Documente Academic
Documente Profesional
Documente Cultură
1. INTRODUCTION
It is a system which can be used where accessing of door or any other electrical device, can be open using a smart card on inserting the card users data is being by the micro controller which will process the data the card is an EPROM IC where we can store the data in that there where quick updating, quick record database generator for the person using for and where few organization cant work efficiency like post, telegraph, telephone. Manual handling required for telephone. The smart card is one of the latest additions to the world of information technology. Similar in size to today plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different application. As soon as access-control device, smart cards make personal an business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart card provide portability, security and convenience. We use a system that is called smart card connectivity which has the following features. Analysis, computation, decising making is easier & faster. Space constraint sensitive to environmental condition computer literates are required to operate. We have developed a system, which can used for remote sites or area. The EEPROM (memory) on the smart car d I s there for security. The EEPROM enforces access to the data on the card. If the host computer read and wrote the smart card random access memory(RAM), it would be no different than a diskette. Smart card may have up to 512 kilobytes of EEPROM. The smart card uses a serial interface and receive s its power from external sources liked a card reader. The processor user a limited instruction set for application such as cryptography. Smart card can be used with a smart card reader attachment to a personal computer to authentic a user. Web browsers also can use smart card improved security of
A smart card resembles a credit card in size and shape, but inside it is completely different. First of all, it has an inside a normal credit card is a simple piece of plastic. The inside of a smart card usually contains an embedded microprocessor. The microprocessor is under a gold contact pad on one side of the card. Think of the microprocessor as replacing the usual magnetic stripe on a credit card or debit card. Smart cards are much more popular in Europe than in the United States. In Europe, the health insurance and banking industries use smart cards extensively. Every German citizen has a smart card for health insurance. Even though smart cards have been around in their modern form for at least a decade, they are just starting to take off in the United States. Magnetic stripe technology remains in wide use in the United States. However, the data on the stripe can easily be read, written, deleted or changed with off-the-shelf equipment. Therefore, the stripe is really not the best place to store sensitive information. To protect the consumer, businesses in the U.S. have invested in extensive online mainframe-based computer networks for verification and processing. In Europe, such an infrastructure did not develop intelligence. The microprocessor on the smart card is there for security. The host computer and card reader actually "talk" to the microprocessor. The microprocessor enforces access to the data on the card. If the host computer read and wrote the smart card's random access memory (RAM), it would be no different than a diskette.
D.B. Science College Gondia 2
Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart card uses a serial interface and receives its power from external sources like a card reader. The processor uses a limited instruction set for applications such as cryptography.
The most common smart card applications are: Credit cards Electronic cash Computer security systems Wireless communication Loyalty systems (like frequent flyer points) Banking Satellite TV Government identification Smart cards can be used with a smart-card reader attachment to a personal computer to authenticate a user. Web browsers also can use smart card technology to supplement Secure Sockets Layer (SSL) for improved security of Internet transactions. Visa's Smart Card FAQ shows how online purchases work using a smart card and a PC equipped with a smart-card reader. Smart-card readers can also be found in mobile phones and vending machines.
Increased levels of processing power, flexibility and memory will add cost. Single function cards are usually the most cost-effective solution. Choose the right type of smart card for your application by determining your required level of security and evaluating cost versus functionality in relation to the cost of the other hardware elements found in a typical workflow. All of these variables should be weighted against the expected lifecycle of the card. On average the cards typically comprise only 10 to 15 percent of the total system cost with the infrastructure, issuance, software, readers, training and advertising making up the other 85 percent. The following chart demonstrates some general rules of thumb:
1.6.1. APPLICATIONS
First introduced in Europe nearly three decades ago, smart cards debuted as a stored value tool for payphones to reduce theft. As smart cards and other chip-based cards advanced, people found new ways to use them, including charge cards for credit purchases and for record keeping in place of paper. In the U.S., consumers have been using chip cards for everything from visiting libraries to buying groceries to attending movies, firmly integrating them into our everyday lives. Several U.S. states have chip card programs in progress for government applications ranging from the Department of Motor Vehicles to Electronic Benefit Transfers (ebts). Many industries have implemented the power of smart cards in their products, such as the GSM digital cellular phones as well as TVsatellite decoders.
