherford 3513 Electric Cabinet Lock [8]

Cost 5 5 4 3

Size 1 1 5 4

Ease of Installation 1 1 5 5

Instruction availability 1 1 5 5

Security 5 5 2 5

Totals 13 13 21 22

 Table 2: Pugh Matrix evaluating lock choice. 5* = high, 1 = low.

*The numbers in the Pugh Chart represent the research-based opinions of Stephanie Smith

Figure 8: Rutherford 3510MS Electric Cabinet Lock

Hardware A BJT switch is used to turn the lock on and off as shown in

Figure 9. A low signal is sent to the base of the BJT, high positive,

low negative. A 510 ohm resistor used on base of BJT Magnets push door open when unlock

Figure 9: Electronic Lock BJT Switch Circuit Software (Figure 10) A: The fingerprint scanner “scan is good” response and manual lock

override are input into the sbRIO. B: The two inputs are combined using an “or” function that outputs a

“True” Boolean constant if either input is true. C: The output of this “or” function is fed in to the selector terminal of a

case structure D: It is also fed through another “or” function that illuminates the green

LED for either a good fingerprint scan, or successfully opening the manual lock.

E: This sends a logic high to unlock the lock meaning that one of the pushbuttons has been pressed.

F: After 0.3 seconds, a false constant is sent out to the port connected to the lock to reclose it.

 

A

BE

F

C

D

Figure 10: Electronic Lock Control Block Diagram in LabVIEW (True Case) Manual Lock Override A manual key lock (figure 11) triggers a switch (figure 12) which sends a

logic high to the sbRIO, as if a positive fingerprint had been scanned.

 Figure 11: Amico 16.5mm diameter cabinet tool box

quarter turn cam lock

Figure12: Manual Lock Override Switch

Figure 13: Mailbox unlock/lock process flow

chart

Mail DetectionTable 3: The suggested sensors were rated on a scale of 1* to 5,

1 being least desirable, 5 most desirable, based on three criteria.

Figure 17: LabVIEW FPGA code for idling the dot matrix display when no email input is necessaryTable 4: Description of the labels from Figure 17

Figure Label Description

A Registration button Input from FPGA.

B Wait functions that pause briefly to avoid any bouncing from the button press.

C Email Input Boolean from Real-Time Operating System. True if there was a successful fingerprint scan and the email address is now ready to be input.

D Cluster of Boolean outputs to send to the dot matrix representing each individual character.

E Selects the next value to be sent out to the dot matrix. “Blank” if false, and “A” if true.

&ŝŐƵƌĞϭ O͗D ĂŝůďŽdžǁ ŝƚŚ ŽŵƉŽŶĞŶƚ >ĂLJŽƵƚ

Page 2: SECO

SECO

Team Members

Secure Electronic Communications in Offices

Timeline Proposal Phase (8/16/2012 – 9/5/2012):

Project Brainstorming Management approach Motion Detector Research and

Ordering Email vs. SMS Text Research Fingerprint Scanner Research and

Ordering Mailbox Research and design NI Singleboard RIO donation –

coordinate with NI Sales Lock Research and Ordering Standards Research Website design

Cycle 1 (9/5/2012 – 10/3/2012) Project Organization Build Fingerprint Scanner Program Fingerprint Scanner Build Lock System Program Locking System Program Email system Assemble Mailbox LabVIEW Build Your Own Embedded

Systems Course Cycle 2 (10/3/2012 – 11/14/2012)

Finalize Fingerprint Scanner accuracy Test Lock System Security Finalize Total Mailbox Assembly Project Organization Integrate All Systems

Finalize Project (11/14/2012 – 11/28/2012) Wrap Up (11/28/2012)

Impact Economic Extra expenditure to companies could cause

increased costs or lowered salaries. Save money if it prevented property from being

stolen. Social Possible employee distrust as people assume that

increased security means there was an increase in dishonesty.

Increased security and confidence in delivering valuable or confidential materials via mail.

Ethical Employees forced to record their fingerprint. Not directly prohibited by HIPAA or other laws. - Manual override allows alternate means of

entry.

Intended Use of Final Project The finished prototype of this secure mailbox system shall be donated to the Electrical Engineering Department of the Auburn University Samuel Ginn College of Engineering. It may be used as an example for future designers and if the product is sufficiently successful and desired, may be installed for use in the office of the department. If it is deemed that the parts of this prototype are better used in another capacity in another project, the prototype may be dismantled and recycled as is necessary.

User Contact

Project Planning

Project Description

Figure 18: LabVIEW FPGA code for character selection and dot matrix interaction

Table 5: Description of the labels from Figure 18Figure Label Description

A Select button Input from FPGA.B Current Letter case structure. Outputs the current letter to the dot matrix.C Next letter case structure. Only changes to the next value if the select button was pressed. Otherwise, remains

on current value.

