2. DESIGN REQUIREMENTS



Similar documents
S100. GSM House Alarm System.

GSM Voice Auto Dialer & SMS Sender JC-999

Home Monitoring and Control service provided by Verizon Online LLC

ACCESS CONTROL SYSTEM

EQUIPMENT SPECIFICATIONS

GSM ALARM SYSTEM GCM 8

Your World Made Simple.

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE

HM-W536 Install Guide

AC-115 Compact Networked Single Door Controller. Installation and User Manual

TAB C-6 KEYLESS ACCESS AND SECURITY SYSTEM GUIDELINE

Home Monitoring and Control service provided by Verizon Online LLC

RAD-SYS-NEMA4X-SMS Control Cabinet. Solution guide for SMS-based remote access control and intrusion detection system

With mini cellular module Quick Installation Guide

CMPD Home Security Newsletter

PEZ. System Design and Project Plan. System Design and Project Plan. PEZ (Pills EZ) Dispenser. October 12, Ben Anderson.

INSTALLATION INSTRUCTIONS

Master Code 2. Troubleshooting: Installation 7. Troubleshooting: Door Jamming and Door Handing 8. Troubleshooting: Keypad 12

SECURITY SYSTEM WITH AUTHENTICATION CODE AND ADAPTIVE PHOTO LOG

CipherLab 5100 Time Attendance Utility Manual

ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.

Table of Contents. SMS Messaging SMS MESSAGING Creating SMS Messages & Variables... 5 Message Properties... 6

Common Questions & Answers

NetworX. Security with you in mind. As your needs change, NetworX security systems grow with you.

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Made in America. Phone: (909) Fax: (909) Website: SmartClock.com

4. Backup Assistant will ask you to verify the PIN you assigned to your account, and will remind you to record your PIN for future use.

Your Canadian Security Specialists. Eddie D Orazio

Security with you in mind. As your needs change, NetworX security systems grow with you.

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

Middleborough Police Electronic Security Narrative

Memcom Emergency Telephone

HONEYWELL COMMERCIAL FIRE/BURG PANEL UL LISTING REQUIREMENTS (Compiled from VistaFBPT Installation Instructions V1 Rev A 11/12)

1pcs. 1pcs. 2pcs 1pcs 1pcs 2pcs

Security with you in mind. As your needs change, NetworX security systems grow with you.

Alarm Communications. Implementation Guide

Intrusion. IC60 security meets design. Answers for infrastructure.

An intercom completes any access control system by providing a means for the user of screening visitors before granting access, thereby significantly

Electromagnetic Locking

Guardian Home Security System

INTEGRATED MONITORING RECEIVER WITH MICRO SERVER STAM-IRS. 1. Features. 2. Description

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

CTAP Wireless Equipment Distribution Program Factsheet

Security System Proposal. Rich Destremps

Innovative Electronics for a Changing World INDEX

PCS300 Universal IP Reporting Module V1.0

wireless alarm system reliable protection for small-size buildings

GSM HOME SECURITY SYSTEM

GSM Autodialer Professional GJD700 Speech & Text Autodialer

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

NetworX. Security with you in mind. As your needs change, NetworX security systems grow with you.

Security with you in mind. As your needs change, NetworX security systems grow with you.

DORMA MODEL PS-406BB POWER SUPPLY INSTALLATION INSTRUCTIONS

PowerMaxComplete. All-in-one Professional Grade Wireless Security

PiSector GSM Cellular Wireless Alarm System

Firmware version: 1.10 Issue: 7 AUTODIALER GD30.2. Instruction Manual

PROFESSIONAL HOME ALARM SYSTEM. Important! Please read these instructions carefully.

CSP Combined Series. Telephone Door Entry. with. Proximity Keyfob Access

e-ask electronic Access Security Keyless-entry

YSmart Technology Co.,Ltd

Quick Installation Guide LCD GSM ALARM SYSTEM LH

SECTION DETECTION AND ALARM

Power Management of Cell Sites

Adaptability to Enhanced Security

Always on the Lookout Perfect Protection against Burglary

WITURA CORPORATION SDN BHD

Complete Security One Powerful Solution. GV4 Series integrated security, fire and access control panels D7212GV4, D7412GV4, D9412GV4

USER MANUAL CHARGING STATIONS FOR ELECTRIC VEHICLES

Home Security User Guide

Adaptability to Enhanced Security

- Monitoring Array: a seismic or infrasound array, including from 1(4) to 20 Remote Elements (RE) and one Central Recording Facility (CRF).

