Sunteți pe pagina 1din 26

PREPARED BY:

1. MAYUR GHARAT
2. NITIN GUPTA
3. AAKASH GUPTA
4. RAJENDRA JADHAV
5. MITSH JAISWAL
6. SACHIN KADAM
Abstract:

As the project title is ANTI-THEFT LAPTOP
INDICATOR itself suggest that the project is used to
catch the thieves from stealing our laptop or any other
personal belongings. In previous days there is no
device, which can prevent your laptop from thieves if
you are far away from it, except that CCTV. But this is
very costly and non a portable device. To overcome
this problem we have chosen this project. We have a
compact and portable device, which is cheaper than
any other device and easy to use.
Introduction:
Despite the slump in the overall PC market, growth in
laptop computers continues.
As it is handy and portable, it is increasingly acquiring the
market of desktop computers among both business and
consumer buyers.
As laptops proliferate, laptop theft has become an ever
more critical security issue.
Safeware Inc., the largest U.S. insurer of laptops, projected
that 387,000 laptop computers were stolen in the U.S. in
2000, up 21% from 1999.

As theft rates increase, an integrated solution is needed.





The Laptop Security Problem:

For five consecutive years, CSI has reported the types of security
attack and misuses experienced by its respondents.
Laptop theft has been consistently reported by about 60%, as
shown below:


1997
1998
1999
2000
2001
0
10
20
30
40
50
60
70
80
90
100
1
58
62
65
60
62
l
a
p
t
o
p

t
h
e
f
t

c
a
s
e
s
(
%
)

year
1997
1998
1999
2000
2001
Approaches to Laptop Security:

Within the much broader arena of IT security, there are five
classes of technology that are relevant to laptops because
they protect against the risks described above.

SR.
NO.

TECNOLOGY

PURPOSE
1.
User authentication Confirm the authorized user;
prevent unauthorized access
2.
Physical locking devices Deter theft
3.
Encryption Protect data
4.
Monitoring and tracing
software
Locate and assist in recovery of
stolen computers
5.
Alarms Deter theft
Block diagram of smart laptop
docking station:
POWER
SUPPLY
RECTIFIER
CIRCUIT
REFLECTI
NG
SENSOR
IC
(CNY70)
OSCILLATOR
IC (CD 4060)
SPEAKER &
LED
CIRCUITRY
TRANSISTOR
AS AN
AMPLIFIER
Circuit diagram of smart laptop
docking station:
Pin diagram of IC CNY70:
Features of IC CNY70:
Forward voltage (VF )=1.25 t0 1.6 V.
Reverse voltage (VR)= 5 V.
Junction temperature (Tj)= 100 C.
Total power dissipation (Ptot)= 200 mW.
Collector current = 50 mA.
Pin Diagram of IC CD4060:
Features of IC CD4060:
Wide supply voltage range 1.0V to 15V.
High noise immunity 0.45 VDD (typ.).
Low power TTL compatibility Fan out of 2 driving
74L or 1 driving 74LS.
Medium speed operation 8 MHz typ. at VDD e 10V.
Schmitt trigger clock input.
Block Diagram of Anti-bag
snatching alarm:
PLUG &
SOCKET
CIRCUITRY
COMPARATOR
MONOSTABLE
MV
IC555
SPEAKER &
LED
CIRCUITRY
POWER
SUPPLY
BAG
CONTAINI
NG LAP
TOP
Circuit Diagram of Anti-bag
snatching alarm:
Pin diagram of IC CA3140:
Feature of IC CA3140:
Very High Input Impedance (ZIN) -1.5T (Typ).
Very Low Input Current (Il) -10pA (Typ) at -15 to 15 V.
Directly Replaces Industry Type 741 in Most
Applications.
DC input voltage between -0.5V to 8 V.
Operating temperature -55oC to 125oC.




Ground (0V)
Voltage below 1/3 Vcc to
trigger the pulse
Pulsating output
Active low; interrupts the
timing interval at Output
Provides access to the
internal voltage
divider; default 2/3 Vcc
The pulse ends when the
voltage is greater than
Control
Open collector output;
to discharge the
capacitor
Supply voltage; 5V (4.5V
- 16 V)
Features of IC 555
Turn-off time less than 2ms
Max. operating frequency greater than 500kHz
Timing from microseconds to hours
Operates in both astable and monostable modes
High output current
Adjustable duty cycle
TTL compatible
Temperature stability of 0.005% per C
Pin diagram of IC UM3561:
Features of IC UM3561:
DC Supply Voltage -0.3V to +5.0V.
Input Voltage Range Vss-0.3V to Vdd+0.3V
Operating Ambient Temperature -10C to +60C.
Storage Temperature -55C to +125C.



ADVANTAGES:

User Handy.
Cheaper device.
Easy to design and manufacture as all the
components are easily available.
Easily implemented.

DISADVANTAGES:


Battery dependent.

Data security is not possible.

User authentication is not required.

APPLICATIONS:


Securing laptops from thefts.

Alarm system.

We can use with any other belongings.
FUTURE SCOPE:


Adding multimedia capabilities to capture images and
store it.
Using GSM\GPRS modem we can actually find the
locations and SMS it to the users cell phone.


COCLUSION:

This project aims to developing a device which is
reliable and advance for anti-theft purpose. This is more
suitable than any other device for anti thefting purpose.

Thus, the project aims at providing additional
security and reducing risk of theft of our pricy devices.

BIBLIOGRAPHY

Websites :

http://www.electronicsforu.com
http://www.alldatasheet.com
http://www.fairchildsemi.com
http://books.google.co.in/


Books :

Applied Electronics R.S. Sedha
Op-Amps and Linear Integrated Circuits Ramakant A.
Gayakwad

S-ar putea să vă placă și