final presentation

31
Access Control & Access Control & Security System Security System Department of Electrical & Computer Engineering University Of Connecticut Advisors: Dr. Rajeev Bansal & Dr. John Chandy

Upload: petersam67

Post on 29-May-2015

452 views

Category:

Business


0 download

TRANSCRIPT

Page 1: Final Presentation

Access Control & Security Access Control & Security SystemSystem

Department of Electrical & Computer Engineering

University Of Connecticut

Advisors: Dr. Rajeev Bansal & Dr. John Chandy

Page 2: Final Presentation

Project EngineersProject Engineers Syed A. Ali (EE)Syed A. Ali (EE)

- Project Management- Project Management- Design Circuitry & Connectivity- Design Circuitry & Connectivity- Alternate Software Development - Alternate Software Development

Chuong Nguyen (CMPE)Chuong Nguyen (CMPE)- Microcontroller Programming- Microcontroller Programming- Alternate Software Development - Alternate Software Development - Card Reader & Wireless Support - Card Reader & Wireless Support

Jonathan Vanase (CMPE)Jonathan Vanase (CMPE)- Chief Software Development- Chief Software Development- RFID Support- RFID Support- Project Progress Reports - Project Progress Reports

George Kutsaftis (CMPE)George Kutsaftis (CMPE)- Front-End Demonstration Display- Front-End Demonstration Display- RF Device Antenna - RF Device Antenna

Zachary J. Maura (EE)Zachary J. Maura (EE)- Front-End Demonstration Display- Front-End Demonstration Display- Product Ordering- Product Ordering

Page 3: Final Presentation

Team work made this project a success

Page 4: Final Presentation

OutlineOutline OverviewOverview Statement of NeedStatement of Need Design GoalsDesign Goals Competitive SolutionsCompetitive Solutions System StructureSystem Structure Design ComponentsDesign Components Control Software Control Software System FunctionalitySystem Functionality Future Modifications Future Modifications BudgetBudget TimelineTimeline

Page 5: Final Presentation

OverviewOverview

Restrict unauthorized access to Design labs.Restrict unauthorized access to Design labs. Keep track of who enters these labs.Keep track of who enters these labs. Protect valuable equipment in labs. Protect valuable equipment in labs. Restrict unauthorized equipment movement. Restrict unauthorized equipment movement. Keeping a live database of equipment inventory.Keeping a live database of equipment inventory. Centralized system control that is easy to Centralized system control that is easy to

maintain.maintain.

Page 6: Final Presentation

Our system will not let this happen

Page 7: Final Presentation

Design GoalsDesign Goals

Design a card swipe type access control system.Design a card swipe type access control system. Use Husky One Card for access.Use Husky One Card for access. Wireless interface between the components in the Wireless interface between the components in the

labs and the centralized authentication system.labs and the centralized authentication system. Live Inventory control database integrated with Live Inventory control database integrated with

RFID based equipment security system.RFID based equipment security system. User friendly surveillance and maintenance User friendly surveillance and maintenance

software control based on Windows PC.software control based on Windows PC.

Page 8: Final Presentation

Competitive SolutionsCompetitive Solutions

VingCards SystemsVingCards Systems - Popular Access Control System used by major - Popular Access Control System used by major

hotel chains.hotel chains.- All in one system, very easy to use and install.- All in one system, very easy to use and install.

DrawbacksDrawbacks - Does not use the “Husky one-card” system. - Does not use the “Husky one-card” system. - The system is very costly. Approximate cost of - The system is very costly. Approximate cost of

$10,000 + Maintenance Fees$10,000 + Maintenance Fees

Page 9: Final Presentation

Competitive Analysis, Cont.Competitive Analysis, Cont.

EAS Surveillance SystemEAS Surveillance System- Commonly used by major retail stores.- Commonly used by major retail stores.- A Small magnetic strip is hidden on product, - A Small magnetic strip is hidden on product,

which is read by the towers and producing an which is read by the towers and producing an alarm when passed through.alarm when passed through.

DrawbacksDrawbacks - The strips are cheap and the system is very - The strips are cheap and the system is very

easy to use however the towers themselves easy to use however the towers themselves cost over $4000 cost over $4000

Page 10: Final Presentation

System StructureSystem Structure

Card Reader Reads Student ID cards.

MicrocontrollerReceives commands from the control system and actives the alarm and the Door strike respectively

Wireless Units (1)Client Sends Data to Server

Electric LockDoor Strike

Wireless Units (3)Server receives data from clients

Control System(PC – Windows)

RF Tag Detection Detects the Flow of Equipment. If a Tagged Equipment leaves the room it informs the Control System

AlarmActivated if an unregulated flow of Equipment is made.

Control CircuitryRelay Based circuitry

Wired

Wireless

SplitterWireless Units (2)Client Sends Data to Server

Page 11: Final Presentation

Design ComponentsDesign Components

MicrocontrollerMicrocontrollerWireless UnitsWireless UnitsPower RegulationPower RegulationControl SystemControl SystemCard ReaderCard ReaderRFID SystemRFID SystemDoor Lock & AlarmDoor Lock & AlarmDemonstration DisplayDemonstration Display

Page 12: Final Presentation

Design Components, Cont.Design Components, Cont.

