Beep Keep - Department of Electrical and Electronic Engineering

Transcription

Beep Keep - Department of Electrical and Electronic Engineering
YOUR PERSONAL REMINDER. NEVER LEAVE YOUR THINGS BEHIND.
KIMBERLEY FOK, GUANG YANG, BIQI LIU, GEORGIOS KARAFOKAS,
YIANNIS KATSIDIARIS, RUMESSA RAJA, MAREK WOLOSZYN
1. Introduction
1
2. Feasibility Study and Design Choices
1
2.1 Market Analysis
1
2.2 Existing Competitors
1
2.3 Wireless Connectivity
2
2.4 Issues Regarding the Use of Bluetooth
3
2.5 Power Supply
4
3. Product Design
5
3.1 System Design
5
3.2 Software Design
5
3.3 Hardware Specification
6
4. Tag Design
8
4.1 General Features
8
4.2 Comparison between “BeepNano” & “BeepGoLarge
8
5. Project Management
9
6. Conclusion
9
7. References
10
8. Appendix
1125
Imperial College London
Department of Electrical & Electronic Engineering
Beep Keep
INTRODUCTION
Whatever your lifestyle, it is easy to leave something behind, and can result in serious consequences if it is vital to that
day’s task. Fortunately, with modern technology it is now possible to implement solutions to these problems. Finding
items often requires a tracking device attached to the item and a system that detects these devices in order to track their
position. A connection must be established between the system and its trackers to allow the exchange of information.
Though some of these systems already exist in the market, they are not widely used due to their exorbitant costs.
This report introduces BeepKeep, an electronic reminder system designed by studying existing devices and
technological advances which could improve its capabilities and reduce production costs. With BeepKeep people will
no longer leave their essentials behind. This report will follow the research involved, design and implementation of the
device. We pursue the objective of making small yet durable tags that will take advantage of the capabilities of modern
smart phones.
FEASIBILITY STUDY AND DESIGN CHOICES
Market Analysis
To determine the how our device would have to be implemented and compromised to meet the market expectations, we
conducted a survey on a group of 200 people. The survey was implemented online and distributed to family and friends,
who were also asked to pass along the survey link. Thus we managed to obtain an audience with a large age range and
from varied professional circles. For detailed survey results see
Appendix A.
Firstly, we wanted to ensure that our product would sell. The
survey showed that a promising 78% of the respondents said
they would purchase it, however, only 14% were willing to pay
£40 or more.
Next we needed to determine how big a device would be
acceptable to our market. Only about 60% of the respondents
were willing to use a tag that was not flat (Figure 1). As the
size of the tag is mostly dependent on the power source, we
have to investigate which is the smallest feasible design.
The survey also determined that very few were aware of the
existence of any similar products that are already on the market.
This shows that an aggressive promotional campaign will be
Figure 1: Pie chart showing the maximum
needed to launch BeepKeep.
‘acceptable’ tag size according to the survey
results.
Existing Competitors
There are currently many reminder applications available for smart phones such as ‘Don’t Forget’, ‘Reminders’ by Apple
or ‘Location Reminder’. The latter is just one of many which use GPS to incorporate a location triggered reminding
feature. However the following products incorporate systems that would directly compete with our design.
Loc8tor
Loc8tor is a UK technology company that specializes in GPS tracking devices. Their main target market is home use for
tracking children, or pets, however they have specific products for enterprise and security use. They produce a large range
of products from small trackers to large positioning systems. A product comparable to our specification is the Loc8tor
Lite. Loc8tor Lite uses an independent handset to track the tags. It is the size of a thick credit card (86x54x6mm), and uses
RFID technology to communicate with tracker tags and pinpoint their location using visual and audio cues. It uses
patented production technology to keep its tags small. The tags use two SR54 (Silver Oxide) batteries, which must be
replaced every 2-5 months. The tracking signal has a range of up to 122m in open air, depending on environmental
factors, location and the object being tracked. The typical cost for this system is £45 (tracking handset + 2 tags).
Stick N’ Find
Stick N’ Find [1] is a company that specialises in Bluetooth technology trackers for indoor navigation [2], as well as home
use. The business is divided into Consumer, Business to Business and Indoor Tracking departments that offer suitable
products for each division. The product is a small (size of a coin) tag that contains a Bluetooth 4.0 receiver and a lithium
1
cell watch battery. The user can communicate with the tags via a smart phone app, where the location of the device will be
displayed. The system is also compatible with other apps such as the ‘Maps’ so users can see the last detected location of
their tagged item. The estimated battery life is 1 year (based on 30 min per day usage) and the range is about 30m.
Although the app is free to download, each tag costs around £30.
Tile
A new device, expected to be on the market in the summer of 2014, the ‘Tile’ measures 36x36x4.2mm and is designed to
be attached to a keychain. Tile is also linked to smart devices via Bluetooth 4.0 so that lost keys could be located. The
App uses crowd sourcing, allowing other phones to detect the missing keys should they leave the 50-150 foot range of the
user’s phone and send an alert to your phone. The Tile also boasts a ‘beeping’ built in speaker, to help in finding the
items. The product requires battery changes every 12 months. Pre-order price is $19.95 for a single tag.
Hone
Hone is another system to keep track of lost keys, consisting of a tracker tag attached to a keychain that the Hone app on
smart device can activate, causing it to flash and beep. The system uses Bluetooth 4.0 to detect the distance to the device
and guides the user on a ‘Hot and Cold’ basis using light patterns displayed on the screen. The tracker tag is the size of a
car fob (54x32x15mm), has a 150 foot range and a 6 month battery life (CR2032). The device can be bought for $59.99.
The project was financed by Kickstarter pledges, with a budget of $85,426 provided by 1,132 backers.
Judging by the number and nature of the reviews for each device on amazon.co.uk, Stick N’ Find is currently the best
product on the market with an average 4 star rating (out of 5).
Wireless Connectivity
One of the most important aspects of our project is how the system will connect to its trackers. The technology used must
allow for fast, secure and low power data transmission. The main types of
types of wireless communications that can be used with smart phones are Bluetooth, NFC (Near Field Communication)
and RFID (Radio Frequency Identifications).
Bluetooth
Bluetooth has been one of the most promising wireless tranmission
systems. It communicates via radio waves but only for short distances.
An example of a Bluetooth network (piconet) can be seen on Figure 2.
It consists of a ‘master’ (M) device and ‘slaves’ (S). The master can
exchange data with many slaves, while the slaves can only
communicate back to the master and not between themselves.
Bluetooth provides a short distance connection between the devices
allowing data transfer in a spread spectrum frequency hopping, fullduplex signal at a nominal rate of 1600 hops/sec. Bluetooth can work
Figure 2: Piconets
with different bandwidths such as 2.4 GHz – 2.485GHz (unlicensed
industrial), or ISM (scientific and medical.
Bluetooth has been installed on all phones since 20001, and is therefore readily available to every person that owns a
smartphone. Furthermore, Bluetooth is more immune to noise among other wireless connections, the signal to some extent
can penetrate through solid objects such as walls and can be read in any position by the receiver. Bluetooth devices are
relatively cheap and have a low consumption of power. The technology also addresses security issues by requiring
“pairing” between devices before a connection can be established.