Readers and terminals operate with smart cards to obtain card information and perform a transaction. Generally, a reader interfaces with a PC for the majority of its processing requirements. A terminal is a self-contained processing device. Both readers and terminals read and write to smart cards.
1.8.1. Readers
This type of reader requires a physical connection to the cards, made by inserting the card into the reader. This is the most common reader type for applications such as ID and Stored Value. The card-to-reader communications is often ISO 7816 T=0 only. This communication has the advantage of direct coupling to the reader and is considered more secure. The other advantage is speed. The typical PTS Protocol Type Selection (ISO7816-3) negotiated speed can be up to 115 kilo baud. This interface enables larger data transport without the overhead of anti-collision and wireless breakdown issues that are a result from the card moving in and out of the reader antenna range.
10
11
Type of data
Drug Formula Accounting, Regulatory Personnel Files Employee ID
Security concern
Basis of business income. Competitor spying Required by law Employee privacy
Type of access
Highly selective list of executives Relevant executives and departments Relevant executives and departments
Non-employee access. Relevant executives and Inaccurate payroll, benefits departments assignment Individuals per function and clearance such as Access authorization customers, visitors, or vendors Outside emergency All employees response
12
Hardware, including servers, redundant mass storage devices, communication channels and lines, hardware tokens (smart cards) and remotely located devices (e.g., thin clients or Internet appliances) serving as interfaces between users and computers
Software, including operating systems, database management systems, communication and security application programs
Data, including databases containing customer - related information. Personnel, to act as originators and/or users of the data; professional personnel, clerical staff, administrative personnel, and computer staf.
Has My Data Arrived Intact? (Data Integrity) This mechanism ensures that data was not lost or corrupted when it was sent to you
Is The Data Correct And Does It Come From The Right Person? (Authentication) This proves user or system identities
Can I Confirm Receipt Of The Data And Sender Identity Back To The Sender? (Non-Repudiation)
Can I Keep This Data Private? (Confidentiality) - Ensures only senders and receivers access the data. This is typically done by employing one or more encryption techniques to secure your data
Can I Safely Share This Data If I Choose? (Authorization and Delegation) You can set and manage access privileges for additional users and groups
Can I Verify That The System Is Working? (Auditing and Logging) Provides a constant monitor and troubleshooting of security system function
Can I Actively Manage The System? (Management) Allows administration of your security system
13
2. IMPLEMENTATION
2.1. INTRODUCTION
The smart card is one of the latest additions to the world of information technology. Similar in size to today plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different application. As soon as access-control device, smart cards make personal an business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart card provide portability, security and convenience. We use a system that is called smart card connectivity which has the following features. Analysis, computation, decising making is easier & faster. Space constraint sensitive to environmental condition computer literates are required to operate. We have developed a system, which can used for remote sites or area. The EEPROM (memory) on the smart car d I s there for security. The EEPROM enforces access to the data on the card. If the host computer read and wrote the smart card random access memory(RAM), it would be no different than a diskette. Smart card may have up to 512 kilobytes of EEPROM. The smart card uses a serial interface and receive s its power from external sources liked a card reader. The processor user a limited instruction set for application such as cryptography. Smart card can be used with a smart card reader attachment to a personal computer to authentic a user. Web browsers also can use smart card improved security of
14
Figure-Block diagram of smart card based door access system with LCD
15
Figure- Circuit diagram of smart card based door access system with LCD
16
The general block diagram of the system consist of the card which provided a predefined code(STORED IN THE EEPROM OF the card IC) every card has some unique code stored in its EEPROM with ROMs also known as firmware, is an
integrated circuit programmed with specific data when it is manufactured. Working and EPROMs can be wastful business. Even though they are
