Sunteți pe pagina 1din 26

Smart card based Door Access System with LCD

1. INTRODUCTION
It is a system which can be used where accessing of door or any other electrical device, can be open using a smart card on inserting the card users data is being by the micro controller which will process the data the card is an EPROM IC where we can store the data in that there where quick updating, quick record database generator for the person using for and where few organization cant work efficiency like post, telegraph, telephone. Manual handling required for telephone. The smart card is one of the latest additions to the world of information technology. Similar in size to today plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different application. As soon as access-control device, smart cards make personal an business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart card provide portability, security and convenience. We use a system that is called smart card connectivity which has the following features. Analysis, computation, decising making is easier & faster. Space constraint sensitive to environmental condition computer literates are required to operate. We have developed a system, which can used for remote sites or area. The EEPROM (memory) on the smart car d I s there for security. The EEPROM enforces access to the data on the card. If the host computer read and wrote the smart card random access memory(RAM), it would be no different than a diskette. Smart card may have up to 512 kilobytes of EEPROM. The smart card uses a serial interface and receive s its power from external sources liked a card reader. The processor user a limited instruction set for application such as cryptography. Smart card can be used with a smart card reader attachment to a personal computer to authentic a user. Web browsers also can use smart card improved security of

technology to supplement Secure Sockets Layer(SSL) for Internaltransaction.

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.1. WHAT IS SMART CARD?

A smart card resembles a credit card in size and shape, but inside it is completely different. First of all, it has an inside a normal credit card is a simple piece of plastic. The inside of a smart card usually contains an embedded microprocessor. The microprocessor is under a gold contact pad on one side of the card. Think of the microprocessor as replacing the usual magnetic stripe on a credit card or debit card. Smart cards are much more popular in Europe than in the United States. In Europe, the health insurance and banking industries use smart cards extensively. Every German citizen has a smart card for health insurance. Even though smart cards have been around in their modern form for at least a decade, they are just starting to take off in the United States. Magnetic stripe technology remains in wide use in the United States. However, the data on the stripe can easily be read, written, deleted or changed with off-the-shelf equipment. Therefore, the stripe is really not the best place to store sensitive information. To protect the consumer, businesses in the U.S. have invested in extensive online mainframe-based computer networks for verification and processing. In Europe, such an infrastructure did not develop intelligence. The microprocessor on the smart card is there for security. The host computer and card reader actually "talk" to the microprocessor. The microprocessor enforces access to the data on the card. If the host computer read and wrote the smart card's random access memory (RAM), it would be no different than a diskette.
D.B. Science College Gondia 2

instead, the card carries the

Smart card based Door Access System with LCD

Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The processor uses a limited instruction set for applications such as cryptography.

The most common smart card applications are: Credit cards Electronic cash Computer security systems Wireless communication Loyalty systems (like frequent flyer points) Banking Satellite TV Government identification Smart cards can be used with a smart-card reader attachment to a personal computer to authenticate a user. Web browsers also can use smart card technology to supplement Secure Sockets Layer (SSL) for improved security of Internet transactions. Visa's Smart Card FAQ shows how online purchases work using a smart card and a PC equipped with a smart-card reader. Smart-card readers can also be found in mobile phones and vending machines.

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.2. TYPES OF SMART CARD


Smart cards are defined according to 1). How the card data is read and written 2). The type of chip implanted within the card and its capabilities. There is a wide range of options to choose from when designing your system.

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.3. CARD CONSTRUCTION


Mostly all chip cards are built from layers of differing materials, or substrates, that when brought together properly gives the card a specific life and functionality. The typical card today is made from PVC, Polyester or Polycarbonate. The card layers are printed first and then laminated in a large press. The next step in construction is the blanking or die cutting. This is followed by embedding a chip and then adding data to the card. In all, there may be up to 30 steps in constructing a card. The total components, including software and plastics, may be as many as 12 separate items; all this in a unified package that appears to the user as a simple device.

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.4. CONTACT CARDS


These are the most common type of smart card. Electrical contacts located on the outside of the card connect to a card reader when the card is inserted. This connector is bonded to the encapsulated chip in the card.

