Uploaded by gittesandeep

5. PROJECT REPORT ON SMART CARD BASED SECURITY SYSTEM

advertisement
Smart Card Based Door Security System
ABSTRACT
It is a system which can be used where accessing of door or any other electrical device,
can be open using a smart card on inserting the card users data is being read by the
microcontroller which will process the data the card is an EPROM IC where we can store the
data in that here where quick updating, quick record database generator for the person using for
zand where few organization can’t work efficiently like post, telegraph, telephone. Manual
handling required for telephone. The smart card is one of the latest additions to the world of
information technology. Similar in size to today's payment card, the smart card has a
microprocessor memory chip embedded in it that, when coupled with a reader, has the
processing power to serve many different applications. As an access-control device, smart cards
make personal and business data available only to the appropriate users. Another application
provides users with ability to make a purchase or exchange value. Smart cards provide data
portability, security and convenience plastic
Page 1
Smart Card Based Door Security System
1. INTRODUCTION
It is a system which can be used where accessing of door or any other electrical device,
can be open using a smart card on inserting the card users data is being read by the micro
controller which will process the data the card is an EPROM IC where we can store the data in
that there where quick updating, quick record database generator for the person using for and
where few organization cant work efficiently like post, telegraph, telephone. Manual handling
required for telephone. The smart card is one of the latest additions to the world of information
technology. Similar in size to today's plastic payment card, the smart card has a microprocessor
or memory chip embedded in it that, when coupled with a reader, has the processing power to
serve many different applications. As an access-control device, smart cards make personal and
business data available only to the appropriate users. Another application provides users with the
ability to make a purchase or exchange value. Smart cards provide data portability, security and
convenience.
We use a system that is called smart card connectivity which has the following features
Analysis, computation, decision making is easier & faster: Space constraints sensitive to
environmental condition computer literates are required to operate. We have developed a system,
which can use for remote sites or area. The EEPROM (memory) on the smart card is there for
security. The host computer and card reader actually "talk" to the EEPROM. The EEPROM
enforces access to the data on the card. If the host computer read and wrote the smart card's
random access memory (RAM), it would be no different than a diskette. Smarts cards may have
up to 512 kilobytes of EEPROM. The smart card uses a serial interface and receives its power
from external sources like a card reader. Smart cards can be used with a smart-card reader
attachment to a personal computer to authenticate a user. Web browsers also can use smart card
technology to supplement Secure Sockets Layer (SSL) for improved security of Internet
transactions. Smart-card readers can also be found in mobile phones and vending machines.
Page 2
Smart Card Based Door Security System
2. HISTORY
The ancestor of data storage cards is most probably the calling card. The first
plasticbased card was issued by Diners Club in 1950. By the end of the fifties two other firms
joined the initiation: American Express and Carte Blanche. The first credit card was issued by
the Bank of America and that card was VISA. Interbank launched another system called Master
card. However, these early cards were only capable of ’storing’ embossed identification items
(names, numbers, codes etc).
The first cards with magnetic strip were developed by the International Air
Transportation Association (IATA) in the 1970’s. On this type of card the magnetic stripe stored
210 bit/inch of information, which means about 80 alphanumeric (7-bit) characters. A much
higher amount of data can be stored on optical cards. In this case, both reading and writing (and
positioning of course as well) are done optically, enabling a higher level of precision and thus
higher information density. Also, typically the whole surface of the card is used for holding data.
This way, capacity of some megabytes can be achieved. On the other hand, manufacturing costs
of such cards are quite high. Optical cards are used mainly in the medical sector where storage of
the patient’s medical records and perhaps even of X-ray photographs is needed. The next step in
the evolution of cards was the appearance of chipcards i. e. cards based on the application of
microelectronic circuits. The first attempts toward chipcard technology are marked by the
establishment of Innovatron in 1974. Bull produced its first card possessing a microprocessor in
1979. On this card, the processor was in a separate chip, which proved to be an insecure solution.
However, it was only in the 1980’s that the improvement of the technology made it possible to
integrate all circuits on a single chip. In French for instance, chipcards are used since 1986 in
public payphones.
