Vous êtes sur la page 1sur 23

[Mikuni Co.

] Technical Report

[Wireless Lock] KL3083

1. Introduction

The Wireless Lock is best characterized as a small sized, regulated hardware


development. This idea comes out from when we are doing survey to the public, many
people said that they are got problem especially leaving key and theft issues. It cause may
be others irresponsible people already duplicate that key for their self interest especially
happen in hostel. Refer to the problems we are trying to overcomes it by create new
alternative which is wireless lock. We are only use Bluetooth technology in mobile cell to
replace conventional key. Why we are choosing mobile cell to implement this wireless
key lock technology? Based on our survey also, we find that majority Malaysian have
this Bluetooth technology in phone and there are also preferred bring their phone rather
than other stuff. The project was conducted in early December 2009 and completed in
middle March 2010. The project was carried out area universities except the purchase of
goods for this project. The wireless lock allows you to use a Bluetooth-Enabled phone or
PDA as a key to lock and unlock almost any electronically controlled access control
device such as a door lock, gate, and alarm or garage door. The wireless lock is a
Bluetooth based electronic relay unit that installs in the secure place in your house, office
etc. By leaving your phone’s Bluetooth setting in Discovery mode, the wireless lock will
detect your phone when you walk into range (approximately 3-10 feet). When the
presence of your phone is detected, the wireless lock will required pairing then send a
message requiring your username and password number for authentication and upon
confirmation it will unlock the door, open the gate or disable your alarm. An unlimited
number of Bluetooth-enabled devices can be registered but only few passwords can be set
or saved on it, so it will work for the whole family. No software is required on the phone
or PC. The most common application for the wireless lock is as an access control system
for door locks. The wireless lock unit will be connected to an electric door strike, which
will be triggered to open your door after your username and password be confirmed by
the system. The lock will remain open for while which it will return to a normally locked.
Page 1 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

2. Purpose

The purpose of this technical report is to define the objectives, design of product and
specification to be used in the commercial business. This report will:

• Identify the requirement of the product.


• Describe the product design.
• Describe the specification of this product..
• Describe the limitation and goodness of this product
• Determine the cost of product.

3. Standard

A number of standards will be used to control the product development process. Any
noncompliance of these standards is expected to be minimal and will be handled on a
case-by-case basis. Non-compliance to these standards must be approved and noted in the
relevant review document or notes. ASCII stands for American Standard Code for
Information Interchange. Computers can only understand numbers, so an ASCII code is
the numerical representation of a character such as 'a' or '@' or an action of some sort.
ASCII was developed a long time ago and now the non-printing characters are rarely
used for their original purpose. Below is the ASCII character table and this includes
descriptions of the first 32 non-printing characters. ASCII was actually designed for use
with teletypes and so the descriptions are somewhat obscure. If someone says they want
your CV however in ASCII format, all this means is they want 'plain' text with no
formatting such as tabs, bold or underscoring - the raw format that any computer can
understand. This is usually so they can easily import the file into their own applications
without issues. Notepad.exe creates ASCII text, or in MS Word you can save a file as
'text only'.

4. Objective

Page 2 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

The following are the main objectives of the product are to produce a product which changes the
key by Bluetooth. This product also has a system that has security fiction to prevent the theft.
These products of these objectives will be identifiable, baseline, and traceable. In addition,
change control and problem reporting will be applied to the baseline products.

The following activities will accomplish the objectives of the product development process:

o Develop high-level product requirement (design product)

o Develop the software architecture that can handle and support many output
requirements in one time.

o Decompose the high-level requirement into low-level requirement that align to the
software architecture inside the product. Derive any additional requirement
necessary to support the software architecture.

o Produce the good product without any problem.

o Verify that our product work as what we plan.

o Traceability will be maintenance from the software and hardware requirement to


the product design requirements (and, as a result, to the product architecture).
Product verification test will be traceable to the product requirement

o Validation of the product against the function requirements.

Page 3 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

5. Product

5.1 Overview

The wireless locks actually a combination architecture the software and hardware. First, the
customer will use a hand phone as a key. Then they send a key in txt file by Bluetooth. After that
it’s accepted by the computer which like control the server. After that server will give response
and send to signal to our motor and the door will open. This figure below showed the overview
of our product.

5.2 Requirement

Page 4 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

These products have some requirement for fulfill it:

⇒ Using the txt file as a key

⇒ The data to transfer from hand=phone to server must using the Bluetooth
technology

⇒ The server can control data for many room

⇒ The one PIC can control many room.

