24-10-2016, 10:19 AM
1460699137-reportnew1.docx (Size: 516.91 KB / Downloads: 6)
INTRODUCTION
The aim of our project is to secure the documents and also to know about the user details like time at which the document has been taken last,and user details as well.The most common form of electronic data-carrying device used these days is the smart card based upon a contact field (telephone smart card, bank cards). However, the mechanical contact used in the smart card is often impractical.
A contactless transfer of data between the data-carrying device and its reader is far more flexible. In the ideal case, the power required to operate the electronic data-carrying device would also be transferred from the reader using contactless technology. Because of the procedures used for the transfer of power and data, contactless ID systems are called RFID systems (Radio Frequency Identification).
1.2 OBJECTIVE
The main objective of our project is to collect the database of users and keep in track of users who is currently handling the common document. Therefore they can easily identify the person who has taken the document by using RFID tag.
If any document in the locker is missing, details of the document users will be stored in the form of a memory where we can retrive the details and with the help of a PC, user can view the lost details.
1.3LITERATURE SURVEY
RFID: Technology, applications, and impact on business operationsconsists that the investigatesin the past, most of the companies were using a magnetic stripe card which is a type of card capable of storing data by modifying the magnetism of tiny iron-based magnetic particles on a band of magnetic material on thecard[1]. Card has a Personal Identification Number (PIN) allow to access account electronically. These days, RFID card has been used widely. In this paper the researcher used RFID card instead of a magnetic stripe card because it does not need a physical contact. The researcher combined a face recognition system with RFID system to support the security system. If the PIN in the RFID card matches the recognized face then a response is send to a remote station by a modem. This paper is important because it enhance security. In this paper the researcher mix two type of security (FR and RFID) which make the security stronger and reliable. In turn, thisgive the user more control. The matlab program is developed and it met the design criteria and slove the paperproblem.
A Digital Security System with Door Lock System using RFID Technologydescribes about the design of RFID based security and access control system for use in hostels inside the Punjab University premises[2]. The system combines RFID technology and biometrics to accomplish the required task. When the RFID reader installed at the entrance of hostel detects a number, the system captures the user image and scans the database for a match. If both the card and captured image belong to a registered user, access is granted; otherwise the system turns on the alarm and makes an emergency call to the security van through GSM modem. In this way, the suspicious persons can be caught.
Currently, security is becoming aprime factor in the society. It’s becoming a challenge for everyday activities such as access control, cash terminals, public transport, internet etc, where the user authentication is required prior to giving access to confidential information, RFID in conjunction with GSM technologies bring a solution to such necessitate. The usage of ATM card is increasing day by day, at the same time it paves way for many other Malpractices(card or cash being stolen, hacking of passwords). In order to overcome this, RFID based ATM smart card will yield enhanced results. This project describes the hardware and software co-design of a RFID and GSM. RFID(Radio Frequency Identification), a contactless smart card is used for accessing ATM terminal, the random code generated is sent to the mobile which is entered in the ATM terminal then the code undergoes verification process, if the code matches then the regular process begins, if there is mismatch of codes then the access is denied. These initial steps will help incash withdrawal in an easy and secured manner against forges.
Access Control for Middleware in RFID SystemsRadio Frequency Identification (RFID) is a technology for wireless information exchange over short distances [4]. Even though the technology itself was invented about 50 years ago, recentdevelopment in the field of low cost RFID devices began to finally show its potential. The possibility of adding (minimal) computing capabilities to everyday’s objects will support thedevelopment of ubiquitous computing in the near future. Applying RFID transpondersto consumer goods will be common, creating an ever present computing environmentspanning all parts of everyday’s life. Today RFID commerce already constitutes a vital and ever expanding market. Judging by evidence from recent years, RFID industry will continue its rapid growth during the following years. In such a developing market security andprivacy become increasingly important.
4EXSISTING METHOD
RFID was the best way to unlock the doorand push it open. I built a simple circuit with a basic ATmega 168 arduino chip and a RFID reader to control an electronic magnetic door lock.
The circuit consists of 3 separate parts,a reader to read RFID tags,a controller to accept data from the reader and controller to accept data from the reader and control the output of the LCD and electric magnetic door lock. In the most cases you want a normally open circuit on the door lock or fail secure. This means the door stays locked when no current passes through it. When 12v DC is passed through the electromagnet in the door lock,a motor in the door to be pushedopen freely.
The reader is placed on the outside of the door and is separate from the controller on the inside so that security by breaking opens the reader and trying short circuit the reader. The Arduino receives serial data from reader and controls the LCD and the door lock.
1.5 PROPOSED METHOD
In our proposed system, a magnetic door lock is administered via RFID reader that initiates the authentication as well as validation of the user or controls the access in short. The systems also maintain evidences regarding the access and exit records of each user in the form of a log report against every access. The system is more convenient to install and implement as access security solution of a particular arena due to its cost effectiveness with respect to the satisfactory level of protection provided. Another advantage is that the system consumes considerably less space for installation and maintenance purposes.
INPUT &OUTPUT
They operate at 5 volts. Each pin can provide or receive a maximum of 40mA an internal pull-up resistor (disconnected by default) of 20-50 k ohms. In addition, some pins have Specialized functions:
Serial: 0 (RX) and 1 (TX). Used to receive (RX) and transmit (TX) TTL serial data.