The first chipcards were memory cards. They contained only memory modules which
were controlled by the contacts. Generic cards were chipcards too. They received instructions
from the outside which were processed by the card’s operating system. Nowadays chipcards
possess more and more memory and computation power. This makes it possible that the cards
not only execute commands from the outside but also be able to run separate programs. These
are programmable smart cards. After this short introduction to the history of smart cards it is
time to review the currently most important aspects of smart card technology. Since smart cards
Page 3
Smart Card Based Door Security System
are traditionally used to store sensitive data, security is one of the most important factors to
consider. Security in this case not only assumes the physical tamper-resistance of the card but
also the logical integrity and authenticity of the data stored on it. The latter is achieved by the
SCOS guaranteeing that the data can be accessed through predefined gates (operations) only.
This resembles the object oriented paradigm in software engineering. Another approach is the
introduction of files and file-systems. This way, data can be organised into files and directories.
Access can be restricted to these files by assigning permissions to them.For each file an access
control list (ACL) can be provided defining the rights of the parties (e. g. users, applications)
concerning that file. This concept requires user management. In this case, a user can authenticate
itself toward the card with the help of a personal identification number (PIN) or some other
authentication scheme. Presently people carry 4-5 cards (magnetic and chip cards) in their
wallet: ID card, credit card, phone card etc. As the memory of smart cards increases it becomes
possible to integrate all these functions on a single card.
Smart cards are not only data storage devices. They can be blessed with the ability of
decision making and thus can be used to protect the rights of not only the system but those of the
users too. They make mutual authentication possible. When a credit card user inserts his card
into an ATM, and supplies his PIN code, he has to trust the machine. If the machine is a false
ATM, it may swallow the card (or just keep the card number) and remember the PIN code, and
the attackers may drain the credit card user’s bank account. It would be preferable, if the card
would identify the ATM (or the reader) and check if it possesses the appropriate keys. If the
reader fails to identify itself, the program running on the card should send a message to the user
to warn him not to supply his PIN code. However, sending warning to the user is only possible
through the reader’s user interface. The card itself runs using the power supplied by the reader
too. This makes the situation a bit complicated, but an algorithm for this problem does exist.
Security was the main purpose of smart cards from the early days. In case of the ideal smart card
tamper-resistance has utmost priority. The card manufacturer provides the card’s physical and
the OS’s logical security. The ideal card has an own power supply and a timer. The ideal smart
card runs multiple applications. These may change dynamically so that new applications can be
downloaded to the card and deleted when they are not used.
Page 4
Smart Card Based Door Security System
3. BLOCK DIAGRAM
Fig. Block diagram of smart card based door access system
Page 5
Smart Card Based Door Security System
3.1 Prototype smart card :
The general block diagram of the system consist of the card which provides a
predefined code every card has some unique code stored in its EEPROM also known as
firmware, is an integrated circuit programmed with specific data when it is manufactured.
Working with ROM’s and EPROM’s can be a wasteful business. Even though they are
inexpensive per chip, the cost can add up over time. Erasable programmable read-only
memory(EPROM) addresses this issue. EPROM chips can be rewritten many times. Erasing an
EPROM requires a special tool that emits a certain frequency of ultraviolet (UV) light.
EPROM’s are configured using an EPROM programmer that provides voltage at specified levels
depending on the type of EPROM used. In the smart card we used a two-wire serial EEPROM
AT24C04 is used in the circuit to store the user code, as the memory ensures reading of the latest
saved settings by the micro controller. This 12C bus-compatible- 2048-bit (2-kbit) EEPROM is
organized as 256x8 bits. It can retain data for more than ten years. Using just two lines (SCL and
SDA) of the memory, the micro controller can read the data when user can be connect with the
reader.
3.2 MICROCONTROLLER :
PIC16F72 is an 8-bit CMOS micro controller. Its internal circuitry reducing the
need for external components, thus reducing the cost and power consumption and enhancing the
system reliability.PIC16F72 is an 8-bit, low-cost, high-performance flash micro controller. Its
key features are 4kwords of flash program memory, 192 bytes of data RAM, eleven interrupts,
three I/O ports, 8-bitADC and only 35 powerful single- cycle instructions (each 14-bit wide).The
PIC16F72 micro controller is a 28-pin IC with three input/output ports: port A (RAO
throughRA5), port B (RBO through RB7) and port C (RCO through RC7).
