Grin logo
de en es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - Programming

Keyboard Alarm System

The Creation of a Microprocessor System Using Arduino

Title: Keyboard Alarm System

Project Report , 2019 , 32 Pages , Grade: 1,0

Autor:in: Michelle Bettendorf (Author)

Computer Science - Programming
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

A microprocessor system project using Arduino was created in order to build an alarm system for the keyboard of a computer. The alarm system consists of blinking LEDs, sound, taking a picture of the unauthorized person, sending that image per email, login when and what that person is doing, a distraction system and also the opportunity to stop the alarm through a password.

Almost every student knows the following situation. They study in the library or in the study room and then they have to leave the study room for a few minutes to go to get a fresh coffee, refill their water bottle or to go to the bathroom. But what to do with the laptop? Leaving it unsupervised for a few minutes? What happens if someone comes and tries to use it? Also at work what happens with the computer while leaving the working place for a few minutes? Can it be that someone tries to get some information from it by trying to hack the password? Also at work sometimes you can’t even lock the computer, what to do when you have to leave the office for a short time? For these scenarios this paper will present a solution.

Excerpt


Table of Contents

1 Abstract

2 Introduction

3 Hardware

4 Software

4.1 Arduino

4.2 C#

4.3 Used APIs

5 Results and further work

6 Code

6.1 Arduino

6.2 C#

7 Ressources

Project Objectives and Key Topics

The primary goal of this project is to develop an automated alarm system for a computer keyboard, designed to protect unattended workstations from unauthorized access. The system detects intruders via an ultrasonic sensor and initiates multi-layered countermeasures including audio-visual alarms, automatic photo capturing of the unauthorized person, and desktop distraction tactics.

  • Detection of unauthorized access using ultrasonic proximity sensors.
  • Implementation of a multi-sensory alarm system utilizing LEDs and buzzer sound.
  • Automatic security measures: capturing images via webcam and email notification.
  • System activity logging and execution of distraction processes.
  • Password-protected alarm deactivation mechanism.

Excerpt from the Book

2 Introduction

Almost every student knows the following situation. They study in the library or in the study room and then they have to leave the study room for a few minutes to go to get a fresh coffee, refill their water bottle or to go to the bathroom. But what to do with the laptop? Leaving it unsupervised for a few minutes? What happens if someone comes and tries to use it? Also at work what happens with the computer while leaving the working place for a few minutes? Can it be that someone tries to get some information from it by trying to hack the password? Also at work sometimes you can’t even lock the computer, what to do when you have to leave the office for a short time?

For these scenarios I’ll present in the following pages a solution. How about a little system next to the computer checking if someone puts their fingers on the keyboard. These little systems looks like a little work project, so it wouldn’t be too obvious. It does not only make an alarm, which consists of noise and blinking, it also takes a picture of the thief with the integrated camera of the computer and sends it immediately to your mail-address, so that you can react fast. Furthermore a protocol is saved with the date and time, when it happened and which processes were open at that time, so what the person could see. On top of that a distraction system is starting as soon as the unauthorized person tries to do something on the computer. This distraction system consists of opening multiple programs and pictures. Of course it is possible to stop the alarm by typing on the console the right password.

Summary of Chapters

1 Abstract: Provides a concise overview of the project, highlighting the use of Arduino for an alarm system, and lists the essential project keywords.

2 Introduction: Explains the practical motivation behind the project, focusing on the security of unattended laptops in public or office environments.

3 Hardware: Details the physical components used, specifically the Arduino UNO R3 Starter Kit, ultrasonic sensors, LEDs, and buzzer, including a circuit diagram.

4 Software: Outlines the dual-nature software architecture, explaining the distinct roles of the Arduino IDE for sensor monitoring and the C# application for advanced security logic.

5 Results and further work: Summarizes the functional achievements of the system and suggests potential future enhancements like facial recognition.

6 Code: Presents the complete source code for both the Arduino firmware and the C# desktop application.

7 Ressources: Lists the external documentation and tutorials used for the project development.

Keywords

Arduino, Embedded system, Microcontroller, Alarm system, Security, Ultrasonic sensor, C#, Serial communication, Webcam, SMTP, Automation, Process management, Software development, Hardware integration, Access control

Frequently Asked Questions

What is the core purpose of this project?

The project aims to create a security system that monitors a keyboard area and provides an immediate response if an unauthorized person approaches the computer while the user is away.

Which central topics are addressed?

The work covers embedded hardware interfacing with Arduino, serial data communication between microcontrollers and PCs, and C# programming for system automation and security tasks.

What is the primary goal of the system?

The goal is to detect intrusion, alert the user via email with photographic evidence, record system activity, and discourage the intruder through visual distractions.

Which scientific or technical methods are employed?

The project employs sensor-based proximity detection using an ultrasonic sensor, threaded background task execution in C#, and automated email dispatch using SMTP protocols.

What is covered in the main section of the paper?

The main section details the hardware circuit configuration, the logical structure of the C# application, and the implementation of specific security features like snapshot capturing and log file generation.

Which keywords define this project?

Key terms include Arduino, Embedded systems, Security, C#, Automation, Webcam integration, and Serial communication.

How is the alarm stopped?

The alarm can be terminated by entering a pre-defined password in the console, which sends a stop signal from the C# application to the Arduino board.

How does the distraction system work?

The distraction system automatically launches multiple software applications (such as Microsoft Office programs) and images to hinder the unauthorized user's ability to manipulate the computer.

What is the purpose of the protocol file?

The protocol file logs the exact date, time, and active system processes at the moment of the intrusion to provide the legitimate user with information about what the intruder might have seen.

Excerpt out of 32 pages  - scroll top

Details

Title
Keyboard Alarm System
Subtitle
The Creation of a Microprocessor System Using Arduino
College
Politehnica University of Timișoara
Grade
1,0
Author
Michelle Bettendorf (Author)
Publication Year
2019
Pages
32
Catalog Number
V491172
ISBN (eBook)
9783668981300
ISBN (Book)
9783668981317
Language
English
Tags
Alarm System Keyboard Alarm System Microprocessor Arduino C# security Embedded System
Product Safety
GRIN Publishing GmbH
Quote paper
Michelle Bettendorf (Author), 2019, Keyboard Alarm System, Munich, GRIN Verlag, https://www.grin.com/document/491172
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  32  pages
Grin logo
  • Grin.com
  • Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint