SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
A presentation on:
RFID BASED SECURITY ACCESS
CONTROL SYSTEM
By,
Avinash Yada(10D11A0460)
Ravi Naik(10D11A0448)
Yugendar(10D11A0443)
INTRODUCTION:-
WHAT IS A RFID CARD?
Radio-frequency identification (RFID) is the wireless non-
contact use of radio-frequency electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking
tags attached to object
It is an extension to bar code
INVENTION:-
The first patent to be associated with the abbreviation RFID was
granted to Charles Walton in 1983
TYPES:-
Contact RFID cards
Contact RFID cards have a contact area of approximately 1 square
centimetre (0.16 sq in), comprising several gold-plated contact pads.
These pads provide electrical connectivity when inserted into a reader
Contactless RFID cards
A second card type is the contactless RFID card, in which the card
communicates with and is powered by the reader through
RF induction technology (at data rates of 106–848 kbit/s). These cards
require only proximity to an antenna to communicate
BLOCK DIAGRAM:-
Lpc2
148
SMART
CARD
READER
Max-232
P
ower
L
PC
z
zer
S
upply
Buzzer
L293D
Motor
LP
C
LCD disPower
Supply
POWER SUPPLY:-
 It basically consists of a Transformer to step down the 230V ac
to 18V ac followed by diodes. Here diodes are used to rectify the
ac to dc. After rectification the obtained rippled dc is filtered
using a capacitor Filter. A positive voltage regulator is used to
regulate the obtained dc voltage
COMPONENT DESCRIPTION
Liquid crystal displays (LCD
s) have materials which
combine the properties of
both liquids and crystals.
buzzer A buzzer or beeper
is a signalling device, usually
electronic, typically used in
automobiles, household
appliances such as a
microwave oven, or game
shows
 DC MOTOR:
A DC motor is designed to run on DC electric
power. It is used to control the closing/opening
of the door using L293D IC. The motor works as
per the voltages given by the L293D IC, either in
clockwise direction or in anti-clockwise direction
 RFID READERs:
Contact smart card readers are used as a
communications medium between the smart card
and a host, e.g. a computer, a point of sale
terminal, or a mobile telephone
 L293D:
L293D is a typical Motor driver or Motor Driver
IC which allows DC motor to drive on either
direction
WORKING PRINCIPLE:-
• The RFID module is interfaced with the micro controller and when the card is
inserted into the reader, it reads the data in the card. If the data in the card
is matched with the data stored in the program memory, then it displays
authorized message, if the data is not matched it displays unauthorized as per
the code logic.
• For authorized message, the door will be opened and closes automatically after
a small delay. If it is an unauthorized person it alerts the persons through a
buzzer. The smart card reader alerts the buzzer whenever it reads the data
from the smart card. The door will be driven by DC gear motor by l293d driver
Software used
•Embedded c
•Keil software
SECURITY ACCESS:-
Rfid cards have been advertised as suitable for personal identification tasks,
because they are engineered to be tamper resistant. The chip usually
implements some cryptographic algorithm. There are, however, several methods
for recovering some of the algorithm's internal state.
Differential power analysis involves measuring the precise time and electrical
current required for certain encryption or decryption operations. This can
deduce the on-chip private key used by public key algorithms such as RSA. Some
implementations of symmetric ciphers can be vulnerable to timing or power
attacks as well.
rfid cards can be physically disassembled by using acid, abrasives, or some
other technique to obtain unrestricted access to the on-board microprocessor.
Although such techniques obviously involve a fairly high risk of permanent
damage to the chip, they permit much more detailed information
(e.g. photomicrographs of encryption hardware) to be extracted.
BENEFITS:-
Enhances safety and security.
Portability.
Reliability..
Reconfigurable and reusable.
FUTURE SCOPE:-
 Health Services
The card can be used to store information such as administrative, medical, biological,
and pharmaceutical records. The card simplifies the administrative process and
enables doctors to have access to a more complete and comprehensive healthcare
information.
 Education
The card has the function of identifying the student and also acts as an electronic
purse and can be used purchase products from stores or tickets to public
transportation.
 Transportation
Rechargeable contact-less cards allow ticket-less and cash-less travels. Parking and
telecommunications can also be paid using the smart card. This will simplify the
passenger boarding process.
 Welfare
Card can be used to identify the holder using a series of personal keys and fingerprint
The card holder then uses the card to access government databases and receive the
welfare payment. The security will help eliminate fraud.
CONCLUSION:-
 RFID cards can add convenience and safety to any transaction of value and
data. Evaluations of performance, cost and security that will produce a smart
card system that fits today's needs in future, which leads to better business
for everybody
BIBLIOGRAPHY:-
"development of the "KAMICARD" IC card made from recyclable and
biodegradable paper”. Toppan Printing Company. Archived from the original on
2009-02-27. Retrieved 2009-03-27.
Jump up Multi-application RFID Cards. Cambridge University Press.
Jump up http://si-
pwebsrch02.si.edu/search?site=americanhistory&client=americanhistory&proxys
tylesheet=americanhistory&output=xml_no_dtd&filter=0&q=roland+moreno&sub
mit.x=13&submit.y=8&s=SS
Jump up "Monticello Memoirs Program" Computerworld honors. Retrieved 13
February 2012.
Jump up "Espacenet - Original document" Worldwide.espacenet.com. 1978-08-
08. Retrieved 2014-02-13.
RFID BASED SECURITY ACCESS CONTROL SYSTEM