5.3 Design

5.3.1 Block Diagram

5.3.2 Flow Chart

Page 5 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

5.3.3 Circuit

Page 6 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

PC Rx
PC Tx

C1
C2
1u
5 4 U2 5V
1u
C2- C2+
6
VS- BYPASS2 ERROR2 DETECT2
2
VS+ SW-SPST LED-RED DOOR2 SW-SPST
LED-GREEN
8 9
R2IN R2OUT
7 10
T2OUT T2IN
13 12
R1IN R1OUT
14 11
T1OUT T1IN

C1- C1+

3 1 MAX232

U1 R1
13
OSC1/CLKIN RB0/INT
33 R2 BYPASS1 DETECT1
14
OSC2/CLKOUT RB1
34 R3
1k SW-SPST ERROR1 DOOR1 SW-SPST
35 R4 LED-RED LED-GREEN
RB2 1k
2 36 R5
RA0/AN0 RB3/PGM 1k
R10 3
RA1/AN1 RB4
37 R6
1k
4 38
10k
5
RA2/AN2/VREF-/CVREF RB5
39
R7
1k
RA3/AN3/VREF+ RB6/PGC R8
1k
C3 C4 6
RA4/T0CKI/C1OUT RB7/PGD
40
1k ALARM
1u 1u 7 R9
RA5/AN4/SS/C2OUT 1k
15
RC0/T1OSO/T1CKI
C5 8
RE0/AN5/RD RC1/T1OSI/CCP2
16
1k
1u 9 17 LED-RED
RE1/AN6/WR RC2/CCP1
10 18
RE2/AN7/CS RC3/SCK/SCL
23
RC4/SDI/SDA
1 24
MCLR/Vpp/THV RC5/SDO
25
RC6/TX/CK
RC7/RX/DT
26 BYPASS4 DETECT4
R15 SW-SPST ERROR4 DOOR4 SW-SPST
19 R16 LED-RED LED-GREEN
RD0/PSP0
20 R17
1k
RD1/PSP1
21 R18
1k
RD2/PSP2
22 R19
RD3/PSP3 1k
27 R20
1k
RD4/PSP4
28 R21
1k
RD5/PSP5
29 R22
1k
RD6/PSP6
30 1k
RD7/PSP7
1k
PIC16F877A

BYPASS3 DETECT3
SW-SPST ERROR3 DOOR3 SW-SPST
LED-RED LED-GREEN

Page 7 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

5.3.4 PCB

Page 8 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

5.3.5 PIC CODING

#include<htc.h>
#include<pic.h>

#define _XTAL_FREQ 2000000

__CONFIG(0x3F32);

#define door_detect1 RB7


#define door_detect2 RB3
#define door_detect3 RD7
#define door_detect4 RD3

#define door_open1 RB6


#define door_open2 RB2
#define door_open3 RD6
#define door_open4 RD2

#define error1 RB5


#define error2 RB1
#define error3 RD5
#define error4 RD1

#define bypass1 RB4


#define bypass2 RB0
#define bypass3 RD4
#define bypass4 RD0

#define alarm RC0

#define uart_tx RC6

#define tx_tris TRISC6


#define uart_rx RC7
#define rx_tris TRISC7

void setup(){

TRISB = 0b10011001;
PORTB = 0b00000000;

TRISD = 0b10011001;
Page 9 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

PORTD = 0b00000000;

TRISC = 0b10000000;
PORTC = 0b00000000;

void read(){

SPBRG = 129;
TXSTA = 0b00100100;
RCSTA = 0b10010000;

while(!RCIF){

}
}

void delay(unsigned int x){

for(int i=0; i<=x; i++){


__delay_ms(10);
}
}

void main(){

setup();

while(1){

int password = 0;
int c1door1;
int c2door1;
int c3door1;
int c1door2;
int c2door2;
int c3door2;
int c1door3;
int c2door3;
int c3door3;
int c1door4;
int c2door4;
int c3door4;

if(uart_rx == 0){
read();
password = RCREG;
}

Page 10 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

//************************************************ DOOR 1 START


*****************************************************************
//***************************************************************************
****************************************************

if( password == 97 || bypass1 == 1){


door_open1 = 1;
c2door1 = 1;
}

if( door_detect1 == 1 ){
delay(50);
c3door1 = 1;
}

if( door_detect1 == 0 && c3door1 == 1 ){


delay(50);
door_open1 = 0;
c2door1 = 0; c3door1 = 0;
}

if( password == 49 ){error1 = 1; delay(1000); error1 = 0;error1 =


1; delay(1000); error1 = 0;}

if( door_detect1 == 1 && c2door1 != 1 ){ error1 = 1; alarm = 1;}

//***************************************************************************
****************************************************
//****************************************************** DOOR 2 START
***********************************************************

