1. A presentation on:
RFID BASED SECURITY ACCESS
CONTROL SYSTEM
By,
Avinash Yada(10D11A0460)
Ravi Naik(10D11A0448)
Yugendar(10D11A0443)
2. INTRODUCTION:-
WHAT IS A RFID CARD?
Radio-frequency identification (RFID) is the wireless non-
contact use of radio-frequency electromagnetic fields to transfer
data, for the purposes of automatically identifying and tracking
tags attached to object
It is an extension to bar code
4. TYPES:-
Contact RFID cards
Contact RFID cards have a contact area of approximately 1 square
centimetre (0.16 sq in), comprising several gold-plated contact pads.
These pads provide electrical connectivity when inserted into a reader
Contactless RFID cards
A second card type is the contactless RFID card, in which the card
communicates with and is powered by the reader through
RF induction technology (at data rates of 106–848 kbit/s). These cards
require only proximity to an antenna to communicate
6. POWER SUPPLY:-
It basically consists of a Transformer to step down the 230V ac
to 18V ac followed by diodes. Here diodes are used to rectify the
ac to dc. After rectification the obtained rippled dc is filtered
using a capacitor Filter. A positive voltage regulator is used to
regulate the obtained dc voltage
7. COMPONENT DESCRIPTION
Liquid crystal displays (LCD
s) have materials which
combine the properties of
both liquids and crystals.
buzzer A buzzer or beeper
is a signalling device, usually
electronic, typically used in
automobiles, household
appliances such as a
microwave oven, or game
shows
DC MOTOR:
A DC motor is designed to run on DC electric
power. It is used to control the closing/opening
of the door using L293D IC. The motor works as
per the voltages given by the L293D IC, either in
clockwise direction or in anti-clockwise direction
RFID READERs:
Contact smart card readers are used as a
communications medium between the smart card
and a host, e.g. a computer, a point of sale
terminal, or a mobile telephone
L293D:
L293D is a typical Motor driver or Motor Driver
IC which allows DC motor to drive on either
direction
8. WORKING PRINCIPLE:-
• The RFID module is interfaced with the micro controller and when the card is
inserted into the reader, it reads the data in the card. If the data in the card
is matched with the data stored in the program memory, then it displays
authorized message, if the data is not matched it displays unauthorized as per
the code logic.
• For authorized message, the door will be opened and closes automatically after
a small delay. If it is an unauthorized person it alerts the persons through a
buzzer. The smart card reader alerts the buzzer whenever it reads the data
from the smart card. The door will be driven by DC gear motor by l293d driver
10. SECURITY ACCESS:-
Rfid cards have been advertised as suitable for personal identification tasks,
because they are engineered to be tamper resistant. The chip usually
implements some cryptographic algorithm. There are, however, several methods
for recovering some of the algorithm's internal state.
Differential power analysis involves measuring the precise time and electrical
current required for certain encryption or decryption operations. This can
deduce the on-chip private key used by public key algorithms such as RSA. Some
implementations of symmetric ciphers can be vulnerable to timing or power
attacks as well.
rfid cards can be physically disassembled by using acid, abrasives, or some
other technique to obtain unrestricted access to the on-board microprocessor.
Although such techniques obviously involve a fairly high risk of permanent
damage to the chip, they permit much more detailed information
(e.g. photomicrographs of encryption hardware) to be extracted.
12. FUTURE SCOPE:-
Health Services
The card can be used to store information such as administrative, medical, biological,
and pharmaceutical records. The card simplifies the administrative process and
enables doctors to have access to a more complete and comprehensive healthcare
information.
Education
The card has the function of identifying the student and also acts as an electronic
purse and can be used purchase products from stores or tickets to public
transportation.
Transportation
Rechargeable contact-less cards allow ticket-less and cash-less travels. Parking and
telecommunications can also be paid using the smart card. This will simplify the
passenger boarding process.
Welfare
Card can be used to identify the holder using a series of personal keys and fingerprint
The card holder then uses the card to access government databases and receive the
welfare payment. The security will help eliminate fraud.
13. CONCLUSION:-
RFID cards can add convenience and safety to any transaction of value and
data. Evaluations of performance, cost and security that will produce a smart
card system that fits today's needs in future, which leads to better business
for everybody
14. BIBLIOGRAPHY:-
"development of the "KAMICARD" IC card made from recyclable and
biodegradable paper”. Toppan Printing Company. Archived from the original on
2009-02-27. Retrieved 2009-03-27.
Jump up Multi-application RFID Cards. Cambridge University Press.
Jump up http://si-
pwebsrch02.si.edu/search?site=americanhistory&client=americanhistory&proxys
tylesheet=americanhistory&output=xml_no_dtd&filter=0&q=roland+moreno&sub
mit.x=13&submit.y=8&s=SS
Jump up "Monticello Memoirs Program" Computerworld honors. Retrieved 13
February 2012.
Jump up "Espacenet - Original document" Worldwide.espacenet.com. 1978-08-
08. Retrieved 2014-02-13.