Contenu connexe

Tendances

Tendances (20)

Rfid based attendance system
Rfid based attendance systemRfid based attendance system
Rfid based attendance system
 
RFID attendance system
RFID attendance systemRFID attendance system
RFID attendance system
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID Technology
RFID TechnologyRFID Technology
RFID Technology
 
RFID security ppt
RFID security pptRFID security ppt
RFID security ppt
 
Attendance System using RFID
Attendance System using RFIDAttendance System using RFID
Attendance System using RFID
 
RFID Basics
RFID BasicsRFID Basics
RFID Basics
 
Rfid presentation
Rfid presentationRfid presentation
Rfid presentation
 
Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )Rfid Attadance System ( Project PPt )
Rfid Attadance System ( Project PPt )
 
Rfid and gsm based attendence system
Rfid and gsm based attendence systemRfid and gsm based attendence system
Rfid and gsm based attendence system
 
RFID and its applications
RFID and its applicationsRFID and its applications
RFID and its applications
 
Rfid technology
Rfid technologyRfid technology
Rfid technology
 
RFID
RFIDRFID
RFID
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
RFID : Technology and Applications
RFID : Technology and ApplicationsRFID : Technology and Applications
RFID : Technology and Applications
 
Presentation RFID
Presentation  RFIDPresentation  RFID
Presentation RFID
 
RFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEMRFID BASED ACCESS CONTROL SYSTEM
RFID BASED ACCESS CONTROL SYSTEM
 
RFID based access control ppt
RFID based access control pptRFID based access control ppt
RFID based access control ppt
 
RFID tag - technology and scenarios
RFID tag - technology and scenariosRFID tag - technology and scenarios
RFID tag - technology and scenarios
 
Smart shopping cart (using RFID)
Smart shopping cart (using RFID)Smart shopping cart (using RFID)
Smart shopping cart (using RFID)
 

En vedette

Rf bases door lock system
Rf bases door lock systemRf bases door lock system
Rf bases door lock systemSikander Bodh
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th semAmit Ranjan
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfidEcwayt
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking systemArjun Singh
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmSai Kumar
 
8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil Kaware8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil KawareProf. Swapnil V. Kaware
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic doorIndira Kundu
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking systemVISHAL NAGAR
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and PracticeNabeel Yoosuf
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slidesguestbed1dd
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control PresentationWajahat Rajab
 
RF Based Hoome Security System
RF Based Hoome Security SystemRF Based Hoome Security System
RF Based Hoome Security SystemKeshari Nandan
 
Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security | Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security | techlead-india
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheLeslie Samuel
 

En vedette (18)

Rf bases door lock system
Rf bases door lock systemRf bases door lock system
Rf bases door lock system
 
Rfid ppt
Rfid pptRfid ppt
Rfid ppt
 
Rfid ppt 8th sem
Rfid ppt 8th semRfid ppt 8th sem
Rfid ppt 8th sem
 
Security access control system using rfid
Security access control system using rfidSecurity access control system using rfid
Security access control system using rfid
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
RF Based Home Automation System
RF Based Home Automation SystemRF Based Home Automation System
RF Based Home Automation System
 
8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil Kaware8051 Microcontroller PPT's By Er. Swapnil Kaware
8051 Microcontroller PPT's By Er. Swapnil Kaware
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
 