Bluetooth is suitable for implementing in our tags because of a good balance between advantages and drawbacks.
NFC
NFC is a low-range wireless communication technology, which allows two devices to transfer data between them through
radio frequency modulation. The most common applications of NFC technology are in contactless micropayments [3], in
mobile marketing [4] or using the phone instead of badge. NFC tags don’t require a power source since they draw power
from the detecting device while Bluetooth tags need their own power supply. NFC technology also consumes less power
in the smartphone [5]. NFC’s maximum transfer rate is 424 kbps which is significantly slower than that of other standards
such as Bluetooth (up to 24Mbps) [6]. Also, NFC works without pairing which makes it more vulnerable to hackers.
However, the biggest drawback of NFC technology is its range. The current uses of NFC involve touching the tag or
2
approaching it at a maximum distance of 10cm when Bluetooth communication can take place over 100m. This means
that this technology will not be suitable to implement in our system for tracking the tags. The technology is however
suitable to implement a registration system for individual tags that can scan them into the system directly.
RFID
This newly introduced technology can be used in various applications such as reading electronic passports and contactless
payments. It uses radio-frequency magnetic fields to transfer data. It consists of two components; a circuit that is used for
modulation and demodulation of signals (interrogator), and a tag (transponder), which has a microchip contains an
antenna that receives the radio waves from the reader. The system also includes a database where the information of the
tag content is stored. RFID works in a wide range of frequency. Both the reader and the tag must operate at the same
frequency for RFID to work. Its most significant advantage is low power draw. Currently RFID tags can have a lifetime of
over 10 years with a consumption of 100mA/h. This is very low consumption if we compare it with a normal AA battery,
which consumes 2100ma/h. Hence this application can be used for a larger range of communications2. Also its range (c.
90m) is the same as Bluetooth technology.
However a single RFID tag is very expensive (£15) and would increase the cost of the product significantly. Furthermore,
the RFID technology can be very unsecure as RFID tags respond to whoever sends a signal to them. This can lead to
unauthorized access to the user’s data. Since it is a newly developed technology, started no longer than 10 years, these
issues3 have not yet been solved.
For these reasons current RFID technology is unsuitable for our device.
Bluetooth technology, which is a form of wireless communication, was chosen for several advantages over similar forms
of communications. However, although it is an elegant approach for developing BeepKeep, it still raises certain
concerns with privacy and data protection.
Issues regarding the use of Bluetooth technology
Privacy
Many concerns may arise regarding tracking technology. The purpose of the device is to track items that are likely to be
lost or forgotten. However, in order to do users must enable their smartphone’s Bluetooth connectivity. Any Bluetooth
device can identify nearby devices and track their location, if they are ‘visible’ to other devices. This means that the
device and also the Bluetooth tags will be traceable to others [7] as long as they stay within the range of the handheld
tracking them. In the case of a smartphone, it will transmit its signal at 2.4GHz and will be visible to peripheral Bluetooth
devices. As a direct result of Bluetooth tracking, user privacy becomes an issue. Using Bluetooth to track people can be
considered an invasion of their privacy. Most legal systems allow parents to track their children for safety, but in general
tracking people is not allowed without consent. There are already a few products (e.g “Zonith Indoor Positioning System
[8]”) available on the market for consensual tracking of the employees in a workspace. The products main purpose is to
locate lone workers in case of emergency e.g. when they lose consciousness, for security personnel to call back-up or even
in aggressive working environments, for protection.
Of course Bluetooth tracking is limited by it’s own technology. The maximum distance it can work properly is up to 100
metres9 (300 feet) or less if it encounters solid objects such as walls, which doesn’t make it a big concern without using
GPS.
A lot of existing and developing projects are using Bluetooth technology to work properly with peripheral devices or to
improve tracking through closed space. This application of Bluetooth is desirable as long as it doesn’t violate human
rights to privacy and keeps exchanged information encrypted.
Data Protection
Since the introduction of Bluetooth technology mobile devices have been able to send and receive data by tracking other
mobile devices with the same technology [9]. However, this technology can endanger its users because it deals with a lot
of sensitive, private data. The technology can be used to access the device that is using it to connect to other devices or to
intercept the information transported between these devices.
There are 3 distinguishable types of Bluetooth hacking.
Bluejacking is the most “harmless” method of abusing Bluetooth connectivity. The hacker can use the business card
feature to send messages (within the Bluetooth range) to a visible mobile device [10]. Anyone with Bluetooth enabled is
2
3
(RFID Security, 2008) http://www.infosec.gov.hk/english/technical/files/rfid.pdf
(“Problems with RFID”) http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=20
3
vulnerable to annoying or offensive messages. However it is not so harmful because it cannot access any data on the
phone. Also, users can avoid this type of attack by setting their mobile device to ‘hidden’ or ‘invisible’.
Bluesnarfing targets the user’s information, and can affect them even if their mobile device is set to ‘invisible’. This type
of hacking works by using specialised software to send information requests to the user via the Bluetooth OBEX pushprofile. However it takes time because the attacker has to guess or be able to track the mobile device’s name.
Bluebugging is the ability to take over the user’s phone after accessing it via one of the previous methods. The hacker
can then corrupt or steal personal data. Fortunately most modern devices are not vulnerable to this problem.
Despite Bluetooth not being an entirely secure method of connection, simple steps can be taken to protect the users from
being vulnerable while using it. The user can reduce the risk by making devices undiscoverable so the hacker cannot see
them. Also, users are strongly encouraged to change their device name sand use strong PIN’s between any transfers of
data. There is lots of software created in order to prevent hackings and can be downloaded and installed very easily.
Power supply
The power supply is used to turn the Bluetooth connection of the tag on. Since the Bluetooth installed operates typically
1.8V~3.6V4, thus, the minimum voltage supply must be 3.6V. The tag should be designed to be small and light like a
‘sticker’ to attach to items. However, the type of power supply dominates the size of the tag since the size of the Bluetooth
that built in is (5x5mm) is significantly smaller. The lifespan of the power supply is expected to last at least a year
provided the tag might be ‘on’ about 30 minutes per day5.
We can estimate the life-time of a battery:
Battery lifetime (h) = Battery capacity (mAh) / Average current consumption (mA)
The limitation of using the batteries to power up the tag’s
Bluetooth is the life span of the batteries. This is because the
Bluetooth 4.0 operates at different modes requiring different
supply current supplied by the voltage at short pulse widths.
Research shows that high voltage supply at short pulse will
have sudden voltage drop across the ESR (Equivalent Series
Resistor) of the battery. A sudden discharge of the battery
will shorten the battery’s lifespan.
The ESR of super capacitors is much lower than the ESR of
normal batteries. Thus, the voltage drop across the parallel
connection is much less leads to greater usable voltage which
we would like to have.
Below is a list of criteria we would consider while deciding
Figure 3: Power Density of different type of power supplies
on our power supply6:
1. Rate of charging/ discharging
2. Size
3. High and constant output voltage
4. Energy Density (Figure 3)
To meet the requirements we can use one of two combinations of
super capacitors and batteries.