Increased levels of processing power, flexibility and memory will add cost. Single function cards are usually the most cost-effective solution. Choose the right type of smart card for your application by determining your required level of security and evaluating cost versus functionality in relation to the cost of the other hardware elements found in a typical workflow. All of these variables should be weighted against the expected lifecycle of the card. On average the cards typically comprise only 10 to 15 percent of the total system cost with the infrastructure, issuance, software, readers, training and advertising making up the other 85 percent. The following chart demonstrates some general rules of thumb:

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.5. MICROPROCESSOR MULTIFUNCTION CARDS


These cards have on-card dynamic data processing capabilities. Multifunction smart cards allocate card memory into independent sections or files assigned to a specific function or application. Within the card is a microprocessor or microcontroller chip that manages this memory allocation and file access. This type of chip is similar to those found inside all personal computers and when implanted in a smart card, manages data in organized file structures, via a card operating system (COS). Unlike other operating systems, this software controls access to the on-card user memory. This capability permits different and multiple functions and/or different applications to reside on the card, allowing businesses to issue and maintain a diversity of products through the card. One example of this is a debit card that also enables building access on a college campus. Multifunction cards benefit issuers by enabling them to market their products and services via state-of-the-art transaction and encryption technology. Specifically, the technology enables secure identification of users and permits information updates without replacement of the installed base of cards, simplifying program changes and reducing costs. For the card user, multifunction means greater convenience and security, and ultimately, consolidation of multiple cards down to a select few that serve many purposes. There are many configurations of chips in this category, including chips that support cryptographic Public Key Infrastructure (PKI) functions with onboard math co-processors or javacard with virtual machine hardware blocks. As a rule of thumb - the more functions, the higher the cost

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.6. SMART CARD OVERVIEW


A smart card, typically a type of chip card, is a plastic card that contains an embedded computer chipeither a memory or microprocessor typethat stores and transacts data. This data is usually associated with either value, information, or both and is stored and processed within the card's chip. The card data is transacted via a reader that is part of a computing system. Systems that are enhanced with smart cards are in use today throughout several key applications, including healthcare, banking, entertainment, and transportation. All applications can benefit from the added features and security that smart cards provide. According to Eurosmart, worldwide smart card shipments will grow 10% in 2010 to 5.455 billion cards. Markets that have been traditionally served by other machine readable card technologies, such as barcode and magnetic stripe, are converting to smart cards as the calculated return on investment is revisited by each card issuer year after year.

1.6.1. APPLICATIONS
First introduced in Europe nearly three decades ago, smart cards debuted as a stored value tool for payphones to reduce theft. As smart cards and other chip-based cards advanced, people found new ways to use them, including charge cards for credit purchases and for record keeping in place of paper. In the U.S., consumers have been using chip cards for everything from visiting libraries to buying groceries to attending movies, firmly integrating them into our everyday lives. Several U.S. states have chip card programs in progress for government applications ranging from the Department of Motor Vehicles to Electronic Benefit Transfers (ebts). Many industries have implemented the power of smart cards in their products, such as the GSM digital cellular phones as well as TVsatellite decoders.

D.B. Science College Gondia

Smart card based Door Access System with LCD

1.7. WHY SMART CARDS


Cards improve the convenience and security of any transaction. They provide tamper-proof storage of user and account identity. Smart card systems have proven to be more reliable than other machine-readable cards, like magnetic stripe and barcode, with many studies showing card read life and reader life improvements demonstrating much lower cost of system maintenance. Smart cards also provide vital components of system security for the exchange of data throughout virtually any type of network. They protect against a full range of security threats, from careless storage of user passwords to sophisticated system hacks. The costs to manage password resets for an organization or enterprise are very high, thus smart making smart cards a costeffective solution in these environments. Multifunction cards can also be used to manage network system access and store value and other data. Worldwide, people are now using smart cards for a wide variety of daily tasks, which include:

1.7.1. PHYSICAL ACCESS


Businesses and universities of all types need simple identity cards for all employees and students. Most of these individuals are also granted access to certain data, equipment, and departments according to their status. Multifunction, microprocessor-based smart cards incorporate identity with access privileges and can also store value for use in various locations, such as cafeterias and stores. Many hotels have also adopted ISO 7816 type card readers to secure staff-only rooms and facilities. All U.S. government and many corporations have now incorporated a contactless reader as an access point to their facilities. Some companies have incorporated a biometric component to this credential as well. The older systems deploy a simple proximity card system as the gate keeper. But as the security requirements have become stronger and the cost of ISO 14443 standard systems have become lower, the world is rapidly adopting this new standard. This market shift is partially driven by the US governments adoption of the mandated Personal Identity Verification (PIV) standard. There is a rich ecosystem of suppliers and integrators for this standard.
D.B. Science College Gondia 9

Smart card based Door Access System with LCD

1.8. SMART CARD READERS & TERMINALS

Readers and terminals operate with smart cards to obtain card information and perform a transaction. Generally, a reader interfaces with a PC for the majority of its processing requirements. A terminal is a self-contained processing device. Both readers and terminals read and write to smart cards.