Smart digital door locking system
Smart digital door locking systemSmart digital door locking system
Smart digital door locking system
 
Access Control: Principles and Practice
Access Control: Principles and PracticeAccess Control: Principles and Practice
Access Control: Principles and Practice
 
Rfid Presentation Slides
Rfid Presentation SlidesRfid Presentation Slides
Rfid Presentation Slides
 
8051 MICROCONTROLLER
8051 MICROCONTROLLER 8051 MICROCONTROLLER
8051 MICROCONTROLLER
 
Access Control Presentation
Access Control PresentationAccess Control Presentation
Access Control Presentation
 
RF Based Hoome Security System
RF Based Hoome Security SystemRF Based Hoome Security System
RF Based Hoome Security System
 
Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security | Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security |
 
Project ppt
Project pptProject ppt
Project ppt
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Similaire à RFID BASED SECURITY ACCESS CONTROL SYSTEM

smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfssuser5b47c8
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting systemAlexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...Alexander Decker
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontrollerrajkanakaraj007
 
13209523 pss7
13209523 pss713209523 pss7
13209523 pss713209523
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)Soumen Santra
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfSudipto Krishna Dutta
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleIJERA Editor
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3grantlerc
 
RFID Application
RFID ApplicationRFID Application
RFID ApplicationRainySiu
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Hari
 

Similaire à RFID BASED SECURITY ACCESS CONTROL SYSTEM (20)

smartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdfsmartcardtech-140126024149-phpapp01.pdf
smartcardtech-140126024149-phpapp01.pdf
 
Smart card
Smart cardSmart card
Smart card
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system11. rfid security using mini des algorithm in deployment of bike renting system
11. rfid security using mini des algorithm in deployment of bike renting system
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
5.[26 35] rfid security using mini des algorithm in deployment of bike rentin...
 
Rfid based access control system using microcontroller
Rfid based access control system using microcontrollerRfid based access control system using microcontroller
Rfid based access control system using microcontroller
 
13209523 pss7
13209523 pss713209523 pss7
13209523 pss7
 
RFID
RFID RFID
RFID
 
Smart Card Technology
Smart Card TechnologySmart Card Technology
Smart Card Technology
 
RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)RFID (RADIO FREQUENCY IDENTIFICATION)
RFID (RADIO FREQUENCY IDENTIFICATION)
 
A Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdfA Project Report on RFID Based Attendance System.pdf
A Project Report on RFID Based Attendance System.pdf
 
13213806 pss7
13213806 pss713213806 pss7
13213806 pss7
 
Itfm
ItfmItfm
Itfm
 
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid ModuleZigbee Based Indoor Campus Inventory Tracking Using Rfid Module
Zigbee Based Indoor Campus Inventory Tracking Using Rfid Module
 
Access control basics-3
Access control basics-3Access control basics-3
Access control basics-3
 
SANTOSHA.pptx
SANTOSHA.pptxSANTOSHA.pptx
SANTOSHA.pptx
 
RFID Application
RFID ApplicationRFID Application
RFID Application
 
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
Vehicle Tracking and Ticketing System Using RFID Project (Complete Softcopy)
 
13251473 pss7
13251473 pss713251473 pss7
13251473 pss7
 

Dernier

input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CDHeadOfDepartmentComp1
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...IJECEIAES
 
Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Priyansh
 
apple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzxapple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzxChetanM43
 
Utilizing leftover voids under a flyover
Utilizing leftover voids under a flyoverUtilizing leftover voids under a flyover
Utilizing leftover voids under a flyoveryogaraje2002
 
Routing and Algorithms For VLSI design.pptx
Routing and Algorithms For VLSI design.pptxRouting and Algorithms For VLSI design.pptx
Routing and Algorithms For VLSI design.pptxPrateek718260
 
applications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptxapplications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptxananditam30
 
BaseBand-6630-Moshell-Commands .pdf
BaseBand-6630-Moshell-Commands      .pdfBaseBand-6630-Moshell-Commands      .pdf
BaseBand-6630-Moshell-Commands .pdfwafawafa52
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesSreedhar Chowdam
 
Mohanakumar K R Davangere_3[1] 4d1 me.pptx
Mohanakumar K R Davangere_3[1] 4d1 me.pptxMohanakumar K R Davangere_3[1] 4d1 me.pptx
Mohanakumar K R Davangere_3[1] 4d1 me.pptxMohan377827
 