External Interrupts: 2 and 3. These pins can be configured to trigger an interrupt on a low value, arising or falling edge, or a change in value.
PWM: 3, 5, 6, 9, 10, and 11. Provide 8-bit PWM output with the analog Write() function.
SPI: 10 (SS), 11 (MOSI), 12 (MISO), 13 (SCK). These pins support SPI communication, which although provided by the underlying hardware, is not currently included in the Arduino language.
LED: 13 There is a built-in LED connected to digital pin 13. When the pin is HIGH value, the LED is on, when the pin is LOW, it's off.
I2C: 4 (SDA) and 5 (SCL). Support I2C (TWI) communication using the Wire library.
AREF. Reference voltage for the analog inputs. Used with analogReference().
Reset. Bring this line LOW to reset the microcontroller. Typically used to add a reset button to shields which block the one on the board.
RFID READER
In recent years automatic identification procedures (Auto-ID) have become very popular in many service industries, purchasing and distribution logistics, industry, manufacturing companies and material flow systems. Automatic identification procedures exist to provide information about people, animals, goods and products in transit.The omnipresent barcode labels that triggered a revolution in identification systems some considerable time ago, are being found to be inadequate in an increasing number of cases. Barcodes may be extremely cheap, but their stumbling block is their low storage capacity and the fact that they cannot be reprogrammed. The technically optimal solution would be the storage of data in a silicon chip. The most common form of electronic data-carrying device in use in everyday life is the smart card based upon a contact field (telephone smart card, bank cards). However, the mechanical contact used in the smart card is often impractical. A contactless transfer of data between the data-carrying device and its reader is far more flexible. In the ideal case, the power required to operate the
electronic data-carrying device would also be transferred from the reader using contactless technology. Because of the procedures used for the transfer of power and data, contactless ID systems are called RFID systems (Radio Frequency Identification).
RFID TAG
An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data.An RFID tag is a microchip combined with an antenna in a compact package; the packaging is structured to allow the RFID tag to be attached to an object to be tracked. "RFID" stands for Radio Frequency Identification. The tag's antenna picks up signals from an RFID reader or scanner and then returns the signal, usually with some additional data (like a unique serial number or other customized information).A passive tag is an RFID tag that does not contain a battery; the power is supplied by the reader. When radio waves from the reader are encountered by a passive rfid tag, the coiled antenna within the tag forms a magnetic field. The tag draws power from it, energizing the circuits in the tag. The tag then sends the information encoded in the tag's memory.The RX and TX pins of RFID reader connected to Tx and Rx pins of 8051 Microcontroller respectively.
SMART CARDS
A smart card is an electronic data storage system, possibly with additional computing capacity (microprocessor card), which for convenience is incorporated into a plastic card the size of a credit card. The first smart cards in the form of prepaid telephone smart cards were launched in 1984. Smart cards are placed in a reader, which makes a galvanic connection to the contact surfaces of the smart card using contact springs. The smart card is supplied with energy and a clock pulse from the reader via the contact surfaces.
3.6 DC MOTOR
A DC motor in simple words is a device that converts direct current(electrical energy) into mechanical energy. It’s of vital importance for the industry today, and is equally important for engineers to look into the working principle of DC motor in details that has been discussed in this article. In order to understand the operating principle of dc motor we need to first look into its constructional
PROTEUS
Proteus software version (8.0)for microprocessor simulation, schematic capture, and printed circuit board (PCB) design. It is developed by lab center Electronics. Proteus is a software technology that allows creating clinical executable decision support guidelines with little effort. This site is dedicated to the Proteus executable guidelines model, tools based on the Proteus approach and the automated guidelines created using those tools. A software tool that allows creating and executing clinical decision support guidelines using the Proteus approach is available. Protean allows creating new guidelines or editing existing ones very easily. Much of editing is done by dragging and dropping.
Proteus is an ambitious with a potential to touch many aspect of healthcare. Several prototype software tools developed have validated the core features of the Proteus approach. The experience of development carried out to date suggests that a more exhaustive implementation be created and tested with healthcare professionals Proteus is an online fully EXP with a very low entry price point. With all of the CRM, Accounting, Inventory management and ecommerce and/or POS capabilities, this is the only software your business needs to be successful.
6. CONCLUSION
RFID is increasingly used with biometric technologies for security. The significant advantage of all types ofRFIDsystemsis the non-contact, non-line-of-sight nature of thetechnology. Tags can be read through a variety of substances such as snow, fog, ice, paint. Hence, this project can be very much useful and can be implemented in real time applications for recording the users. Also this kind of a access control system creates a sense of responsibility among the users of a common document in a workplace and they would replace the document in the locker properly for the use of other workers and instances of document theft or miss would be minimized.
FUTURE SCOPE
It depends upon how original one could be to enhance the use of this project. But for us this project is practical for future uses such as smart cart can be interfaced with wireless technologies to make it completely portable in the ,near future. A low cost RFID scanner can be manufactured and used which can scan multiple tags simultaneously so that this project concept implemented for two users can be scaled up for many users of a workplace. Futher this project can be developed into a product for commercial use because the main idea of the project would be very much useful to organizations like educational institutions, offices and so on.