Super capacitor combine with the batteries
Current tags are mainly powered by coin cells such as the CR2032 that
Figure 4: Parallel combination of Super
has a nominal voltage of 3.0V (from CR2032 Datasheet included in the
Capacitor and battery.
Appendix D). By connecting the coin cell parallelly with the super
capacitor (Figure 4), the power management of the power supply is improved and will extend the life span the tag. A
diagram of the differences of the usable voltage against the current pulse width has shown that the parallel connection’s
4
5
(Nordic Semiconductor Nrf8001 Single-chip Bluetooth ® low energy solution Product Specification 1.2 )
(StickNFind App Integrates Map Application, 2013)http://blog.sticknfind.com/sticknfind-app-integrates-map-application
(Sticknfind, 2014) https://www.sticknfind.com/sticknfind.aspx
6
(Paper) Design Advantages of Solid State, Batteries versus Supercapacitors
4
dropout voltage is smoothened by the super capacitor, thus extending the duration of voltage drop across the coin cell
(Figure 5).
Super capacitors:
Figure 5: Useable Voltage vs. Current pulse width showing the difference between the configurations
A combination of the energy storage properties of the batteries with the power discharge characteristics of capacitors, also
known as Electrochemical Double Layer Capacitors (EDLCs).
It has higher capacitance and energy density than normal capacitors. A more in depth introduction on the super capacitor
will not be discussed here. The report will only emphasize why it will be a good choice to combine with the battery.
Research shown that using super capacitors has the following advantages :
1. Shorter duration of discharge and charge than the batteries
2. Provide high peak power (low ESR- Equivalent Series Resistor).
3. Meet environmental standards , i.e. no leakage of chemicals
4. Operates at extreme temperature. The super capacitor we chose is Cellergy’s CLC03P070L1 (CLC: Low Leakage
Line Charge, used to offer low leakage current for extra-long battery life without compromising on power
density).
The size is 17x17.5 mm2 double super capacitor, which is an optimum for larger designs. This connection will allow the
power supply has a longer lifespan than using a single coin cell. Furthermore, the high rechargeable ability of using super
capacitor which ensure a sustainable power source for the tag. A general engineering characteristics of this super capacitor
is included in the Appendix G.
Theoretically, a fully charged super capacitor has 3.5V, the time taken for it to discharge is calculated as below:
0.07F × 3.5V = 0.245C, (capacitance of CLC03P070L1 is 70mF)
∵ 1C = 1A × 1s (In the SI system) ⇒ 3600C = 1A × 1h
⇒ 0.245C = 68μAh-1
⇒ 68μAh-1 / 0.6μA = 4.7 days
This shows that the super capacitor has a significant short discharge rate compare to a normal 3.0V coin cells might take 6
months or more to discharge. The super capacitor will discharge/ charge faster compare to the coin cell based on different
operating modes of Bluetooth. Hence, this result in a greater change in the current through the super capacitor compare
through the coin cell. By minimizing the change of current/voltage across the coin cell, we can prolong the cell’s lifespan.
Parallel combination of coin cell CR20327
Since the coin cells are already applied into the current available devices in the market, we would not do a great detail on
this type of power source. We have included the datasheet of CR2032 in the Appendix D. Research shown that by
connecting the coin cells in parallel i.e. 2 coin cells increases the life span by 400% compared to using one coin cell. The
research state that the battery’s life span is dependent on the current is drawn from it. Since the Bluetooth 4.0 operates at
different modes which draw different currents, it has been shown that different current drawn affects the battery life time
significantly. The results of the report convince us that this approach would be feasible. However, parallel combination of
the two coin cells result in a more bulky size of our tag, which might not be preferred by our consumers. It will be at least
doubling the size of the tag. Therefore, we introduced a few sizes of the tags with different lifespans of the power supply
as the alternative solutions.
7
(Shahriar Emami, 2013) IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications
5
PRODUCT DESIGN
System Design
The system requires a platform which will receive information from the tracking tags in order to help find the user’s
items. Instead of building our own platform, we decided to use the capabilities of the smart phone. Smart phones seem to
have become a necessity and most people carry them every day. Developing an application for a smart phone, which can
detect Bluetooth signals and send alerts, will be the most efficient solution comparing with designing our system.
Therefore, smartphone application is one essential and irreplaceable part of developing BeepKeep.
Choice of mobile platform
The four platforms most widely used, are namely iOS, Android, Blackberry, and Windows Phone. At the beginning of our
research and development, the Android platform enables us to design our product most efficiently. This is because of its
open-source feature and available code resources. Although the iOS system is used by a significant number of customers,
the iOS version of the application could not be written because we did not have the necessary development resources at
hand.
Corresponding applications will be developed if the product is commercially successful. Remarkably, Blackberry platform
has the advantage of being used by businesses, which could expand our product to new markets.
Software Design
Mobile App
The Android operating system provides built-in Bluetooth APIs (e.g. scan for devices, query the local adapter, manage
multiple connections), detailed documentation and a rich Graphical User Interface (GUI). Those modules are sufficient for
our app to be developed. Under its open ecosystem, a huge number of open-source codes are available and are free to
adapt and redevelop. It is highly possible to produce one app within a limited time period by referring existing example
codes.
The application on Android platform is designed to have several functions, including testing the Bluetooth connection,
distance estimation, and changing user settings. The basic structure is demonstrated in Fig. 6.
Figure 6: App Design
To start with, users need to add new stickers by entering sequence numbers. The number is actually the MAC address of
the Bluetooth sticker. Then, if the “Start Detecting” button is clicked, the app will create a broadcast to scan for this MAC
address and return the Received Signal Strength Indicator (RSSI). An estimated distance is displayed on screen after
comparing the RSSI value with our experimentally measured RSSI-distance data (Figure 7). The newest generation of
RSSI-Distance Data For Bluetooth 2.0
RSSI-Distance Data For Bluetooth 4.0
-30
-40
-40
-50
-50
RSSI (dBm)
RSSI (dBm)
-30
-60
-70
-80
-60
-70
-80
-90
-90
0
100
200
Distance (cm)
300
400
Figure 7a: RSSI-distance relationship (Detector is LG
Nexus 4 (Bluetooth 4.0), target is Nokia N95
(Bluetooth 2.0))
-100
0
100
200
Distance (cm)
300
400
Figure 7b: RSSI-distance relationship (Detector is LG
Nexus 4 (Bluetooth 4.0), target is LG Nexus 5
(Bluetooth 4.0))
6
Bluetooth has a better performance in terms of RSSI measurement accuracy (linear trend show in Figure 7b). The
maximum error is ±25cm. Moreover, for Bluetooth 4.0, the detection period is almost fixed (12-13 seconds).
In terms of Bluetooth API, only the discovering function is programmed. Our app does not contain any functions for
Bluetooth data transfer. The reason is that this app has to be running all the time and executing more functions will cause
cumulatively higher power consumption and shorten the battery life of both the phones and the tags. The newest version
of Android (version 4.3) contains built-in platform support for Bluetooth Low Energy (LE)8. By applying this provided
APIs, the app can discover devices at even lower power losses.