1.8.1. Readers

This type of reader requires a physical connection to the cards, made by inserting the card into the reader. This is the most common reader type for applications such as ID and Stored Value. The card-to-reader communications is often ISO 7816 T=0 only. This communication has the advantage of direct coupling to the reader and is considered more secure. The other advantage is speed. The typical PTS Protocol Type Selection (ISO7816-3) negotiated speed can be up to 115 kilo baud. This interface enables larger data transport without the overhead of anti-collision and wireless breakdown issues that are a result from the card moving in and out of the reader antenna range.

D.B. Science College Gondia

10

Smart card based Door Access System with LCD

1.9. SMART CARD SECURITY


Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications. The following is a basic discussion of system security and smart cards, designed to familiarize you with the terminology and concepts you need in order to start your security planning.

1.8.1. WHAT IS SECURITY?


Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications. The following is a basic discussion of system security and smart cards, designed to familiarize you with the terminology and concepts you need in order to start your security planning. Security is basically the protection of something valuable to ensure that it is not stolen, lost, or altered. The term "data security" governs an extremely wide range of applications and touches everyone's daily life. Concerns over data security are at an all-time high, due to the rapid advancement of technology into virtually every transaction, from parking meters to national defense. Data is created, updated, exchanged and stored via networks. A network is any computing system where users are highly interactive and interdependent and by definition, not all in the same physical place. In any network, diversity abounds, certainly in terms of types of data, but also types of users. For that reason, a system of security is essential to maintain computing and network functions, keep sensitive data secret, or simply maintain worker safety. Any one company might provide an example of these multiple security concerns: Take, for instance, a pharmaceutical manufacturer.

D.B. Science College Gondia

11

Smart card based Door Access System with LCD

Type of data
Drug Formula Accounting, Regulatory Personnel Files Employee ID

Security concern
Basis of business income. Competitor spying Required by law Employee privacy

Type of access
Highly selective list of executives Relevant executives and departments Relevant executives and departments

Facilities Building safety, emergency response

Non-employee access. Relevant executives and Inaccurate payroll, benefits departments assignment Individuals per function and clearance such as Access authorization customers, visitors, or vendors Outside emergency All employees response

1.8.2. WHAT IS INFORMATION SECURITY?


Information security is the application of measures to ensure the safety and privacy of data by managing its storage and distribution. Information security has both technical and social implications. The first simply deals with the 'how' and 'how much' question of applying secure measures at a reasonable cost. The second grapples with issues of individual freedom, public concerns, legal standards and how the need for privacy intersects them. This discussion covers a range of options open to business managers, system planners and programmers that will contribute to your ultimate security strategy. The eventual choice rests with the system designer and issuer.

D.B. Science College Gondia

12

Smart card based Door Access System with LCD

1.8.3. The Elements of Data Security


In implementing a security system, all data networks deal with the following main elements:

Hardware, including servers, redundant mass storage devices, communication channels and lines, hardware tokens (smart cards) and remotely located devices (e.g., thin clients or Internet appliances) serving as interfaces between users and computers

Software, including operating systems, database management systems, communication and security application programs

Data, including databases containing customer - related information. Personnel, to act as originators and/or users of the data; professional personnel, clerical staff, administrative personnel, and computer staf.

