SlideShare una empresa de Scribd logo
1 de 25
Master of Science in Computer Engineering
Class of Pervasive System by:
Ioannis Chatzigiannakis
1
Mattia Brunetti
https://it.linkedin.com/
in/mattiabrunetti
mattiab31@gmail.com
Marco Casini
https://it.linkedin.com/i
n/marcocasini2
marcoktm89@gmail.co
m
ABOUT US
2
https://github.com/mattiab31/SmartDoorBell
THE PROBLEM
To control the door when you
are not at home.
To control the hall of an office
without need to be there.
To control automatic gate
without to be in the range.
3
There are many situation where is hard
to control your «door»!
OUR SOLUTION
We developed a «SmartDoorBell», a device
that is always connected to internet, to have
a remote control of your door, simply using
your smartphone!
4
There are some similar solutions but:
1) Really expensive – more than 200 $
2) Need a special app to work
3) Are not flexible (e.g. you can’t turn on
lights)
POSSIBLE SCENARIOS
The purpose of this device is to help people
to have easly access at their house and to
have a remote control of a door.
The focus of this project is about the
domestic use of this product.
5
6
POSSIBLE SCENARIOS
We found three main situations:
6
Owner: with beacon
Friends: with code
Strangers: ring the bell
7
POSSIBLE SCENARIOS 1/3
7
Owner: with beacon
Owner of the house has a beacon device that
works like a real key. When he comes back home
the «SmartDoorBell» recognise him and unlock
the door.
8
POSSIBLE SCENARIOS 2/3
8
Friends: with code
Friends or everyone that would enter in the
house, and know the security code, can do that
simply typing the code on the numeric keyboard
on the door.
9
POSSIBLE SCENARIOS 3/3
9
Strangers: ring the bell
Every time that someone ring the bell the owner
receives a Telegram message with a photo and
he can decide to take some decisions using
Telegram (e.g. take a photo, send/receive vocal
messages…)
THE HARDWARE
10
THE SOFTWARE
11
Script Button
Script OpenDoorScript Secure
Code
Our BOT Telegram runs on Raspberry Pi
Script Multi-Media
BOT COMMANDS
/roll  reply with a random integer, used for test
/time  reply with a current time, used for test
/photo  take a photo and send it to the owner
/video  take a video and send it to the owner
/sound  play an audio message from the Raspberry speaker
/open  unlock the door
/openL  unlock the door and turn on the light for 10 seconds
/light  turn on the light for 10 seconds
/reboot  reboot the Raspberry Pi
/shutdown  shutdown the Raspberry Pi
/help  send a document with the list of commands
12
PROJECT PROGRESS REPORT
SET UP
HARDWARE
SET UP
SOFTWARE
IMPLEMENT
STRANGER
SCENARIO
FAIL TO
IMPLEMENT
API
TELEGRAM
ON
ANDROID
IMPLEMENT
FRIENDS
SCENARIO
IMPLEMENT
OWNER
SCENARIO
13
WHAT’S MISSING – THE OWNER
For the owner side we want that when he
comes back home the door will
automatically open.
We tried to send an automatic message to our
bot with the Telegram API but it’s not so
easy to use.
14
We decided to change the
implementation of this part.
WHAT'S WRONG WITH TELEGRAM?
https://yalantis.com/blog/whats-
wrong-telegram-open-api/
15
1. Telegram’s source code is not an SDK or a library.
2. Strange pieces of code, like setTextColor(0xff757575).
3. Magic numbers for int values like “42540” which are passed as flag values.
4. “If-Else” statements that are too long and too, and really long methods.
(i.e. 300 lines of code in one method).
5. Spaghetti code and copy-paste.
6. Only three Activities in such a huge project.
7. Many classes *activity, which extendBaseFragment, which is not actually a
Fragment.
HOW TO SOLVE - CASE 1
We developed a simple application for Android that
allow the owner to open the door, with just few
click, when he enters in the range of the beacon.
16
We would use an App like a real key!
PROS
Easy to implement
Don’t need additional
hardware
CONS
It’s not completly
automated
Need to have a special
app
HOW TO SOLVE - CASE 2
We use Raspberry Pi as a beacon reciever, and the
beacon of the owner as a trasmitter. When the
Raspberry catches the signal, it performs an
action.
17
We would use a Beacon like a real key!
PROS
Completly automated
Don’t need special app
CONS
Hard to implement
You must have a beacon
to enter
18
FIRST PROTOTYPE
19
SECOND PROTOTYPE
20
THIRD PROTOTYPE
21
LAST PROTOTYPE
22
THE «FINAL» PRODUCT
23
24
QUESTIONS?
SUGGESTIONS
?
IDEAS? 25