Page 6
Smart Card Based Door Security System
Fig. MICROCONTROLLER
All 22 bi-directional I/O pins are used for smart card (serial EEPROM), LCD
Interface, Buzzer and relay interfacing. Port RC4is pulled up via 4K7 resistor and used as enter
key and mode selection (read & write).The user code is store in the smart card (serial EPROM
(AT24C04) memory. The memory can be read by the micro controller, which activates an output
when the correct access code has been read in the smart card. All Read Data send to the PC
Serial Port via RS232 Interface. A buzzer has been added to provide input feedback; the number
of beep indicates weather the input has been entered correctly or not.
3.3 Smart card interface:
Pins RC3 and RC2 of the microcontroller are used as serial data (SDA) and serial
clock (SCL)lines for the I2C bus for communicating with the smart card(EEPROM_AT24C04).
These two lines are connected to pull-up resistors, which are required for I2C bus devices.
AT24C04 is ani2C bus compatible 4k-bit EEPROM organized as 256x8-bit that can retain data
for more than ten years. Various user codes can be stored in it. Using SCL and SDA lines, the
microcontroller can read and write data for all the parameters For more details on I2C bus and
memory interface, please refer to the AT24C04 datasheet.
Page 7
Smart Card Based Door Security System
3.4 Liquid crystal display :
The dot-matrix liquid crystal display controller and driver LSI displays
alphanumeric, characters, and symbols. It can be configured to drive a dot-matrix liquid crystal
display under the control of a 4 or 8-bit microprocessor. Since all the functions such as display
RAM, character generator, and liquid crystal driver, required for driving a dot-matrix liquid
crystal display are internally provided on one chip, a minimal system can be interfaced with this
controller/driver. A single HD44780U can display up to two 8-character lines (16x 2).A 16 x 2
Line LCD module to display user information. Micro controllers send the data signals through
Pin 11 through 18 (RC0 – RC3) and control signal through 4, 6 and 7 of the microcontroller. Pin
no 3 of the LCD is used to control the contrast by using preset PR1A buzzer connected to port
RB1 of the micro controller through a driver transistor. The buzzer requires 12 volts at a current
of around 50ma, which can not provided by the micro controller. So the driver transistor is
added. The buzzer is used to audible indication for valid user and error situation and Alarm
mode. As soon as pin of the micro controller goes high, the buzzer operates.
3.5 RELAY INTERFACE
A single pole dabble throw (SPDT) relay is connected to port RB0 of the micro
controller through a driver transistor. The relay requires 12 volts at a current of around 100 ma,
which can not provided by the micro controller. So the driver transistor is added. The relay is
used to operate the external solenoid forming part of a locking device or for operating any other
electrical device. Normally the relay remains off. As soon as pin of the micro controller goes
high, the relay operates. When the relay operates and releases. Diode D2 is the standard diode on
a mechanical relay to prevent back EMF from damaging Q3 when the relay releases.
Page 8
Smart Card Based Door Security System
3.6 POWER SUPPLY
Fig. Circuit diagram of regulated power supply
Two supply voltages are required for the circuit. A DC or AC 12 V mains adaptor is
connected to bridge rectifier (D2, 3, 4, 5) via CN1 Connector. U3 and U4 are supplied with a
regulated 5 V from a 7805 (U2)fixed voltage Regulator. The unregulated voltage of
approximately 12 V is required for relay and buzzer driving circuit.
3.7 LED:
A light-emitting diode (LED) is a semiconductor light source. LEDs are used as
indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical
electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions
are available across the visible, ultraviolet and infrared wavelengths, with very high brightness.
The internal structure and parts of a led are shown in figures 3.4.1 and 3.4.2 respectively.
Page 9
Smart Card Based Door Security System
Fig. Inside a LED
Fig. Parts of a LED
LED lights have a variety of advantages over other light sources:

High-levels of brightness and intensity

High-efficiency

Low-voltage and current requirements

Low radiated heat

High reliability (resistant to shock and vibration)

No UV Rays

Long source life

Can be easily controlled and programmed
Page 10
Smart Card Based Door Security System
3.8 D.C. Motor :
Fig. DC Motor
A DC motor uses electrical energy to produce mechanical energy, very typically
through the interaction of magnetic fields and current-carrying conductors. The reverse process,
producing
electrical
energy
from
mechanical
energy,
is
accomplished
by
an alternator, generator or dynamo. Many types of electric motors can be run as generators, and
vice versa. The input of a DC motor is current/voltage and its output is torque (speed).