1.8.4. The Mechanisms of Data Security


Working with the above elements, an effective data security system works with the following key mechanisms to answer,

Has My Data Arrived Intact? (Data Integrity) This mechanism ensures that data was not lost or corrupted when it was sent to you

Is The Data Correct And Does It Come From The Right Person? (Authentication) This proves user or system identities

Can I Confirm Receipt Of The Data And Sender Identity Back To The Sender? (Non-Repudiation)

Can I Keep This Data Private? (Confidentiality) - Ensures only senders and receivers access the data. This is typically done by employing one or more encryption techniques to secure your data

Can I Safely Share This Data If I Choose? (Authorization and Delegation) You can set and manage access privileges for additional users and groups

Can I Verify That The System Is Working? (Auditing and Logging) Provides a constant monitor and troubleshooting of security system function

Can I Actively Manage The System? (Management) Allows administration of your security system

D.B. Science College Gondia

13

Smart card based Door Access System with LCD

2. IMPLEMENTATION
2.1. INTRODUCTION
The smart card is one of the latest additions to the world of information technology. Similar in size to today plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different application. As soon as access-control device, smart cards make personal an business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart card provide portability, security and convenience. We use a system that is called smart card connectivity which has the following features. Analysis, computation, decising making is easier & faster. Space constraint sensitive to environmental condition computer literates are required to operate. We have developed a system, which can used for remote sites or area. The EEPROM (memory) on the smart car d I s there for security. The EEPROM enforces access to the data on the card. If the host computer read and wrote the smart card random access memory(RAM), it would be no different than a diskette. Smart card may have up to 512 kilobytes of EEPROM. The smart card uses a serial interface and receive s its power from external sources liked a card reader. The processor user a limited instruction set for application such as cryptography. Smart card can be used with a smart card reader attachment to a personal computer to authentic a user. Web browsers also can use smart card improved security of

technology to supplement Secure Sockets Layer(SSL) for Internaltransaction.

D.B. Science College Gondia

14

Smart card based Door Access System with LCD

2.2. BLOCK DIAGRAM


This is smart card system for Bank, ATM , Bank lockers, School, College and home security application. Its using micro controller and smart card (Memory Card). LCD Interfaces for Display user ID.

Figure-Block diagram of smart card based door access system with LCD

D.B. Science College Gondia

15

Smart card based Door Access System with LCD

2.3. CIRCUIT EXPLANATION

Figure- Circuit diagram of smart card based door access system with LCD

D.B. Science College Gondia

16

Smart card based Door Access System with LCD

2.3.1. SMART CARD

Figure-block diagram of smart card

The general block diagram of the system consist of the card which provided a predefined code(STORED IN THE EEPROM OF the card IC) every card has some unique code stored in its EEPROM with ROMs also known as firmware, is an

integrated circuit programmed with specific data when it is manufactured. Working and EPROMs can be wastful business. Even though they are

inexpensive per chip, the cost can add up over time. Erastable programmable read only memory addresses this issue. EPROM chips can be rewritten many times. Erasing an EPROM requires a special tool that ultraviolet light. EPROMs are configured using emits a certain frequency of an EPROM programmer that

provides voltage at specified levels depending on the type of EPROM used .In the smart card we used two wire serial EEPROM AT24C04 is used in the circuit to stoare the user coad as the memory ensure reading of the latest saved setting bya the micro controller . this 12c bus compatible 2048-bit EPROM is organized as 256*8 bits. It can retain data for more than ten year. Using just two lines (SCL and SDA) of the memory, the microcontroller can read the dada

D.B. Science College Gondia

17

Smart card based Door Access System with LCD

2.3.2. MICROCONTEROLLER INTERFACING

PIC16F72 is an 8-bit CMOS microcontroller . its internal circuitry reducing the need for external component , thus reducing the cost and power consumption and inhancing the reliability .PIC16F72 is an 8-bit,low-cast,high

performance flash micto controller. its keys feature are 4K words of flash program memory, 192 bytes of data RAM, eleven interrupts, three i/o ports,8-bit ADC and only 35 powerful single-cycle instruction(each 14bit wide). The pic 16f72 micro controller is a 28 pin IC with three input/output ports; port A(RAO through RA5), port B(RBO through RB7) and port C(RCO through RC7). All 22 bi-directional I/O pins are used for smart card (serial EEPROM), LED Interface, Buzzer and realy interfacing. Port RC4 is pulled up via 4K7 resistor and used as enter key and mode selection( read and write). The user code is store in the smart card (serial EPROM (AT 24C04) memory. The memoollry can be read by the micro controller, which activates an output when the correct access code has been read in the smart card, All Read Data send to the PC serial port via RS232 interferece. A buzzer has been added to provide input feedback; the number of beep indicates weather the input has been entered correctly or not.