if( password == 98 || bypass2 == 1 ){


door_open2 = 1;
c2door2 = 1;
}

if( door_detect2 == 1 ){
delay(50);
c3door2 = 1;
}

if( door_detect2 == 0 && c3door2 == 1 ){


delay(50);
door_open2 = 0;
c2door2 = 0; c3door2 = 0;
}

if( password == 50 ){error2 = 1; delay(1000); error2 = 0;error2 =


1; delay(1000); error2 = 0;}

if( door_detect2 == 1 && c2door2 != 1 ){ error2 = 1; alarm = 1;}

Page 11 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

//************************************************************** DOOR 3 START


***************************************************
//***************************************************************************
****************************************************

if( password == 99 || bypass3 == 1){


door_open3 = 1;
c2door3 = 1;
}

if( door_detect3 == 1 ){
delay(50);
c3door3 = 1;
}

if( door_detect3 == 0 && c3door3 == 1 ){


delay(50);
door_open3 = 0;
c2door3 = 0; c3door3 = 0;
}

if( password == 51 ){error3 = 1; delay(1000); error3 = 0;error3 =


1; delay(1000); error3 = 0;}

if( door_detect3 == 1 && c2door3 != 1 ){ error3 = 1; alarm = 1;}

//*************************************************************** DOOR 4
START *************************************************
//***************************************************************************
***************************************************

if(password == 100||bypass4 ==0 ){


door_open4 = 1;
c2door4 = 1;
}

if(door_detect4 == 1){
delay(50);
c3door4 = 1;
}

if(door_detect4 == 0 && c3door4 == 1){


delay(50);
door_open4 = 0;
c2door4 = 0; c3door4 = 0;
}

if(password == 52){error4 = 1; delay(1000); error4 = 0;error4 =


1; delay(1000); error4 = 0;}

if(door_detect4 == 1 && c2door4 != 1){ error4 = 1; alarm = 1;}

Page 12 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

//***************************************************************************
****************************************************
//***************************************************************************
****************************************************

}
}

5.3.6 Basic Operation

a. User will send txt file to server by using the Bluetooth technology.

b. Then the server will compare the data inside txt file with database.

c. If correct, the server will send the signal to the PIC/microcontroller unit and it
will open the door following the txt file.

d. If wrong file, the door cannot open and the wrong signal will show up.

e. If the door open by illegal way, the alarm will ring but the system still running.

Page 13 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

5.3.7 VB FLOW CHART

Page 14 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

5.3.8 SERVER

Code In Visual Basic

Page 15 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

Page 16 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

Database For Server

Interface for Server

Page 17 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

Implementation

The objective of the detail implementation phase is to implement this product phase
by phase. The result of the detail implementation phase will produce the correctly
implements of requirements.
5.4 Generate the idea of our product
5.5 Software Implementation

Software Decription
Microsoft Visual Basic Create the program for server
MPLAB IDE(C) Create the program for PIC
Microsoft Access Create Database for server

5.6 Unit Testing

An assigned engineer will perform unit testing. The assigned engineers will unit test executable
software using test procedures. On a periodic basis, the unit test procedures (for those functions
which have been unit tested) will be run against a complete build of the executable to ensure that
new modules are not introducing errors into previously tested modules. As part of the integration
test, memory and resource bounds checking will be performed. Development is complete when
the all unit test procedures have been run and appropriate disposition made for any discrepancies
found

6. Limitation

Page 18 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

6.1 The signal Bluetooth can detect is range around 10 meters. So the user needs to go
to nearly Bluetooth dongle to send the txt file to server.

6.2 The Bluetooth technology easily to hack. So Hacker can know the key data inside
the phone.

7. Role And Responsibility

The responsibilities of the Mikuni Co. organization on the Wireless Lock Project and the
responsibilities of project members critical to the delivery of products. Table below is
about Roles and Responsibilities

Role Name & Telephone


Senior Engineer Shahrizul Anwar Bin Abu Nahar
017-2349251
Assistant Senior Engineer Mohamed Farid Bin Mohamed Dahari
017-3700947
QA Engineer Mohamad Haniff Bin Mohd Yusof
012-2316254
Engineer Muhammad Izzat Safwan Bin Azizi
017-5560509

8. Appendix

MAX-232

Page 19 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

PIC 16F877A

Page 20 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

Page 21 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

Pin Diagram

ASCII Code
Page 22 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL


[Mikuni Co.] Technical Report

[Wireless Lock] KL3083

Voltage Regulation

Page 23 of 23

COMPANY PROPRIETARY AND CONFIDENTIAL

Vous aimerez peut-être aussi