The DC motor has two basic parts: the rotating part that is called the armature and the
stationary part that includes coils of wire called the field coils. The stationary part is also called
the stator. Figure shows a picture of a typical DC motor, Figure shows a picture of a DC
armature, and Fig shows a picture of a typical stator. From the picture you can see the armature
is made of coils of wire wrapped around the core, and the core has an extended shaft that rotates
on bearings. You should also notice that the ends of each coil of wire on the armature are
terminated at one end of the armature. The termination points are called the commutator, and this
is where the brushes make electrical contact to bring electrical current from the stationary part to
the rotating part of the machine.
Page 11
Smart Card Based Door Security System
4. REQUIRMENTS
1. Resistors and diodes
2. IC sockets
3. Ceramic capacitors
4. A 4 pin zippy tact switch (SW1, 2, and 3)
5. LM7805 regulators.
6. LED’s, and crystal .
7. Electrolytic capacitors. Make sure you insert them the correct way around
8. RF Transmitter, Receiver Module, relay and buzzer
9. Microcontroller PIC16F72
Page 12
Smart Card Based Door Security System
5. CIRCUIT DIAGRAM
Page 13
Smart Card Based Door Security System
Fig. Circuit diagram of smart card based door access system
5.1 Prototype smart card:
The general block diagram of the system consist of the card which provides a
predefined code (STORED IN THE EEPROM OF the card IC) every card has some unique code
stored in its EEPROM also known as firmware, is an integrated circuit programmed with specific
data when it is manufactured.
Working with ROM’s and EPROM’s can be a wasteful business. Even though they are
inexpensive per chip, the cost can add up over time. Erasable programmable read-only memory
(EPROM) addresses this issue. EPROM chips can be rewritten many times. Erasing an EPROM
requires a special tool that emits a certain frequency of ultraviolet (UV) light. EPROM’s are
configured using an EPROM programmer that provides voltage at specified levels depending on
the type of EPROM used. In the smart card we used a two-wire serial EEPROM AT24C04 is
used in the circuit to store the user code, as the memory ensures reading of the latest saved
settings by the micro controller. This 12C bus-compatible- 2048-bit (2-kbit) EEPROM is
Page 14
Smart Card Based Door Security System
organized as 256x8 bits. It can retain data for more than ten years. Using just two lines (SCL and
SDA) of the memory, the micro controller can read the data when user can be connect with the
reader.
5.2 MICROCONTROLLER INTERFACE :
Fig. PIN DIAGRAM OF PIC 16F72 MICROCONTROLLER
PIC16F72 is an 8-bit CMOS micro controller. Its internal circuitry reducing the
need for external components, thus reducing the cost and power consumption and enhancing the
system reliability. PIC16F72 is an 8-bit, low-cost, high-performance flash micro controller. Its
key features are 4k words of flash program memory, 192 bytes of data RAM, eleven interrupts,
three I/O ports, 8-bit ADC and only 35 powerful single- cycle instructions (each 14-bit wide).
Page 15
Smart Card Based Door Security System
The PIC16F72 micro controller is a 28-pin IC with three input/output ports: port A (RAO
through RA5), port B (RBO through RB7) and port C (RCO through RC7). All 22 bi-directional
I/O pins are used for smart card (serial EEPROM), LCD Interface, Buzzer and relay interfacing.
Port RC4 is pulled up via 4K7 resistor and used as enter key and mode selection (read & write).
The user code is store in the smart card (serial EPROM (AT24C04) memory. The memory can
be read by the micro controller, which activates an output when the correct access code has been
read in the smart card. All Read Data send to the PC Serial Port via RS232 Interface. A buzzer
has been added to provide input feedback; the number of beep indicates weather the input has
been entered correctly or not.
5.3 Smart card interface
Pins RC3 and RC2 of the microcontroller are used as serial data (SDA) and serial clock
(SCL) lines for the I2C bus for communicating with the smart card (EEPROM_AT24C04).
These two lines are connected to pull-up resistors, which are required for I2C bus devices.