D.B. Science College Gondia

18

Smart card based Door Access System with LCD

2.3.3. SMART CARD INTERFACE

Pins RC3 and RC2 of the microcontroller are used as serial data (SDA) and serial clock (SCL) lines for the I2C bus for communicating with the smart card (EEPROM _AT24C04).These two lines are connected to pull-up resistors, which are required for 12C bus devices. AT 24C04 is an i2C bus compatible 4k bit EEPROM organized as 256x8-bit that can retain data for more than the years. Various user codes can be stored in it. Using SCL and SDA lines, the microcontroller can read

and write data for all the parameters. For more details on 12c bus and memory interface, please refer to the AT24c04 datasheet.

Figure-smart card interfacing with microcontroller

D.B. Science College Gondia

19

Smart card based Door Access System with LCD

2.3.4. LCD INTERFACE

The dot matrix liquid crystal display controller and driver LSI displays alphanumeric character and symbols. it can be configured to drive a dotmatrix liquid crystal display under the control of a 4 or 8-bit microprocessor. since all the functions such as display RAM, character generator, liquid crystal driver, required for driving a dot-matrix liquid crystal display are internally provided on one chip, a minimal system can be interfaced with this controller/driver. A single HD44780U can display up to two 8-character lines(16*2). A 16*2 lines LCD module to display user information. Micro controller send the data signals through pin 11 through 18(RC0-RC3)and control signal through 4,6 and 7 of the micro controller. Pin no 3 of the LCD is used to control the contrast by using present PR1.

Figure-LCD interface

D.B. Science College Gondia

20

Smart card based Door Access System with LCD

2.3.5. BUSSER
A busser connected to port RB1 of the micro controller through a driver tranistor. The buzzer required 12 volts at a current of the around 50ma, which can not provide by the micro controller. So the driver transistor is added. The buzzer is used to audible indication for valid user and error situation and Alarm mode. As soon as pin of the micro o controller goes high, the buzzer operatesres.

Figure- buzzer

D.B. Science College Gondia

21

Smart card based Door Access System with LCD

2.3.6. RELAY INTERFACE


A Single pole dabble throw (SPDT) relay is connected to port RB0 of the micro controller through a driver transistor. The relay requires 12 volt s at a current of around 100ma, which can not provided by the micro controller. So the driver transistor is added. The relay is used to operate the external solenoid forming part of a locking devices or for operating any other electrical device. Normally the relay remains off. As soon as pin of the micro controller goes high, the re lay operates. When the relay operates and releases. Diode D2 is the standard diode on a mechanical relay to prevent back EMF for damaging Q3 when the relay release. LED L1 indicates relay on .

Figure-Relay interfacing

D.B. Science College Gondia

22

Smart card based Door Access System with LCD

2.3.7. POWER SUPPLY

Two supply voltages are required for the circuit. A DC or AC 12v main adaptor is connected to bridge rectifier (D1,D2,D3,D4) vai CN1 connector. U3 and U4 are supplied with regulated 5v from a 7805 (u2) fixed voltage regulator. The unregulated voltage of approximately 12v is required for realy and buzzer driving circuit.

2.3.8. WRITE USER CODE


Press enter button and power on the circuit, if system goes in program mode buzzer give you single beep. Enter the smart card in socket. Select user code using SW_UP and SW_DWN (SW2 And SW3).

Note- 101 to 108 is valid user code, remaining all other invalid user code.

D.B. Science College Gondia

23

Smart card based Door Access System with LCD

2.4 PCB DESIGM

Figure- Smart card based door access system with LCD

D.B. Science College Gondia

24

Smart card based Door Access System with LCD

4. CONCLUSION
This project has successfully presented a functional, low cost and low complexity microcontroller based door access control system. The proposed security door system adopted a valid smart card to authenticate and/or deny entry to a room or building. A real-life equivalent of the prototype can be developed with minimal development costs and with relatively low operational costs for environment where high degrees of security are required like banks, military research areas, and big private investment companies.

D.B. Science College Gondia

25

Smart card based Door Access System with LCD

REFERENCES
[1] www.national.com [lm7805/at24c04] [2] www.microchip.com [pic16f72] [3] http://www.smartcardalliance.org [4] http://www.opensecurityexchange.com. [5] http://www.datasheetarchiv.com.

D.B. Science College Gondia

26

S-ar putea să vă placă și