inexpensive per chip, the cost can add up over time. Erastable programmable read only memory addresses this issue. EPROM chips can be rewritten many times. Erasing an EPROM requires a special tool that ultraviolet light. EPROMs are configured using emits a certain frequency of an EPROM programmer that
provides voltage at specified levels depending on the type of EPROM used .In the smart card we used two wire serial EEPROM AT24C04 is used in the circuit to stoare the user coad as the memory ensure reading of the latest saved setting bya the micro controller . this 12c bus compatible 2048-bit EPROM is organized as 256*8 bits. It can retain data for more than ten year. Using just two lines (SCL and SDA) of the memory, the microcontroller can read the dada
17
PIC16F72 is an 8-bit CMOS microcontroller . its internal circuitry reducing the need for external component , thus reducing the cost and power consumption and inhancing the reliability .PIC16F72 is an 8-bit,low-cast,high
performance flash micto controller. its keys feature are 4K words of flash program memory, 192 bytes of data RAM, eleven interrupts, three i/o ports,8-bit ADC and only 35 powerful single-cycle instruction(each 14bit wide). The pic 16f72 micro controller is a 28 pin IC with three input/output ports; port A(RAO through RA5), port B(RBO through RB7) and port C(RCO through RC7). All 22 bi-directional I/O pins are used for smart card (serial EEPROM), LED Interface, Buzzer and realy interfacing. Port RC4 is pulled up via 4K7 resistor and used as enter key and mode selection( read and write). The user code is store in the smart card (serial EPROM (AT 24C04) memory. The memoollry can be read by the micro controller, which activates an output when the correct access code has been read in the smart card, All Read Data send to the PC serial port via RS232 interferece. A buzzer has been added to provide input feedback; the number of beep indicates weather the input has been entered correctly or not.
18
Pins RC3 and RC2 of the microcontroller are used as serial data (SDA) and serial clock (SCL) lines for the I2C bus for communicating with the smart card (EEPROM _AT24C04).These two lines are connected to pull-up resistors, which are required for 12C bus devices. AT 24C04 is an i2C bus compatible 4k bit EEPROM organized as 256x8-bit that can retain data for more than the years. Various user codes can be stored in it. Using SCL and SDA lines, the microcontroller can read
and write data for all the parameters. For more details on 12c bus and memory interface, please refer to the AT24c04 datasheet.
19
The dot matrix liquid crystal display controller and driver LSI displays alphanumeric character and symbols. it can be configured to drive a dotmatrix liquid crystal display under the control of a 4 or 8-bit microprocessor. since all the functions such as display RAM, character generator, liquid crystal driver, required for driving a dot-matrix liquid crystal display are internally provided on one chip, a minimal system can be interfaced with this controller/driver. A single HD44780U can display up to two 8-character lines(16*2). A 16*2 lines LCD module to display user information. Micro controller send the data signals through pin 11 through 18(RC0-RC3)and control signal through 4,6 and 7 of the micro controller. Pin no 3 of the LCD is used to control the contrast by using present PR1.
Figure-LCD interface
20
2.3.5. BUSSER
A busser connected to port RB1 of the micro controller through a driver tranistor. The buzzer required 12 volts at a current of the around 50ma, which can not provide by the micro controller. So the driver transistor is added. The buzzer is used to audible indication for valid user and error situation and Alarm mode. As soon as pin of the micro o controller goes high, the buzzer operatesres.
Figure- buzzer
21
Figure-Relay interfacing
22
Two supply voltages are required for the circuit. A DC or AC 12v main adaptor is connected to bridge rectifier (D1,D2,D3,D4) vai CN1 connector. U3 and U4 are supplied with regulated 5v from a 7805 (u2) fixed voltage regulator. The unregulated voltage of approximately 12v is required for realy and buzzer driving circuit.
Note- 101 to 108 is valid user code, remaining all other invalid user code.
23
24
4. CONCLUSION
This project has successfully presented a functional, low cost and low complexity microcontroller based door access control system. The proposed security door system adopted a valid smart card to authenticate and/or deny entry to a room or building. A real-life equivalent of the prototype can be developed with minimal development costs and with relatively low operational costs for environment where high degrees of security are required like banks, military research areas, and big private investment companies.
25
REFERENCES
[1] www.national.com [lm7805/at24c04] [2] www.microchip.com [pic16f72] [3] http://www.smartcardalliance.org [4] http://www.opensecurityexchange.com. [5] http://www.datasheetarchiv.com.
26