Functionality
After completing fundamental functions, a series of
optimisation [11] is carried out gradually. The user
interface has been altered several times until the desired
result of a colourful and concise, minimalistic design is
reached. The installation package has been reduced from
200kB to 55kB by redesigning and minimizing resources
(Figure 8).
If the app detects that a device is out of a user defined
range (within Bluetooth performance) it will generate a
loud Alarm to prevent the user from overlooking the alert.
Figure 8: App GUI
Logo Design
A business needs a well-designed logo which is both eye catching and memorable.
Taking our target market and the final product into account we designed a logo
which is shown on Figure 9. Keeping in line with our desire to be memorable to the
consumer, we settled on the name ‘BeepKeep’ due to the significance of each
word: ‘Beep’ indicates that our product will generate an audible alert; ‘Keep’
suggests that this Bluetooth reminder will help users to keep a hold of their
belongings. The logo is built based on the image of a bee, partly because ‘bee’ is a
syllable in ‘beep’, but also because bees live as a strict society and are responsible
for their assigned tasks. Colourful design is consistent with our multi-colour and
lively Bluetooth tags.
App Security
Figure 9: BeepKeep
logo
In order to increase the security of the system, our application does not transfer data between the tags and the user.
However, when using the tracker, the phone is still vulnerable to attacks via the Bluetooth network.
To prevent this the communication between the stickers and the mobile device that they are going to be connected to
through our application will be encrypted. Each tag will have to be paired with the device so that no 3rd party can use the
app to connect to the phone. With this protection, security issues are minimised.
Hardware Specification
A further study of Bluetooth technology was necessary to make design
choices.
There are two significant types of Bluetooth, Classic Bluetooth and Smart
Bluetooth(low energy or LE). A major difference between both is the
prior can connect to seven slaves whereas the later connects unlimited
number of slaves9 besides differs in the power consumption10. A
comparison of Bluetooth versions are shown on the Figure 10.
However, it has a smaller detectable range in comparison to the other
versions, it is sufficient to be implemented into our device since only low
data transfer rate needed. [12]
8
9
Inquiry
Active Mode
Sniff Mode
Paging
Hold Mode
Connection
Park Mode
Figure 10 Connection steps of 2
Bluetooth devices
(Bluetooth Low Energy, Google Developer document) http://developer.android.com/guide/topics/connectivity/bluetooth-le.html
(Jia Liu, Canfeng Chen, Yan Ma, Ying Xu, 2013)
10
See Appendix F
7
In order for the system to work, the smart phone and the tags must have compatible profiles11. For our project, the tag’s
Bluetooth will just transmit a set of data when it exceed a predetermine range / distance from the Bluetooth of the phone.
Hence, we will be using the LINK Loss Service (LLS)12.
When the user activates their Bluetooth, their phone will be able to detect the surrounding electronic devices that have
Bluetooth enabled. Pairing between the Bluetooth of the smart phone and these device can happen once both share the
same affinity, before they exchange data between themselves. Once pairing is successful, the user of the smart phone has
to approve via an authetication process. Once this is approved, the two media will then share their addresses, profiles,
names and store them in memory. [13] A ‘key’ will also be generated for future connections, which means the smart
phone will automatically ‘remember’ each other. 13For the general specification of Bluetooth 4.0, please refer to Appendix
E.14
nRF8001
The traditional Bluetooth device (Figure 11) maintains the
Versions
Range(m)
Speed
Power
connection between the device and the user, even if there is no
(Mbps) Consumption
data transfer. There are some modes (sleep, idle, standby) that
(mW)
allow the device to consume less current, therefore less energy.
1.2
10(1- 100)
1
2.5(1-100)
However at the active mode, the peak current is typically 252.1
10(1- 100)
2~3
2.5(1-100)
30mA which is considered to be large in the use of coin cell
3.0
10(1- 100)
24
15-20
batteries
4.0
61
1
1.5-20
Researches have recently introduced the Bluetooth Low Energy
(Bluetooth 4.0 LE) which our product nRF8001. Its advantages are
various. Firstly, the peak current during the data transfer is
typically 15mA. Typical transactions of data are within a range of Figure 11 The different modes of nRF8001 drawing
different amount of current & power consumption at
3ms. This means that with the use of our coin cell battery Cr2032
various condition
(nominal voltage 3V, 220mAh capacity) and an average
transactions of 10 reports per minute of the day (14400 reports /day), the average expected battery life will be 1500 days
or approximately 4 years. Also it has a range of 100m which is more than essential for our application specifications.
Our Bluetooth device uses different modes so that it can minimize the power consumption. When it is not used it will be
in standby mode, ready for use between connections of devices. When it is inactive over a long period, it will get in sleep
mode which reduces the power consumption (peak current reduces to 1μA). It has a high region for operating temperature
range (-40oC to +85oC).
nRF8001 Single-chip Bluetooth® low energy solution (see Appendix E)
It supports the Bluetooth LE v4.0 with low energy LLS and operating at voltage supply 1.8~ 3.6V.
Bluetooth 4.0 can be programmed to assume ‘sleep mode’ constantly and ‘wake up’ when data transmission is required.
This means that most of the time the Bluetooth draws minimum current, while detecting transmission of data regularly.
Antenna design for Bluetooth
The antenna is essential for any devices that involve the transmission of radio waves. It is used to convert electrical
current to electromagnetic waves of vice versa1. The size of the antenna has to be the same as the wavelength of Bluetooth
radio waves:
Where c: speed of light; λ: wavelength; f: frequency. fBluetooth 4.0 =2.5GHz so
= 0.12m is the size of the antenna.
In Bluetooth, there are two types of antenna: Chip antenna and Film antenna15. The prior are applied in most Bluetooth
devices whereas the latter is installed in all smart phones.
We will be designing our antenna such that it wraps around the coin cell’s circumference to ensure there is no blockage of
transmission/ receiving of signals. Thus, film antenna is preferred due to it is more flexible than using chip antenna.
However, from the above calculations, the length of antenna is significantly long. The type of antenna to be installed in
the tags is Omnidirectional Antenna3.The size of the antenna can be adjusted according to the directivity. We will focus
on the design of antenna at a later stage.
11
12
an additional protocol to define what kind of data both Bluetooth are transmitting
defines the behaviour when a link is loss between two device (Bluetooth Developer Portal)
13
(sparkfun)
(Decuir, 2014 )
15
(Jeong, 2012)
14
8
TAG DESIGN
Before starting the design process, there were several things to consider. The size of tag
should be determined by the size of hardware implemented inside, including the power
supply, a Bluetooth chip and the inner circuit. One specific design specification-the size was
taken great care of. As we will be handling very small items, the size of the hardware chips
implemented will be a design trade off. More detailed specifications, such as cost and
Figure 12: Beep Keep Tag
shape of tags, were based on the survey conducted. Though all requirements can’t be
3D model
met due to technology limitations, we tried to maintain the largest possible market. The
concept model of the tag can be seen in Figure 12.
General features:
Appearance - trendy, simple and promotional ‘Beep Keep’ tags can be a lifelong companion for some of user’s stuff, thus,
the appearance of tags should serve as a decoration as well as at the same time promote our product, by showing the logo.
We have designed 2 sizes, each with 2 colours to match the colour of the user identified item.