Más contenido relacionado

La actualidad más candente

New Technology Presentation
New Technology PresentationNew Technology Presentation
New Technology Presentation
kmn3973
 
Voice Based Home Automation
Voice Based Home AutomationVoice Based Home Automation
Voice Based Home Automation
Sumukh Athrey
 

La actualidad más candente (20)

Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
Voice Control Home Automation
Voice Control Home AutomationVoice Control Home Automation
Voice Control Home Automation
 
Electronic skin
Electronic skinElectronic skin
Electronic skin
 
Home automation system
Home automation systemHome automation system
Home automation system
 
SMART NOTE TAKER
SMART NOTE TAKERSMART NOTE TAKER
SMART NOTE TAKER
 
My Final Year Project - Individual Control Home Automation System
My Final Year Project - Individual Control Home Automation SystemMy Final Year Project - Individual Control Home Automation System
My Final Year Project - Individual Control Home Automation System
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
M voting
M votingM voting
M voting
 
New Technology Presentation
New Technology PresentationNew Technology Presentation
New Technology Presentation
 
Touchless touch screen
Touchless touch screenTouchless touch screen
Touchless touch screen
 
IoT Based Home Automation System Presantation
IoT Based Home Automation System PresantationIoT Based Home Automation System Presantation
IoT Based Home Automation System Presantation
 
Virtual personal assistant
Virtual personal assistantVirtual personal assistant
Virtual personal assistant
 
CHILD SAFETY WEARABLE DEVICE
CHILD SAFETY WEARABLE DEVICECHILD SAFETY WEARABLE DEVICE
CHILD SAFETY WEARABLE DEVICE
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Voice Based Home Automation
Voice Based Home AutomationVoice Based Home Automation
Voice Based Home Automation
 
Blackberry Technology ppt
Blackberry Technology pptBlackberry Technology ppt
Blackberry Technology ppt
 
Traffic light controller
Traffic light controllerTraffic light controller
Traffic light controller
 
Global wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentationGlobal wireless e voting powerpoint presentation
Global wireless e voting powerpoint presentation
 
Hawk Eye Technology ppt
Hawk Eye Technology pptHawk Eye Technology ppt
Hawk Eye Technology ppt
 

Destacado

Freewire Berkeley final presentation
Freewire Berkeley final presentationFreewire Berkeley final presentation
Freewire Berkeley final presentation
Stanford University
 
A Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon MarketingA Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon Marketing
G3 Communications
 

Destacado (20)

Sensoro beacon review
Sensoro beacon review Sensoro beacon review
Sensoro beacon review
 
Bfonics beacons supermarket
Bfonics beacons supermarketBfonics beacons supermarket
Bfonics beacons supermarket
 
Power Group presentation Medigroup stock-movement
Power Group presentation Medigroup stock-movementPower Group presentation Medigroup stock-movement
Power Group presentation Medigroup stock-movement
 
Raspberry pi 2 demo
Raspberry pi 2 demoRaspberry pi 2 demo
Raspberry pi 2 demo
 
Basics of Raspberry Pi
Basics of Raspberry PiBasics of Raspberry Pi
Basics of Raspberry Pi
 
Eddystone beacons demo
Eddystone beacons demoEddystone beacons demo
Eddystone beacons demo
 
Candra lab gis v 1
Candra lab gis v 1Candra lab gis v 1
Candra lab gis v 1
 
Home Automation with perl
Home Automation with perlHome Automation with perl
Home Automation with perl
 
Home alarm & automation
Home alarm & automationHome alarm & automation
Home alarm & automation
 
Home Automation
Home AutomationHome Automation
Home Automation
 
Freewire Berkeley final presentation
Freewire Berkeley final presentationFreewire Berkeley final presentation
Freewire Berkeley final presentation
 
A Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon MarketingA Retailer's Guide To iBeacon Marketing
A Retailer's Guide To iBeacon Marketing
 
Introduction to Raspberry PI
Introduction to Raspberry PIIntroduction to Raspberry PI
Introduction to Raspberry PI
 
iBeacon and its Biz Model
iBeacon and its Biz ModeliBeacon and its Biz Model
iBeacon and its Biz Model
 
Eddystone beacons: Everything you need to know
Eddystone beacons: Everything you need to knowEddystone beacons: Everything you need to know
Eddystone beacons: Everything you need to know
 
Road Beacon System (RBS) project presentation
Road Beacon System (RBS) project presentationRoad Beacon System (RBS) project presentation
Road Beacon System (RBS) project presentation
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using Arduino
 
50 ideas for using beacons
50 ideas for using beacons50 ideas for using beacons
50 ideas for using beacons
 
Movement Sensed Automatic Door Opening System
Movement Sensed Automatic Door Opening SystemMovement Sensed Automatic Door Opening System
Movement Sensed Automatic Door Opening System
 
IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3IOT Based Home Automation using Raspberry Pi-3
IOT Based Home Automation using Raspberry Pi-3
 

Similar a Smart DoorBell - Make your door smart with Raspberry Pi!

44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Nick Galbreath
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
shekar M
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
OKsystem
 
Is data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceIs data secure on the password protected blackberry device
Is data secure on the password protected blackberry device
STO STRATEGY
 

Similar a Smart DoorBell - Make your door smart with Raspberry Pi! (20)

Veilig communiceren power point presentatie
Veilig communiceren power point presentatieVeilig communiceren power point presentatie
Veilig communiceren power point presentatie
 
Hacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TVHacking, Surveilling, and Deceiving Victims on Smart TV
Hacking, Surveilling, and Deceiving Victims on Smart TV
 
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus44CON 2014 - Switches Get Stitches,  Eireann Leverett & Matt Erasmus
44CON 2014 - Switches Get Stitches, Eireann Leverett & Matt Erasmus
 
Droidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensicsDroidcon it-2014-marco-grassi-viaforensics
Droidcon it-2014-marco-grassi-viaforensics
 
Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013Faster Secure Software Development with Continuous Deployment - PH Days 2013
Faster Secure Software Development with Continuous Deployment - PH Days 2013
 
Hands Company - Deck
Hands Company - DeckHands Company - Deck
Hands Company - Deck
 
Hacking the Kinect with GAFFTA Day 1
Hacking the Kinect with GAFFTA Day 1Hacking the Kinect with GAFFTA Day 1
Hacking the Kinect with GAFFTA Day 1
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
 
Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -Smart TV Security - #1984 in 21st century -
Smart TV Security - #1984 in 21st century -
 
pentest mobile app issue
pentest mobile app issuepentest mobile app issue
pentest mobile app issue
 
Two Hours of Code - IoT and Cloud
Two Hours of Code - IoT and CloudTwo Hours of Code - IoT and Cloud
Two Hours of Code - IoT and Cloud
 
Smart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones SecuritySmart Cards & Devices Forum 2012 - Smart Phones Security
Smart Cards & Devices Forum 2012 - Smart Phones Security
 
Golden droplets webinar table of content
Golden droplets webinar table of contentGolden droplets webinar table of content
Golden droplets webinar table of content
 
ppt2 (1).pptx
ppt2 (1).pptxppt2 (1).pptx
ppt2 (1).pptx
 
DISABLED WORKERS
DISABLED WORKERSDISABLED WORKERS
DISABLED WORKERS
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
Human Firewall - IoT presentation
Human Firewall - IoT presentationHuman Firewall - IoT presentation
Human Firewall - IoT presentation
 
Is data secure on the password protected blackberry device
Is data secure on the password protected blackberry deviceIs data secure on the password protected blackberry device
Is data secure on the password protected blackberry device
 
TxJS 2011
TxJS 2011TxJS 2011
TxJS 2011
 
iLabs Toolbox Javashare 2008
iLabs Toolbox Javashare 2008iLabs Toolbox Javashare 2008
iLabs Toolbox Javashare 2008
 

Último

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Smart DoorBell - Make your door smart with Raspberry Pi!