Lynx Touch L5100 Technical Training. Z-Wave Setup

NC State University Design and Construction Guidelines Division 26 Fire Alarm Systems

security package When you purchase a Vivint Security package, you can take advantage of industry-leading benefits, including:

Performance/Acceptance Testing of Access Control Systems 1

BUSINESS SECURITY CHECKLIST

the new wireless home alarm system

NOTE: It is the responsibility of the installation organization to have only technically qualified personnel performing the installation.

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

SECURITY & MONITORING QUICK GUIDE

GUIDE GETTING STARTED IMPORTANT SUPPORT RESOURCES

Hortonville School District Door Control System Phase I Request for Proposal July 5th, 2013

SMS Alarm. User Manual

GSM ALARM SYSTEM USER MANUAL

Alliance System Ordering Guide

Troubleshooting: Door Jamming and Door Handing 6. Troubleshooting: Keypad 11. Troubleshooting: Battery 12. Battery FAQ 13

Wireless AUTODIAL GSM SMS Home Alarm Security System 900/ 1800/ 1900Mhz(CK-GSM-9003)

Ⅱ Function Characteristics

securıty HOME home protection 101

Heat Pump GSM Remote Control

in partnership with Virgin Media

Shadow TX(A) Shadow RX

Questions and answers (FAQ) Reliance Protectron Go! Control security system

How To Program An Autodialer

InHome Water Leak Detection Package

DARTMOUTH COLLEGE DESIGN January 3, 2012 & CONSTRUCTION GUIDELINES

AGRI-ALERT 128 TOUCH AGRI-ALERT 800EZE ALARM SYSTEMS

Canada ACN Home Security

Simply Connected, Simply Secure. Security and lifestyle merges with C24 Interactive for total and complete control at your customer s fi ngertips.

WALL TABLET. Smart Home Controller. make your home smart. Control your home from anywhere in the world

Transcription:

2. DESIGN REQUIREMENTS The Smart Lock Security system will give the user the ability to control his or her door lock from the convenience of texting from the user s cell phone. The device can be controlled as long as the user has adequate cell service to send a text message. In addition to controlling the lock with a text message, the device will also have a keypad entry on site, forced entry sensing, and a way to change pin numbers and give or remove unlocking capabilities to other cell numbers. This document contains all technical and practical design constraints. 2.1 Technical Design Constraints For Smart Lock Security to work properly and efficiently, there are certain technical constraints that must be met. These criteria can be found in Table 2.1. Name Wireless Communication Power Supply Alternative Communication Display Forced Entry Detection Table 2.1 Technical Design Constraints Description The device must be able to communicate with the user via Short Message Service (SMS), allowing the user to unlock and to notify the user if the door has been locked or unlocked. The Smart Lock Security system must be powered by a 120VAC source. A backup battery with a current range of 0.75A - 1.5A is required to power the device in the case of a power outage. The device must provide an additional method of access and system configuration at the physical location of the device. The LCD screen must display the correct information to the user. Some of the required information will be a menu with multiple options and further instructions based on user s decisions. The device must be able to detect unauthorized entry when the solenoid is in the lock position. 2.1.1 Communication The device must be able to allow for the user to unlock the door through SMS. If the user does not have access to their cell phone, a keypad will be located on the outside wall of the secured location. A keypad also allows for friends, family, or approved personnel to gain access to the secured area. If someone who is unwelcome acquires knowledge of the code, the owner will have the ability to change the code (discussed in 2.1.4). 2.1.2 Power Supply The device will use 120VAC source. The source must then be converted to 12VDC to control the electronic components. The backup battery must be able to supply at least 12VDC for operation when the 120VAC supply is non-operational. The current needed for the device will range from 0.75 1.5 amps. The backup battery must be capable of powering the Smart Lock Security system for 24 continuous hours.