BeepNano
‘BeepNano’ benefits from its small size. For ‘BeepNano’ we use the smallest
possible size for the power supply: coin cell CR927. The coin cell we will be using
has to be smaller thus has a short life span. It can be easily attached to small items
such as keys and bank cards. The body of “bee” shape indicates the place of button
cell and has a diameter of 9.5mm. Fig.13 shows the size of a ‘BeepNano’ tag in
comparison with a bankcard. The tag is designed to have a white background with
the logo at centre of it.
Figure 13 A bank card with
‘BeepNano’
BeepLarge
‘BeepLarge’ is of regular size and is used for larger items. Without the limitation
in hardware size, battery can be chosen to last longer and save the effort of recharging/changing batteries constantly. The
logo however is designed with word ‘BeepKeep’ which promotes the product even better.
Structure - tidy and handy
The tags come with a lid at the top to replace the button cell.
Bluetooth address of each and every single tag is carved at the back of its lid, which makes it quite easy to set up the link
between these tags and the mobile app.
Sticker - sticky as one
We intend to use the same technology as “command strips” from 3M, which is basically a very strong sticker and the best
thing is if one day the item is no longer in use, the sticker can be easily removed, leaving no trace behind.
Make it ‘lifelong’
We use materials that have high endurance to weather and are waterproof.
Comparison between “BeepNano” & “BeepLarge”
BeepNano
BeepLarge
Bluetooth Technology
Bluetooth 4.0 LE nRF8001 (Bluetooth® low energy Connectivity IC, Active)
Range
45m
45m
Battery type
CR927(Appendix D)
CR2032
Battery Life (30min/day)
6 months
20 months
Battery dimensions (d*h, approx.) 16
9.5×2.7(mm)
20×3.2(mm)
Bluetooth dimensions
4.6×5.6×1.0(mm)17
18.1×12.05×2.3(mm)18
16
(www.batteriesinaflash) www.batteriesinaflash.com/coin-cells/cr927/new-energy-cr927-lithium-3v-coin-cell-batteriesdl927-ecr927
17
(www.global.tdk.com) http://www.global.tdk.com/news_center/press/20140212771.html
18
(www.mouser.com) http://uk.mouser.com/ProductDetail/Bluegiga-Technologies/BLE112-Av1/?qs=sGAEpiMZZMtqO%252bWUGLBzeBlUsuxvYOBGeTcfZ0yyKCA%3d
9
Uses
Bank cards, Bus passes, Keys etc.
Laptops, Pencil cases, Bags, etc.
Device Compatibility
Android devices supporting Bluetooth Smart (Nexus 5, Samsung S3 etc.)
Working Temperature
-15 to +65 ºC
Size of antenna (around cell)
59.7mm 113.7mm
PROJECT MANAGEMENT
This project is initiated by three members of the group. They are Kimberley Fok, Guang Yang and Biqi Liu. During the
team making process, the other four members join the team to form a group of seven. Kimberley Fok is selected as the
group leader via voting process among the members.
LEADER
SOFTWARE TEAM


App development
Website design
SOFT SKILLS TEAM
HARDWARE TEAM



Connections between
smart phone and tag
Power supply of the tag
Design Circuitry of the
tag





Security issues of the
communication
Ethical issues and news
Economic analysis
Market Survey
Publicity and Media
Figure 14 Divison of Tasks
The group is divided into three sub- groups to work in different aspects of the project as shown below (Figure 14). Each
sub- group consists of two members. The process of assigning members into different subgroups based on their
preferences. If each sub- group needs extra help from other members, they can just inform the leader so that the leader
will reorganize to ensure the working progress is maintained. Each group will be assigned on a specific task each week
and have to get things done by next meeting. Strict rules are set to ensure each member contributes fairly on the design
process. We created a Facebook page and Whatsapp chat group to inform members on regular meetings every Wednesday
and remind of each member’s duty of the week. If any members have suggestions on the project, they could post their
ideas via this. Weekly emails reporting the working progress to our Supervisor, Dr Lucyszyn is in charged by the leader.
If the leader encounters any problems in terms of technical and management which cannot be solved within the group, the
supervisor, will be the consultant which gives professional advice on it.
CONCLUSION
Our survey showed us that there were enough people interested in Beep Keep to move forward with this product. Based
on demands of the market we designed a tag so that it would be small and could be produced cheaply. We had to consider
several approaches to our design to try and meet this demand. We chose Bluetooth as the dominant technology, because it
is already available to almost everyone, and it’s constantly being developed to increase its efficiency and decrease its
power consumption. We decided that while super capacitors how promising solutions to problems with sources of power,
their current development is not suitable to our technology. However, by implementing a ‘’sleeping’ state in our tags, we
could increase the time the product would be able to operate for, on just watch batteries. By writing our application so as
to avoid as many privacy and security issues as possible, we were able to come up with a product that could not only be
small and fast, but also safe and respectful to its owners. BeepKeep technology is ideal for everyday users who don’t
want to clutter their minds with remembering whether they have all their belongings. Because this market is just
emerging, the growing customer base will make this product sustainable and profitable. However, what makes it a really
good investment is the promise of future technologies that could be implemented into this simple solution to make it even
more powerful. This is a technology that will not let you forget your things, and most definitely will not be forgotten.
10
REFERENCES
[1] SticknFind Support Centre. (2013, September 17). StickNFind App Integrates Map Application. Retrieved
January 11, 2014, from StickNFind Blog: http://blog.sticknfind.com/sticknfind-app-integrates-map-application
[2] Bekkelien, A. (2012, March). Bluetooth Indoor Positioning Thesis. Retrieved from University of Geneva:
http://cui.unige.ch/~deriazm/masters/bekkelien/Bekkelien_Master_Thesis.pdf[b1] Arthur, C. (2012). Apple,
Samsung, Google and the smartphone patent wars - everything you need to know. Retrieved May 5, 2013, from
http://www.guardian.co.uk/technology/2012/oct/22/smartphone-patent-wars-explained
[3] Cheng, H.-C., Liao, W.-W., Chi, T.-Y., & Wei, S.-Y. (2011). A Secure and Practical Key Management
Mechanism for NFC Read-Write Mode. Advanced Communication Technology (ICACT). Seoul: Dept. of
Information & Management, Chinese Culture University, Taipei, Taiwan.
[4] Hassam. (2011, October 24). Types Of Bluetooth Hacks And Its Security Issues. Retrieved from HubPages:
http://hassam.hubpages.com/hub/Types-Of-Bluetooth-Hacks-And-Its-Security-Issues
[5] Beattie, A. (2013, April 22). Common Methods Hackers Are Using To Crack Your Cellular Phone. Retrieved
from Techopedia: http://www.techopedia.com/2/27824/security/common-methods-hackers-are-using-to-crackyour-cellular-phone
[6] Omorogbe, P., & Sokoya, S. (2013, October 20). How to prevent Bluetooth hacking on your smartphone.