Types of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptxTypes of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptxRamasamyN4
 
Food Analysis Introduction, Properties and characterization
Food Analysis Introduction, Properties and characterizationFood Analysis Introduction, Properties and characterization
Food Analysis Introduction, Properties and characterizationBharathi59577
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxAardwolf Security
 
How to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DCHow to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DCSera Engineered, LLC
 
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdfErgodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdfgestioneergodomus
 
Progress Measurement System in EPC Projects
Progress Measurement System in EPC ProjectsProgress Measurement System in EPC Projects
Progress Measurement System in EPC ProjectsWrench Solutions (P) Ltd
 
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdfDesign-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdfssuserc6aaff
 
Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...IJECEIAES
 
Biomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptxBiomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptxKoustavGhosh26
 

Dernier (20)

input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CD
 
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...Predictive analysis of terrorist activities in Thailand's Southern provinces:...
Predictive analysis of terrorist activities in Thailand's Southern provinces:...
 
Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)Overview of IS 16700:2023 (by priyansh verma)
Overview of IS 16700:2023 (by priyansh verma)
 
apple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzxapple vision pro.pptxadsxscdsaCxaszxsdzx
apple vision pro.pptxadsxscdsaCxaszxsdzx
 
Utilizing leftover voids under a flyover
Utilizing leftover voids under a flyoverUtilizing leftover voids under a flyover
Utilizing leftover voids under a flyover
 
Routing and Algorithms For VLSI design.pptx
Routing and Algorithms For VLSI design.pptxRouting and Algorithms For VLSI design.pptx
Routing and Algorithms For VLSI design.pptx
 
applications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptxapplications of diffrentiability in real life.pptx
applications of diffrentiability in real life.pptx
 
BaseBand-6630-Moshell-Commands .pdf
BaseBand-6630-Moshell-Commands      .pdfBaseBand-6630-Moshell-Commands      .pdf
BaseBand-6630-Moshell-Commands .pdf
 
Neometrix Optical Balloon Theodolite.pptx
Neometrix Optical Balloon Theodolite.pptxNeometrix Optical Balloon Theodolite.pptx
Neometrix Optical Balloon Theodolite.pptx
 
Design and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture NotesDesign and Analysis of Algorithms Lecture Notes
Design and Analysis of Algorithms Lecture Notes
 
Mohanakumar K R Davangere_3[1] 4d1 me.pptx
Mohanakumar K R Davangere_3[1] 4d1 me.pptxMohanakumar K R Davangere_3[1] 4d1 me.pptx
Mohanakumar K R Davangere_3[1] 4d1 me.pptx
 
Types of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptxTypes of Additive Manufacturing in industries.pptx
Types of Additive Manufacturing in industries.pptx
 
Food Analysis Introduction, Properties and characterization
Food Analysis Introduction, Properties and characterizationFood Analysis Introduction, Properties and characterization
Food Analysis Introduction, Properties and characterization
 
Demand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docxDemand for Penetration Testing Services.docx
Demand for Penetration Testing Services.docx
 
How to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DCHow to Implement Effective Stormwater Management in DC
How to Implement Effective Stormwater Management in DC
 
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdfErgodomus - LOD 400 Production Drawings Exampes - Copy.pdf
Ergodomus - LOD 400 Production Drawings Exampes - Copy.pdf
 
Progress Measurement System in EPC Projects
Progress Measurement System in EPC ProjectsProgress Measurement System in EPC Projects
Progress Measurement System in EPC Projects
 
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdfDesign-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
Design-Guide-to-Run-VMware-NSX-with-Cisco-ACI-white-paper.pdf
 
Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...Pyrolysis process control: temperature control design and application for opt...
Pyrolysis process control: temperature control design and application for opt...
 
Biomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptxBiomaterials and biosciences biometals.pptx
Biomaterials and biosciences biometals.pptx
 