AT24C04 is an i2C bus compatible 4k-bit EEPROM organized as 256x8-bit that can retain data
for more than ten years. Various user codes can be stored in it. Using SCL and SDA lines, the
microcontroller can read and write data for all the parameters.
5.4 LCD INTERFACE:
The dot-matrix liquid crystal display controller and driver LSI displays alphanumeric,
characters, and symbols. It can be configured to drive a dot-matrix liquid crystal display under
the control of a 4 or 8-bit microprocessor. Since all the functions such as display RAM, character
generator, and liquid crystal driver, required for driving a dot-matrix liquid crystal display are
internally provided on one chip, a minimal system can be interface with this controller/driver. A
single HD44780U can display up to two 8-character lines (16x 2).A 16 x 2 Line LCD module to
display user information. Micro controllers send the data signals through Pin 11 through 18 (RC0
Page 16
Smart Card Based Door Security System
– RC3) and control signal through 4, 6 and 7 of the microcontroller. Pin no 3 of the LCD is used
to control the contrast by using preset PR1r to the AT24C04 data
Fig. LCD Display
5.5 BUZZER :
Fig. Buzzer
Page 17
Smart Card Based Door Security System
A buzzer connected to port RB1 of the micro controller through a driver transistor. The
buzzer requires 12 volts at a current of around 50ma, which can not provided by the micro
controller. So the driver transistor is added. The buzzer is used to audible indication for valid
user and error situation and Alarm mode. As soon as pin of the micro controller goes high, the
buzzer operates sheet.
5.6 RELAY INTERFACE
A single pole dabble throw (SPDT) relay is connected to port RB0 of the micro controller
through a driver transistor. The relay requires 12 volts at a current of around 100 ma, which
cannot provided by the micro controller. So the driver transistor is added. The relay is used to
operate the external solenoid forming part of a locking device or for operating any other
electrical device. Normally the relay remains off. As soon as pin of the micro controller goes
high, the relay operates. When the relay operates and releases.
5.7 POWER SUPPLY
Two supply voltages are required for the circuit. A DC or AC 12 V mains adaptor is
connected to bridge rectifier (D2, 3, 4, 5) via CN1 Connector. U3 and U4 are supplied with a
regulated 5 V from a 7805 (U2) fixed voltage Regulator. The unregulated voltage of
approximately 12 V is required for relay and buzzer driving circuit. damaging Q3 when the relay
releases. LED L1 indicates relay on.
Page 18
Smart Card Based Door Security System
6. PROGRAMMING
// #Define __LCD_RSPORT PORTC
// #Define __LCD_ENPORT PORTC
// #Define CARD PORTB,7
// #Define SCL PORTB,5
// #Define SDA PORTB,6
// #Define SW1 PORTB,2
// #Define SW2 PORTB,3
// #Define SW3 PORTB,4
// #Define RLY PORTC,6
// #Define BUZ PORTC,7
Movwf W_VAL
Bcf PORTC,6
Bcf PORTC,7
Clrf TEMP
Bsf PORTB,2
Bsf PORTB,3
Page 19
Smart Card Based Door Security System
Bsf PORTB,4
Movlw 3
Movwf PP1H
Movlw 232
Call dly@w
Btfsc PORTB,2
Goto bc@LL2
Goto PROG_CARD
Goto bc@LL3
Goto MAIN
Call Lcd@Cls
Movlw 128
Movwf BPFH
Movlw 128
Call LCD@crs
Movlw 87
Call Print
Movlw 69
Call Print
Movlw 76
Page 20
Smart Card Based Door Security System
Call Print
Movlw 67
Call Print
Movlw 79
Call Print
Movlw 77
Call Print
Movlw 69
Call Print
Movlw 32
Call Print
Movlw 84
Call Print
Movlw 79
Call Print
Movlw 32
Call Print
Movlw 83
Call Print
Movlw 77
Call Print
Page 21
Smart Card Based Door Security System
Movlw 65
Call Print
Movlw 82
Call Print
Movlw 84
Call Print
Movlw 128
Movwf BPFH
Movlw 192
Call LCD@crs
Movlw 67
Call Print
Movlw 65
Call Print
Movlw 82
Call Print