Retrieved from Tribune: http://www.tribune.com.ng/news2013/index.php/en/component/k2/item/24332-how-toprevent-bluetooth-hacking-on-your-smartphone-%E2%80%A2my-blackberry-connects-me-with-my-fans.html
[7] Kostako, V. (2008). The privacy implications of Bluetooth . Retrieved from OULU publications:
http://www.ee.oulu.fi/~vassilis/files/papers/bluetooth_privacy.pdf
[8] Kongevej, G. (n.d.). ZONITH Indoor Positioning System (IPS). Retrieved from Zonith:
http://www.zonith.com/products/ips/
[9] Bluetooth SIG. (2013). A Look at the Basics of Bluetooth Technology. Retrieved from Bluetooth:
http://www.bluetooth.com/Pages/Basics.aspx
[10]
Browning, D., & Kessler, G. C. (2009). Bluetooth Hacking: A Case Study. Conference on Digital
Forensics, Security and Law. Burlington: Champlain College Center for Digital Investigation. Retrieved from
Gary Kessler: http://www.garykessler.net/library/bluetooth_hacking_browning_kessler.pdf
Meier, R. (c2012 ). Professional Android 4 application development. Indainapolis, Indiana, U.S.A: Wiley .
[11]
Granby, J. (n.d.). What Are Some Signal Interference Issues for the Bluetooth Technology? Retrieved
from Houston Chronicle: http://smallbusiness.chron.com/signal-interference-issues-bluetooth-technology58273.html
[12]
Kiyoshi Yoshino, K. H. (2004). United States Patent No. US 6756535 B1.
11
APPENDICES
Appendix A: Survey Results
What Age Group Are You In?
Under 18
18-25
26-34
35-50
51-65
Over 65
What Age Group Are You In?
8
122
25
30
9
6
5% 3% 4%
15%
What is Your Professional Area?
Business/Finance
Education
Entertainment
Healthcare
Legal
Retired
Science/Engineering
Student
13
12
4
19
3
4
94
51
12%
61%
Under 18
18-25
26-34
35-50
51-65
Over 65
Would You Use This Product?
No
Yes
44
156
Would You Use This Product?
How Much Would You Pay for this
Product?
FREE
£20
£40
£60
Wouldn't buy
22%
20
108
23
5
44
What Size Tag Would You Use?
Flat
3D Sticker
Larger
N/A
64
73
19
44
78%
Do You Know Of Similar Products?
No
Yes
188
12
No
Yes
12
What is Your Professional Area?
Student
Do You Know Of Similar Products?
Science/Engineerin
g
6%
Retired
Legal
Healthcare
Entertainment
Education
Business/Finance
0
20
40
60
80
100
What Size Tag Would You Use?
94%
No
Yes
22%
32%
10%
36%
Flat
3D Sticker
Larger
N/A
1
actiona.setTitle("Beep Keep");
Resources r = getResources();
Drawable myD =
r.getDrawable(R.drawable.bar);
actiona.setBackgroundDrawable(myD);
BluetoothAdapter bluetooth =
BluetoothAdapter.getDefaultAdapter();
Appendix B: Android App Code Segment
BluetoothActivity.java
package com.Beep Keep.bluetooth;
import
import
import
import
import
import
java.io.FileInputStream;
java.io.FileNotFoundException;
java.io.IOException;
java.io.InputStreamReader;
java.util.Timer;
java.util.TimerTask;
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
import
android.annotation.SuppressLint;
android.app.ActionBar;
android.app.Activity;
android.app.Notification;
android.app.NotificationManager;
android.app.PendingIntent;
android.bluetooth.BluetoothAdapter;
android.bluetooth.BluetoothDevice;
android.content.BroadcastReceiver;
android.content.Context;
android.content.Intent;
android.content.IntentFilter;
android.content.res.Resources;
android.graphics.drawable.Drawable;
android.media.Ringtone;
android.media.RingtoneManager;
android.net.Uri;
android.os.Bundle;
android.os.Vibrator;
android.util.Log;
android.view.Menu;
android.view.MenuInflater;
android.view.MenuItem;
android.view.View;
android.widget.Button;
android.widget.TextView;
android.widget.Toast;
android.widget.Switch;
this.bluetooth = bluetooth;
if (dialog_int == 0 && shec == 0) {
initBluetooth();
}
// status bar notification
Uri notification = RingtoneManager
.getDefaultUri(RingtoneManager.TYPE_ALARM);
ring =
RingtoneManager.getRingtone(getApplicationContext(),
notification);
Initial(); // Switch on Bluetooth
final Button button_new = (Button)
findViewById(R.id.button_new);
button_new.setOnClickListener(new
View.OnClickListener() {
public void onClick(View v) {
startActivity(new
Intent("com.Beep Keep.AddNew"));
}
}); // create a new switch label
}
public void onResume() {
super.onResume();
pause_int = 0;
if (dialog_int != 0) {
cease();
NotificationManager nm =
(NotificationManager)
getSystemService(NOTIFICATION_SERVICE);
@SuppressLint("NewApi")
public class BluetoothActivity extends Activity {
public static final String EXTRA_RSSI =
"android.bluetooth.device.extra.RSSI";
protected static final String TAG = "Beep Keep";
// for debug use
protected static int RSSI_value = -100;
protected static int count = 0;
protected static int count_pre = 0;
protected static int time_elapse = 0;
protected String s_now = "";
protected String s_pre = "";
protected String labels = "Keys"; // will read
from the switches labels
protected String bluetooth_address = "";
private static final int READ_BLOCK = 100;
protected static int shec = 0;
protected static int dialog_int = 0;
protected static int pause_int = 0;
protected static int sensitivity_value = -90;//
will read from "sensitivity.file", set by user
final Context context = this;
String text1 = "";
String[] ss = new String[4];
Timer mTimer = new Timer();
BluetoothAdapter bluetooth;
Ringtone ring;
nm.cancel(getIntent().getExtras().getInt("notific
ationID"));
}
}
public void onPause() {
super.onPause();
pause_int = 1;
}
// Add the Actions to the Action Bar
@Override
public boolean onCreateOptionsMenu(Menu menu) {
// Inflate the menu items for use in the
action bar
MenuInflater inflater =
getMenuInflater();
inflater.inflate(R.menu.main_menu, menu);
return super.onCreateOptionsMenu(menu);
}
// Respond to Action Buttons
@Override
public boolean onOptionsItemSelected(MenuItem
item) {
// Handle presses on the action bar items
@Override
public void onCreate(Bundle savedInstanceState) {
super.onCreate(savedInstanceState);
switch (item.getItemId()) {
case R.id.action_dis:
// start discovery
// create title bar menu
setContentView(R.layout.main);
ActionBar actiona = getActionBar();
ReadBluetoothAddress(); // read
targetted Bluetooth addresses
1
count_pre = RSSI_value;
time_elapse = 0;
CharSequence message = "You have lost " +
labels;
if (shec == 0) {
mTimer = new Timer(); //
create a timer to do regular discovering
TimerTask mTimerTask =
new TimerTask() {
@Override
public void
run() {
notif.setLatestEventInfo(context, from,
message, pendingIntent);
nm.notify(notificationID, notif);
}
startDiscovery();
}
Intent i
= new Intent(context, BluetoothActivity.class);
if
(count != count_pre) {
if (RSSI_value < sensitivity_value || time_elapse
== 30) {
time_elapse = 0;
ring.play(); // create a sound alarm
count_pre = count;
}
} else {
if (RSSI_value > sensitivity_value || time_elapse
time_elapse++;
< 30) {
}
if
((RSSI_value < -80 && time_elapse > 10) || time_elapse >
30) {
ring.stop(); // stop this alarm
}
}
Vibrator v = (Vibrator)
getSystemService(Context.VIBRATOR_SERVICE);
}
};
v.vibrate(100);// Vibrate for 100 milliseconds
if (dialog_int == 0) {
if (pause_int == 0) {
frag dialogFragment = frag
.newInstance("You have
lost Keys");
mTimer.schedule(mTimerTask, 1000, 1000);
shec = 1;
} else {
cease();
}
return true;
case R.id.action_edit:
startActivity(new
Intent("com.Beep Keep.Edit"));
return true;
dialogFragment.show(getFragmentManager(),
"dialog");
}
dialog_int = 1;
if (pause_int == 1) {
case R.id.action_gear:
startActivity(new
Intent("com.Beep Keep.Gearact"));
return true;
default:
return
super.onOptionsItemSelected(item);
}
}
// create a notification bar
int notificationID = 1;
i.putExtra("notificationID",
notificationID);
PendingIntent pendingIntent =
public class switchButtonListener extends
BroadcastReceiver {
@Override
public void onReceive(Context context,
Intent intent) {
cease();
}
PendingIntent
}
.getActivity(context, 0,
i, 0);
NotificationManager nm =
(NotificationManager)
getSystemService(NOTIFICATION_SERVICE);
Notification notif = new Notification(
R.drawable.logo32,
"You have lost "+labels,
System.currentTimeMillis());
CharSequence from = "Alert";
public void cease() {
shec = 0;
mTimer.cancel();
ring.stop();
time_elapse = 0;
dialog_int = 0;
}
private void initBluetooth() {
if (!bluetooth.isEnabled()) {
// Bluetooth isn't enabled,
prompt the user to turn it on.