  • 1. Master of Science in Computer Engineering Class of Pervasive System by: Ioannis Chatzigiannakis 1
  • 3. THE PROBLEM To control the door when you are not at home. To control the hall of an office without need to be there. To control automatic gate without to be in the range. 3 There are many situation where is hard to control your «door»!
  • 4. OUR SOLUTION We developed a «SmartDoorBell», a device that is always connected to internet, to have a remote control of your door, simply using your smartphone! 4 There are some similar solutions but: 1) Really expensive – more than 200 $ 2) Need a special app to work 3) Are not flexible (e.g. you can’t turn on lights)
  • 5. POSSIBLE SCENARIOS The purpose of this device is to help people to have easly access at their house and to have a remote control of a door. The focus of this project is about the domestic use of this product. 5
  • 6. 6 POSSIBLE SCENARIOS We found three main situations: 6 Owner: with beacon Friends: with code Strangers: ring the bell
  • 7. 7 POSSIBLE SCENARIOS 1/3 7 Owner: with beacon Owner of the house has a beacon device that works like a real key. When he comes back home the «SmartDoorBell» recognise him and unlock the door.
  • 8. 8 POSSIBLE SCENARIOS 2/3 8 Friends: with code Friends or everyone that would enter in the house, and know the security code, can do that simply typing the code on the numeric keyboard on the door.
  • 9. 9 POSSIBLE SCENARIOS 3/3 9 Strangers: ring the bell Every time that someone ring the bell the owner receives a Telegram message with a photo and he can decide to take some decisions using Telegram (e.g. take a photo, send/receive vocal messages…)
  • 11. THE SOFTWARE 11 Script Button Script OpenDoorScript Secure Code Our BOT Telegram runs on Raspberry Pi Script Multi-Media
  • 12. BOT COMMANDS /roll  reply with a random integer, used for test /time  reply with a current time, used for test /photo  take a photo and send it to the owner /video  take a video and send it to the owner /sound  play an audio message from the Raspberry speaker /open  unlock the door /openL  unlock the door and turn on the light for 10 seconds /light  turn on the light for 10 seconds /reboot  reboot the Raspberry Pi /shutdown  shutdown the Raspberry Pi /help  send a document with the list of commands 12
  • 13. PROJECT PROGRESS REPORT SET UP HARDWARE SET UP SOFTWARE IMPLEMENT STRANGER SCENARIO FAIL TO IMPLEMENT API TELEGRAM ON ANDROID IMPLEMENT FRIENDS SCENARIO IMPLEMENT OWNER SCENARIO 13
  • 14. WHAT’S MISSING – THE OWNER For the owner side we want that when he comes back home the door will automatically open. We tried to send an automatic message to our bot with the Telegram API but it’s not so easy to use. 14 We decided to change the implementation of this part.
  • 15. WHAT'S WRONG WITH TELEGRAM? https://yalantis.com/blog/whats- wrong-telegram-open-api/ 15 1. Telegram’s source code is not an SDK or a library. 2. Strange pieces of code, like setTextColor(0xff757575). 3. Magic numbers for int values like “42540” which are passed as flag values. 4. “If-Else” statements that are too long and too, and really long methods. (i.e. 300 lines of code in one method). 5. Spaghetti code and copy-paste. 6. Only three Activities in such a huge project. 7. Many classes *activity, which extendBaseFragment, which is not actually a Fragment.
  • 16. HOW TO SOLVE - CASE 1 We developed a simple application for Android that allow the owner to open the door, with just few click, when he enters in the range of the beacon. 16 We would use an App like a real key! PROS Easy to implement Don’t need additional hardware CONS It’s not completly automated Need to have a special app
  • 17. HOW TO SOLVE - CASE 2 We use Raspberry Pi as a beacon reciever, and the beacon of the owner as a trasmitter. When the Raspberry catches the signal, it performs an action. 17 We would use a Beacon like a real key! PROS Completly automated Don’t need special app CONS Hard to implement You must have a beacon to enter
  • 18. 18
  • 24. 24

Notas del editor

  1. Facile uso anche in condominio
  2. raspbian