2.1.3 Alternative Communication Access must be possible from both the interior and exterior of the door the device manages. To facilitate this, the Smart Lock Security device must have two keypads as part of the system. One will be located externally and the other internally. The internal keypad must also function as a means for user input during system configuration. This allows for users to add and remove telephone numbers or alter additional settings. 2.1.4 Display The Smart Lock Security device must be set up for easy user interaction. It must display whether the device is locked or unlocked. Also, the LCD screen must display a helpful menu. This design component will work in conjunction with the internal keypad (2.1.3) and must be located on the internal side of the door. The combined components must allow for system configuration by the user. 2.1.5 Forced Entry Detection The device must be able to detect forced entry when someone is trying to break in. The Smart Lock Security device should also be able to send this information through SMS to the user s phone. 2.2 Practical Design Constraints Similar to the device needing to meet certain technical design constraints, it must also meet practical design constraints. These practical requirements can be found in Table 2.2. Table 2.2 Practical Design Constraints Type Name Description Economic Price The Smart Lock Security device is expected to be $250.00. Manufacturability Size The device must have ten core components to allow for easy interaction with the device. Sustainability Reliability The system is wired directly into the customer s electrical system and is therefore as reliable as the power supply. In case of power outage, the system can be powered from the backup power supply for at least a 24 hour period. Social Compatibility The Smart Lock Security system must be compatible with most door frames (residential, commercial, and industrial). Health & Safety Safety The system will notify the homeowner via SMS if a forced entry is attempted. The user will also be able to secure area with cell phone via SMS.

2.2.1 Economic The Smart Lock Security device is expected to be roughly $250. One of its competitors, Goji Smart Lock, can currently be pre-ordered for $245 [1]. Another competitor, August, has similar features and is $199 [2]. Both products are powered by batteries, where the Smart Lock directly ties into the owner s electrical system [1][2]. Because of this, the Smart Lock Security device will be relatively the same as the most similar competitor costs, and will have an additional feature, forced entry sensing. 2.2.2 Manufacturability The Smart Lock Security device has ten core components that are important in the manufacturing process, three of which are visible and usable by the owner. The components are the external keypad, the internal keypad, the LCD display, the processor, the GSM module, the DC linear solenoid bolt, a directed magnetic switch, a power supply, back-up battery, and a PCB to for remaining components to help control functionality. One of the visible components, the external keypad, must be placed on the outside of the secured area in order for the user to gain on site access. There must be an indoor station that contains the LCD display and the internal keypad that will allow the user to select options from a menu. The largest external area is expected to be less than or equal to 3in. by 6in. as that area should be capable of accommodating all three user visible components. The device is predicted to incorporate an Atmel processor due to availability in prototyping frameworks. In conjunction with the processor a GSM module will be used for wireless communication between the device and the user s cell phone. The locking mechanism of the device will use a DC linear solenoid lock. This will ensure the door will be securely locked. Another component of the device will be a magnetic contact switch that will be used for forced entry sensing. The remaining components are the PCB, power supply, and backup battery, all of which will be located inside of the homeowners wall at the location of the other components of the system. 2.2.3 Sustainability The Smart Lock must be directly wired to the owner s electrical system and is therefore as reliable as the electricity provided to the home. Power outages are generally not frequent, but in case of outage, the Smart Lock must have a backup battery. For further details on the battery, refer back to section 2.1.2. The device must be able to restart without error from a total loss of power. 2.2.4 Social The Smart Lock Security system will be compatible with any cell phone that has the ability to send a text message. The system will also work with most doors and doorways.

2.2.5 Health and Safety With the Smart Lock Security system, homeowners will be able to secure their homes via SMS text. Similarly, the system can be used in commercial and industrial settings in which case the user can verify that the necessary areas are properly secured. The Smart Lock Security system will also include a keypad entry that will allow users to create a pin. This pin number can be provided to authorized people in order for them gain access into the secured home or area. The Smart Lock Security system will also have an emergency backup battery that will allow the system to still operate during power outages. This will ensure that users are not locked in or out of the areas they wish to secure.

References: [1] Features. August, 2013. Web. 12 Sept. 2013. http://www.august.com/faq.html. [2] Goji FAQ. Goji, 2013. Web, 10 Sept. 2013. http://www.gojiaccess.com/home.html.