Intent intent = new
Intent(BluetoothAdapter.ACTION_REQUEST_ENABLE);
startActivityForResult(intent,
1);
}
1
}
tv1.setText(p2);
private void startDiscovery() {
IntentFilter intent = new IntentFilter();
intent.addAction(BluetoothDevice.ACTION_FOUND);
registerReceiver(searchDevices, intent);
bluetooth.startDiscovery();
}
BroadcastReceiver searchDevices = new
BroadcastReceiver() {
@Override
public void onReceive(Context context,
Intent intent) {
Bundle b = intent.getExtras();
Object[] lstName =
b.keySet().toArray();
short rssi =
intent.getShortExtra(BluetoothDevice.EXTRA_RSSI,
(short) 0);
for (int i = 0; i <
lstName.length; i++) {
String keyName =
lstName[i].toString();
Log.e(keyName,
String.valueOf(b.get(keyName)));
if
(String.valueOf(b.get(keyName)).equals(bluetooth_address)
) {
// if find the
device, get the RSSI value, and count increment by 1
RSSI_value =
rssi;
count++;
}
}
}
};
private void StartDiscover() {
mTimer = new Timer();
TimerTask mTimerTask = new TimerTask() {
@Override
public void run() {
runOnUiThread(new
Runnable() {
@Override
public void
run() {
TextView
tv1 = (TextView) findViewById(R.id.tx);
Switch
t1 = (Switch) findViewById(R.id.t_1);
String p
= ss[0];
String
p2 = "";
double
distance = (47.5 - RSSI_value) / 0.1202;
if (shec
== 1) {
p2 = " Last Update: " +
String.valueOf(time_elapse)
+ " seconds ago. ";
if (distance >= sensitivity_value) {
p += " (~" + distance + ")";
}
else if (time_elapse > 31) {
p += "( may be lost )";
}
}
t1.setText(p);
}
});
}
};
mTimer.schedule(mTimerTask, 1000, 1000);
}
private void Initial() {
RSSI_value = -100;
count = 0;
count_pre = 0;
time_elapse = 0;
// initialise the switches names
// will be able to add new switches by
users' setting
Switch t1 = (Switch)
findViewById(R.id.t_1);
Switch t2 = (Switch)
findViewById(R.id.t_2);
Switch t3 = (Switch)
findViewById(R.id.t_3);
Switch t4 = (Switch)
findViewById(R.id.t_4);
try {
// read the labels
FileInputStream fis =
openFileInput("labels.txt");
InputStreamReader isr = new
InputStreamReader(fis);
char[] i = new char[READ_BLOCK];
String s = "";
int c;
while ((c = isr.read(i)) > 0) {
String re =
String.copyValueOf(i, 0, c);
s += re;
i = new
char[READ_BLOCK];
}
ss = s.split("@@");
text1 = ss[0];
t1.setText(ss[0]);
t2.setText(ss[1]);
t3.setText(ss[2]);
t4.setText(ss[3]);
// read Bluetooth addresses
FileInputStream fis2 =
openFileInput("bluetooth_address.txt");
InputStreamReader isr2 = new
InputStreamReader(fis2);
s = "";
while ((c = isr2.read(i)) > 0) {
String re =
String.copyValueOf(i, 0, c);
s += re;
i = new
char[READ_BLOCK];
}
ss = s.split("@@");
bluetooth_address = ss[0]; //
for test only, read the first address
} catch (FileNotFoundException e) {
// TODO Auto-generated catch
block
e.printStackTrace();
} catch (IOException e) {
// TODO Auto-generated catch
block
e.printStackTrace();
}
}
private void ReadBluetoothAddress(){
FileInputStream fis2;
try {
fis2 = openFileInput("new.txt");
InputStreamReader isr2 = new
InputStreamReader(fis2);
2
String s = "";
int c = 0;
char[] i = new char[READ_BLOCK];
while ((c = isr2.read(i)) > 0) {
String re =
String.copyValueOf(i, 0, c);
s += re;
i = new
char[READ_BLOCK];
}
if
(s.equals("00:00:00:00:00:00")) {
bluetooth_address =
"00:21:08:66:2F:DF";
} else {
bluetooth_address = s;
}
} catch (FileNotFoundException e) {
// TODO Auto-generated catch
block
e.printStackTrace();
} catch (IOException e) {
// TODO Auto-generated catch
block
e.printStackTrace();
}
}
// ---- change the switches background colors
<end> --}
// ---- change the switches background colors
<start> --public void SwitchClick_blue(View view) {
Switch toggle = (Switch) view;
if (toggle.isChecked()) {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_b2));
} else {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_grey));
}
}
public void SwitchClick_purple(View view) {
Switch toggle = (Switch) view;
if (toggle.isChecked()) {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_g2));
} else {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_grey));
}
}
public void SwitchClick_red(View view) {
Switch toggle = (Switch) view;
if (toggle.isChecked()) {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_r2));
} else {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_grey));
}
}
public void SwitchClick_yellow(View view) {
Switch toggle = (Switch) view;
if (toggle.isChecked()) {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_y2));
} else {
toggle.setBackground(getResources().getDrawable(R
.drawable.b_grey));
}
}
3
belongings when they are on the go. This concept is
illustrated in Fig. 1.