Movlw 68
Call Print
Movlw 32
Call Print
Movlw 65
Page 22
Smart Card Based Door Security System
Call Print
Movlw 67
Call Print
Call Print
Movlw 69
Call Print
Movlw 83
Call Print
Call Print
Call Print
Movlw 32
Call Print
Movlw 83
Call Print
Movlw 89
Call Print
Movlw 83
Call Print
Movlw 11
Movwf PP1H
Movlw 184
Page 23
Smart Card Based Door Security System
Call dly@w
MAIN
Bcf PORTC,6
Bcf PORTC,7
Clrf TEMP
Call Lcd@Cls
Movlw 128
Movwf BPFH
Movlw 128
Call LCD@crs
Movlw 67
Call Print
Movlw 65
Call Print
Movlw 82
Call Print
Movlw 68
Call Print
Movlw 32
Page 24
Smart Card Based Door Security System
Call Print
Movlw 65
Call Print
Movlw 67
Call Print
Call Print
Movlw 69
Call Print
Movlw 83
Call Print
Call Print
Call Print
Movlw 32
Call Print
Movlw 83
Call Print
Movlw 89
Call Print
Movlw 83
Call Print
Movlw 128
Page 25
Smart Card Based Door Security System
Movwf BPFH
Movlw 192
Call LCD@crs
Movlw 69
Call Print
Movlw 78
Call Print
Movlw 84
Call Print
Movlw 69
Call Print
Movlw 82
Call Print
Movlw 32
Call Print
Movlw 85
Call Print
Movlw 82
Call Print
Movlw 32
Call Print
Page 26
Smart Card Based Door Security System
Movlw 67
Call Print
Movlw 65
Call Print
Movlw 82
Call Print
Movlw 68
Call Print
Movlw 32
Call Print
Movlw 62
Call Print
Call Print
Movlw 1
Movwf PP1H
Movlw 244
Call dly@w
Movlw 1
Btfsc PORTB,7
Clrw
Movwf SP#P9
Page 27
Smart Card Based Door Security System
Movlw 1
Btfsc PORTB,2
Clrw
Andwf SP#P9,W
Btfsc STATUS,2
Goto bc@LL5
Goto READ_DATA
Goto bc@LL6
CHECK
Movlw 101
Subwf TEMP,W
Btfss STATUS,2
Goto bc@LL8
Call Lcd@Cls
Movlw 128
Movwf BPFH
Movlw 128
Call LCD@crs
Movlw 67
Page 28
Smart Card Based Door Security System
Call Print
Movlw 65
Call Print
Movlw 82
Call Print
Movlw 68
Call Print
Movlw 32
Call Print
Movlw 65
Call Print
Movlw 67
Call Print
Call Print
Movlw 69
Call Print
Movlw 83
Call Print
Call Print
Call Print
Movlw 32
Page 29
Smart Card Based Door Security System
Call Print
Movlw 83
Call Print
Movlw 89
Call Print
Movlw 83
Call Print
Movlw 128
Movwf BPFH
Movlw 192
Call LCD@crs
Movlw 86
Call Print
Movlw 65
Call Print
Movlw 76
Call Print
Movlw 73
Call Print
Movlw 68
Call Print
Page 30
Smart Card Based Door Security System
Movlw 32
Call Print
Movlw 85
Call Print
Movlw 83
Call Print
Movlw 69
Call Print
Movlw 82
Call Print
Movlw 32
Call Print
Movlw 49
Call Print
Movlw 100
Call dl@ms
Bsf PORTC,6
Bsf PORTC,7
Movlw 1
Movwf PP1H
Page 31
Smart Card Based Door Security System
Movlw 244
Call dly@w
USER_1
Bcf PORTC,7
Movlw 15
Movwf PP1H
Movlw 160
Call dly@w
Btfsc PORTB,7
Goto bc@LL11
Goto USER_1
bc@LL11
Goto bc@LL7
bc@LL8
Movlw 102
Subwf TEMP,W
Btfss STATUS,2
Goto bc@LL13
Call Lcd@Cls
Movlw 128
Page 32
Smart Card Based Door Security System
Movwf BPFH
Movlw 128
Call LCD@crs
Movlw 67
Call Print
Movlw 65
Call Print
Movlw 82
Call Print
Movlw 68
Call Print
Movlw 32
Call Print
Movlw 65
Call Print
Movlw 67
Call Print
Call Print
Movlw 69
Call Print
Movlw 83
Page 33
Smart Card Based Door Security System
Call Print
Call Print
Call Print
Movlw 32
Call Print
Movlw 83
Call Print
Movlw 89
Call Print
Movlw 83
Call Print
Movlw 128
Movwf BPFH
Movlw 192
Call LCD@crs
Movlw 86
Call Print
Movlw 65
Call Print
Movlw 76
Call Print
Page 34
Smart Card Based Door Security System
Movlw 73
Call Print
Movlw 68
Call Print
Movlw 32
Call Print
Movlw 85
Call Print
Movlw 83
Call Print
Movlw 69
Call Print
Movlw 82
Call Print
Movlw 32
Call Print
Movlw 50
Call Print
Movlw 100
Call dl@ms
Bsf PORTC,6
Page 35
Smart Card Based Door Security System
Bsf PORTC,7
Movlw 1
Movwf PP1H
Movlw 244
Call dly@w
Page 36
Smart Card Based Door Security System
7. ADVNTAGES
Low Cost :
Smart cards are electronic devices made in the millions; though costs vary, most run between 7