RFID BASED SECURITY ACCESS CONTROL SYSTEM

  • 1. A presentation on: RFID BASED SECURITY ACCESS CONTROL SYSTEM By, Avinash Yada(10D11A0460) Ravi Naik(10D11A0448) Yugendar(10D11A0443)
  • 2. INTRODUCTION:- WHAT IS A RFID CARD? Radio-frequency identification (RFID) is the wireless non- contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to object It is an extension to bar code
  • 3. INVENTION:- The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983
  • 4. TYPES:- Contact RFID cards Contact RFID cards have a contact area of approximately 1 square centimetre (0.16 sq in), comprising several gold-plated contact pads. These pads provide electrical connectivity when inserted into a reader Contactless RFID cards A second card type is the contactless RFID card, in which the card communicates with and is powered by the reader through RF induction technology (at data rates of 106–848 kbit/s). These cards require only proximity to an antenna to communicate
  • 6. POWER SUPPLY:-  It basically consists of a Transformer to step down the 230V ac to 18V ac followed by diodes. Here diodes are used to rectify the ac to dc. After rectification the obtained rippled dc is filtered using a capacitor Filter. A positive voltage regulator is used to regulate the obtained dc voltage
  • 7. COMPONENT DESCRIPTION Liquid crystal displays (LCD s) have materials which combine the properties of both liquids and crystals. buzzer A buzzer or beeper is a signalling device, usually electronic, typically used in automobiles, household appliances such as a microwave oven, or game shows  DC MOTOR: A DC motor is designed to run on DC electric power. It is used to control the closing/opening of the door using L293D IC. The motor works as per the voltages given by the L293D IC, either in clockwise direction or in anti-clockwise direction  RFID READERs: Contact smart card readers are used as a communications medium between the smart card and a host, e.g. a computer, a point of sale terminal, or a mobile telephone  L293D: L293D is a typical Motor driver or Motor Driver IC which allows DC motor to drive on either direction
  • 8. WORKING PRINCIPLE:- • The RFID module is interfaced with the micro controller and when the card is inserted into the reader, it reads the data in the card. If the data in the card is matched with the data stored in the program memory, then it displays authorized message, if the data is not matched it displays unauthorized as per the code logic. • For authorized message, the door will be opened and closes automatically after a small delay. If it is an unauthorized person it alerts the persons through a buzzer. The smart card reader alerts the buzzer whenever it reads the data from the smart card. The door will be driven by DC gear motor by l293d driver
  • 10. SECURITY ACCESS:- Rfid cards have been advertised as suitable for personal identification tasks, because they are engineered to be tamper resistant. The chip usually implements some cryptographic algorithm. There are, however, several methods for recovering some of the algorithm's internal state. Differential power analysis involves measuring the precise time and electrical current required for certain encryption or decryption operations. This can deduce the on-chip private key used by public key algorithms such as RSA. Some implementations of symmetric ciphers can be vulnerable to timing or power attacks as well. rfid cards can be physically disassembled by using acid, abrasives, or some other technique to obtain unrestricted access to the on-board microprocessor. Although such techniques obviously involve a fairly high risk of permanent damage to the chip, they permit much more detailed information (e.g. photomicrographs of encryption hardware) to be extracted.
  • 11. BENEFITS:- Enhances safety and security. Portability. Reliability.. Reconfigurable and reusable.
  • 12. FUTURE SCOPE:-  Health Services The card can be used to store information such as administrative, medical, biological, and pharmaceutical records. The card simplifies the administrative process and enables doctors to have access to a more complete and comprehensive healthcare information.  Education The card has the function of identifying the student and also acts as an electronic purse and can be used purchase products from stores or tickets to public transportation.  Transportation Rechargeable contact-less cards allow ticket-less and cash-less travels. Parking and telecommunications can also be paid using the smart card. This will simplify the passenger boarding process.  Welfare Card can be used to identify the holder using a series of personal keys and fingerprint The card holder then uses the card to access government databases and receive the welfare payment. The security will help eliminate fraud.
  • 13. CONCLUSION:-  RFID cards can add convenience and safety to any transaction of value and data. Evaluations of performance, cost and security that will produce a smart card system that fits today's needs in future, which leads to better business for everybody
  • 14. BIBLIOGRAPHY:- "development of the "KAMICARD" IC card made from recyclable and biodegradable paper”. Toppan Printing Company. Archived from the original on 2009-02-27. Retrieved 2009-03-27. Jump up Multi-application RFID Cards. Cambridge University Press. Jump up http://si- pwebsrch02.si.edu/search?site=americanhistory&client=americanhistory&proxys tylesheet=americanhistory&output=xml_no_dtd&filter=0&q=roland+moreno&sub mit.x=13&submit.y=8&s=SS Jump up "Monticello Memoirs Program" Computerworld honors. Retrieved 13 February 2012. Jump up "Espacenet - Original document" Worldwide.espacenet.com. 1978-08- 08. Retrieved 2014-02-13.