D Cluster of Boolean outputs to send to the dot matrix representing each individual character.

E Dot Matrix outputs from FPGA.F Wait functions that pause briefly to avoid any bouncing from the button press.

G Registration Button Input from FPGA used to select a character. H Outputs the letter selected to be sent to the Real-Time code for concatenation into an email address.

I Deletion Button Input. This aborts the email input. J This “or” and “not” function determine whether the email has been completely entered and the dot matrix

should be blanked out, or if there are still letters to be added.

Figure 19: LabVIEW Real-Time code for concatenating selected and letters and creating an email address

 Table 6: Description of Labels from Figure 19

Figure Label Description

A Input values from the FPGA system running.B Waits for a good scan response after registration request.C Sends a value to turn on the dot matrix display.D Extracts the first index of the array of stringsE Removes any extra characters in the string prior to adding valuesF Gets the letter selected value, letter selected boolean (T/F), current letter and deletion values.

G Concatenate string function. This is where the email address string is joined.H Completed string is put back in to the array of strings and successful address is stored into a variable.

I Email is sent if an email address was successfully input into the system.

Jimmie Lyn Jackson Matthew Thompson Stephanie Smith

Hassan ElrhazouaniDella Killingsworth

SECO is an electronic mailbox designed to work in office settings. SECO is a physical mailbox as seen in post offices or outside homes, but with high tech advancements and security features. The mailbox is made from a secure material to prevent breaking and entering. The owner who uses SECO no longer needs to remember a key to collect their mail: the mailbox has a fingerprint identification lock to release the door when it recognizes the owners fingerprint. For cases where the fingerprint identification needs to be overridden, a key lock is used to access the box.When mail is placed though the slot, an infrared transmitter and receiver reacts due to light being blocked. This signals that mail has been placed in the mailbox. Immediately upon receiving mail an email is sent automatically from SECO to the owner. Having this form of mail notification, the owner no longer has to make a special trip to check their mailbox, nor worry about the security of their correspondence. Project Planning

Management

Proposal• Team members researched a component and made a recommendation on the part to be used

Cycle 1• Programming: Stephanie and Hassan• Hardware and Fingerprint Scanner: Jimmie Lyn and Matthew• Box Construction: Della

Cycle 2• Component assembly: Jimmie Lyn and Della• Hardware and Software testing: Matthew, Stephanie, and Hassan

Facilities Broun Hall Greene Room Broun Hall Senior Design Lab Team member’s homes Budget

Additional Unit cost:

Hours

Task #

Task Description (Add rows as needed) Cycle planned for completion

Total planned hours

Planned hours this cycle

Status (% complete)

Actual hours this cycle

Total hours

1 Administration 2 90 45 83% 11.95 26.72 Communication – written reports, oral

presentations, website2 150 75 70% 13.08 80.8

33 Team Meetings 2 144 72 83% 58.75 98.7

54 Box construction 1 30 15 67% 27.63 36.2

95 Fingerprint scanner development 1 50 25 98% 102.5 127.

756 Locking mechanism development 1 16 8 95% 11 197 Mail detected and signal transmitted 1 30 15 95% 20.5 33.58 Software Programming 2 90 60 93% 30.5 90.1

7Planned Total

600 315 Actual Total

275.91 512.99

  Task Total Hours

Name 1 2 3 4 5 6 7 8 Week Cycle Project

Jimmie Lyn Jackson

0 0 2 1 2 0 2 0 7 39.25 84

Matthew Thompson

0 0 2 0 8 0 0 0 10 53.5 97.5

Hassan Elrhazouani

0 0 2 0 1 1 2 0 6 46.75 93.75

Stephanie Smith 0 0 2 0 10 0 0 5.5 17.5 85.5 137.75

Della Killingsworth

1.25 0 2.5 2.3 0 0 0 0 6.05 50.91 99.99

TOTALS 1.25 0 10.5 3.3 21 1 4 5.5 46.55 275.91 512.99

Table 7: Description of Task Hours (Planned vs. Actual)

Table 8: Description of Individual Hours Spent on Task  Task Total Hours

Name 1 2 3 4 5 6 7 8 Week Cycle Project

Jimmie Lyn Jackson 0 12 2 7 0 2 2.5 0 25.5 64.75 109.5

Matthew Thompson 0 3 2 5 5 5 0 0 20 73.5 117.5

Hassan Elrhazouani 0 3 2 0 0 8 6 0 19 65.75 112.75

Stephanie Smith 0 6 2 4 4.25 6.75 7 7 37 122.5 174.75

Della Killingsworth 9.35 15.6 4 3.3 0 0 0 0 32.25 83.16 132.24

TOTALS 9.35 39.6 12 19.3 9.25 21.75 15.5 7 133.75 409.66 646.74