Appendix C. Project Proposal
Abstract----- It is essential for us to bring our IDs,
phones, travel cards, wallets, keys etc. along when we
go out. However, people nowadays are clumsy to
leave their belongings when they are too hectic on
work and social lives. Due to increasingly heavy
reliance on social media, phones are the least
forgotten.
ADDITIONAL INFORMATION
Research
Intensive researches and studies are needed to miniature and
optimise this system, in order to make it less nettlesome and
conspicuous. Bluetooth 4.0 is the latest version and has the
primary feature of power efficiency [3]. The new single-mode
chips are promoted to be at an even lower cost. In terms of
their effectiveness, new protocol supports as far as 150 metres
[4]. In order to maximize power supply, the use of button cell
which would last for a few years or even longer is currently
under development. The implant of Bluetooth smart chip is
preferred due to its low energy consumptions [5]. It can be
powered wirelessly with recommended security.
Beep-to-Go is a reminder application built in the
smartphone which links to smart stickers labeled
onto these items. It works based on Bluetooth
technology. It is suitable for everyone especially the
elderlies and the disables. Whenever they go out,
Beep-to-Go ensures that they bring all the necessary
items along.
Expertise
This proposal requires knowledge on Signal
Processing for the Bluetooth, Analog Electronics for the
circuits implanted onto the stickers and Programming
skills for the mobile applications (detect distances,
register stickers on items etc.). We planned to program
the apps so that they can be applicable on all smart
phone platforms.
FEASIBILITY STUDY
The mobile app links to belongings with stickers
implanted with Bluetooth smart chips [1]. Whenever the
users need to bring their belongings, they can put
stickers on the belongings to remind themselves via a
check list app on their phone. The app works by
switching on the Bluetooth mode on the phone. The
users have to register the labeled items with stickers on
the phone for ease of reminding themselves. Even if the
users forget about the check list, as long as the distances
between the users and their items exceed a certain
amount, the smart phone will alarm the users. If he/she
checks the list before leaving, he/she can tap the listed
items to make sure those items are with them.
Costs
The app is free of charge and can be downloaded onto
all smart phones. However, research and manufacturing
funds are required for the stickers with implanted
Bluetooth chips. Stickers are meant to be flexible,
portable and durable. We estimate that this will take us a
few months to complete a demonstrator provided that we
have sufficient knowledge on the production of quality
stickers and financial support. For additional features, we
will consider to put a buzzer on these stickers too so that
the users are able to find them easily by searching the
sound source. The project is estimated to cost less than
40 pounds.
FEATURES
Fig.1 Blue print of Beep-to-go
Though there are a variety of check list applications
available
in the
market,
none of
them have
the ability
to produce
audio
signal as
an alarm
for the
user via
smart
phone
when the distance between the user and the items exceed
a predetermined distance. Inspired by OPPO’s O-Click
[2], we desired to design this to prevent people from
leaving their important belongings behind. It is also
designed to prevent the user from losing important
References
[1] Nick Flaherty, “Implantable 'lab on a chip' monitors
health via Bluetooth,” EE Times Europe on 21st
March 2013. Available:
http://www.electronics-eetimes.com/en/bluetoothsig-and-a4wp-to-shape-wireless-chargingstandard.html?cmp_id=7&news_id=222918531&vI
D=44
[2]
Available: http://en.oppo.com/products/n1/ By
OPPO
[3]
http://chapters.comsoc.org/vancouver/BTLER3.
pdf
[4] Adopted Bluetooth® Core Specifications Core
Version 4.0: https://www.bluetooth.org/enus/specification/adopted-specifications
[5] Security, Bluetooth Smart (Low Energy) from
Bluetooth Developer Portal.
Available:
https://developer.bluetooth.org/TechnologyOvervie
w/Pages/LE-Security.aspx
1
1
Appendix D. Datasheet of CR2032
Ref: Product Datasheet Energizer CR2032
2
References: The Swiss Power Source Renata Batteries Datasheet for CR927
Appendix E. General Engineering specification of Bluetooth 4.0
Range
Output Power
Max Current
Latency
Topology
Connections
Modulation
Robustness
Security
Sleep current
Modes
Bluetooth low energy factsheet
~ 150 meters open field
~ 10mW (10dBm)
~ 15mA
3 ms
Star
> 2 billion
GFSK @ 2.4 GHz
Adaptive Frequency Hopping, 24 bit CRC
128bit AES CCM
~1µA
Broadcast, Connection, Event Data Models, Reads, Writes
Note: items marked in blue are defined in the specification; other items are implementation
specific.
Reference circuitry
3
Schematic for nRF8001 with DC/DC converter enabled
4
References: Introducing Bluetooth Smart By Joseph Decuir Part 1: A look at both classic and new
technologies.
5
Appendix F. Comparison between Classic Bluetooth & Smart Bluetooth
Technical Specification
Classic Bluetooth technology
Bluetooth Low Energy Technology
Distance/Range
100 m (330 ft)
50 m (160 ft)
Over the air data rate
1–3 Mbit/s
1 Mbit/s
Application throughput
0.7–2.1 Mbit/s
0.27 Mbit/s
Active slaves
7
Not defined; implementation
dependent
Security
56/128-bit and application
layer user defined
128-bit AES with Counter
Mode CBC-MAC and application
layer user defined
Robustness
Adaptive fast frequency
hopping,FEC, fast ACK
Adaptive frequency hopping, Lazy
Acknowledgement, 24-bit CRC, 32bit Message Integrity Check
Latency (from a nonconnected state)
Typically 100 ms
6 ms
Total time to send data
(det.battery life)
100 ms
3 ms, < 3 ms
Voice capable
Yes
No
Network topology
Scatternet
Star-bus
Power consumption
1 as the reference
0.01 to 0.5 (depending on use case)
Peak current
consumption
<30 mA
<15 mA
Service discovery
Yes
Yes
Profile concept
Yes
Yes
Primary use cases
Mobile phones, gaming,
headsets, stereo audio
streaming, automotive, PCs,
security, proximity, healthcare,
sports & fitness, etc.
Mobile phones, gaming, PCs,
watches, sports and fitness,
healthcare, security & proximity,
automotive, home electronics,
automation, Industrial, etc.
6
Appendix G. General specifications of Cellergy’s supercapacitor
Parameter
Rating
Capacitance tolerance
-20% /80%
Capacitance range
7mF to 700mF
18mΩ to 1200mΩ
ESR range
Working voltage
Power
Foot print
Operating temperature
0.7-18.0 volts
10's of Watts, short pulse widths
12 × 12.5 mm, 10 × 15 mm, 17 × 17.5 mm, 28× 17.5
mm, 48 × 30.5 mm
-40°C to +70°C (CLC series)
Storage temperature
-10°C to +35°C
Surge voltage
15% above rated voltage
Pulse current
No limit
De-rating
Not required
Polarity
No polarity
Number of full charge/discharge cycles
Safety
Over 500,000
Constructed from environmentally friendly materials,
toxic fumes are released upon burning
[Cellergy pg 14 Diagram of through hole double lead]
References:
1. General Engineering Specification for Cellergy’s Super Capacitor
7