to 15 cents. The smart card itself need not cost significantly more than a standard photo ID, so
managers can issue smart cards to as many employees as circumstances require. Most of the cost
of an smart card system lies in the electronic readers, locks, computers and related software.
Secure Data :
The data on an smart card is readable only with special equipment, keeping the data recorded on
the chip secure. Also, the data need only be meaningful to your own organization. You can
record a unique employee ID code and other data known only to your company. A lost card
typically conveys little useful information to someone without detailed knowledge of your
organization's security.
Flexibility:
With the right equipment, you can reprogram an existing smart card with new information. For
example, if an employee receives a change in security clearance or transfers to a different
department, he can get his card updated to reflect his new status. When the company decides to
revamp the security system, the department responsible for the cards can revise the data on the
cards without needing to issue new ones.
Ease of Use:
An smart card is just as useful in your pocket or clipped to your shirt. Because the smart system
uses radio waves, the card's proximity to the reader triggers the system. Unlike a magnetic stripe
card, an smart card doesn't need to make physical contact with the reader. This adds convenience
when you're carrying an armload of boxes and want access to a locked room, for example.
Page 37
Smart Card Based Door Security System
8. DISADVANTAGES
Easily Lost
Like a credit card, smart cards are small, lightweight and can be easily lost if the person is
irresponsible. Unlike credit cards, smart cards can have multiple uses and so the loss may be
much more inconvenient. If you lose a card that doubles as a debit card, bus pass and key to the
office, you could be severely inconvenienced for a number of days.
Security
A second disadvantage of the using smart cards is their level of security. They are more secure
than swipe cards. However, they are not as secure as some in the general public would believe.
This creates a false sense of security and someone might not be as diligent as protecting their
card and the details it holds.
Slow Adoption
If used as a payment card, not every store or restaurant will have the hardware necessary to use
these cards. One of the reasons for this is since the technology is more secure, it is also more
expensive to produce and use. Therefore, some stores may charge a basic minimum fee for using
smart cards for payment, rather than cash.
Page 38
Smart Card Based Door Security System
9. APPLICATIONS
This is smart card based Access system is used in following applications
1. Bank
2. ATM
3. Bank Lockers
4. Schools
5. College
6. Home security application.
Page 39
Smart Card Based Door Security System
10. CONCLUSION
Integrating features of all the hardware components used have been developed in it.
Presence of every module has been reasoned out and placed carefully, thus contributing to the
best working of the unit. Secondly, using highly advanced IC’s with the help of growing
technology, the project has been successfully implemented. Thus the project has been
successfully designed and tested.
Page 40
Smart Card Based Door Security System
11. REFERENCES
The sites which were used while doing this project:
1. www.wikipedia.com
2. www.allaboutcircuits.com
3. www.microchip.com
4. www.howstuffworks.com
Books referred:
1. Raj kamal –Microcontrollers Architecture, Programming, Interfacing and System Design.
2. Mazidi and Mazidi –Embedded Systems.
3. PCB Design Tutorial –David.L.Jones.
4. PIC Microcontroller Manual – Microchip.
Page 41
Download