MicrocontrollerMicrocontroller• Receives corresponding commands Receives corresponding commands

from control unit to control the from control unit to control the unlocking of the door and signal unlocking of the door and signal alarm.alarm.

PIC16F87X w/ Qikstart BoardPIC16F87X w/ Qikstart Board• Contains RS232 chip for Contains RS232 chip for

communicationcommunication• Prior knowledge of operationPrior knowledge of operation• High current output (350mA)High current output (350mA)

Page 13: Final Presentation

Design Components, ContDesign Components, Cont

Wireless ConnexLinkWireless ConnexLink- 900MHz Transceiver - 900MHz Transceiver

- Provides reliable communication at - Provides reliable communication at

up to 115.2 Kbps even in RF- up to 115.2 Kbps even in RF-

hostile environmentshostile environments

- Serial RS232 interface - Serial RS232 interface

- Up to 1500 feet operating range - Up to 1500 feet operating range

Page 14: Final Presentation

Design Components, ContDesign Components, Cont

Driving CircuitryDriving Circuitry

- - Controls the Controls the

triggering of to triggering of to

the alarm and the alarm and

the door strikethe door strike

- Receives input from - Receives input from

Microcontroller Microcontroller

CO

MAB

NC

NO

U2

Relay

CO

MAB

NC

NO

U1

Relay

Q1 Q2R 1

4.7k

R 2

4.7K

R 3

47kR 4

47K

1 2D 3

1 N 4 5 0 0

1 2D 4

1 N 4 5 0 0

From PIC kit / PortD1

From PIC kit / PortD4

ALARMDOOR LOCK

5V

12V (unregulated)

Page 15: Final Presentation

Design Components, ContDesign Components, Cont

Power Power ManagementManagement

- - InputInput: 12VDC : 12VDC

unregulatedunregulated

-- Output Output: 9V, 7.5V : 9V, 7.5V

& 5V regulated& 5V regulated

I N1

O U T2

COM

3

U 17805

I N1

O U T2

COM

3

U 27809

I N1

O U T2

COM

3

U 3 7809

1 2D 1

1N4007

1 2D 2

1N4007

9V

5V

7.5V

GND

12V unregulated

C 1

.01C 2

.01C 3

.01

Page 16: Final Presentation

Design Components, Cont.Design Components, Cont.

Card ReaderCard Reader• Read Husky One Card.Read Husky One Card.• Rugged, Reliable, Compact & Rugged, Reliable, Compact &

PresentablePresentable

MSR200-33RMSR200-33R• Decoded Magnetic Stripe ReaderDecoded Magnetic Stripe Reader• Provides LED & Buzzer Feedback Provides LED & Buzzer Feedback • RS-232 Port InterfaceRS-232 Port Interface

Page 17: Final Presentation

Design Components, ContDesign Components, Cont

RFID Detection SystemRFID Detection System- - Signal alarm when devices Signal alarm when devices

leave the room and keep a logleave the room and keep a log- Track which items are in the Track which items are in the

room to keep a live database room to keep a live database of inventoryof inventory

TI RFID S4100 SeriesTI RFID S4100 Series- 1 Meter read range1 Meter read range- Variety of TagsVariety of Tags- RS-232 InterfaceRS-232 Interface

Page 18: Final Presentation

Design Components, ContDesign Components, Cont

Door Lock and StrikeDoor Lock and Strike- Unlocks the door when it - Unlocks the door when it

receives a 12V signal.receives a 12V signal.

- The interior is always - The interior is always

unlocked vice versaunlocked vice versa

- In case of power outages the - In case of power outages the

door can still be unlocked door can still be unlocked

using a key using a key

Page 19: Final Presentation

Design Components, ContDesign Components, Cont

Demonstration DisplayDemonstration Display

- This display has - This display has

been scaled down for been scaled down for

mobility purposes.mobility purposes.

- Wood construction- Wood construction

due to the customization due to the customization

options inherent.options inherent.

- The main visible parts - The main visible parts

have been labeled in the have been labeled in the

drawing to the right.drawing to the right.

Page 20: Final Presentation
Page 21: Final Presentation

Control SoftwareControl Software

Interface allows management of personnel Interface allows management of personnel and equipment accessand equipment access

Software continuously polls the RFID Software continuously polls the RFID detection field for devicesdetection field for devices

Interprets incoming signal as personnel or Interprets incoming signal as personnel or equipment and takes appropriate actionequipment and takes appropriate action

Actions include unlocking the door, Actions include unlocking the door, triggering an alarm and logging the eventtriggering an alarm and logging the event

Page 22: Final Presentation

Control Software Screen ShotControl Software Screen Shot

Page 23: Final Presentation

Control Software

Control SoftwareControl SoftwareHigh Level Flow ChartHigh Level Flow Chart

User Input

Database

Wireless Transceiver

DoorSystem

Page 24: Final Presentation

Control Software

Control SoftwareControl SoftwareInternal Flow ChartInternal Flow Chart

GUI Display User Input

RFid Polling

Poll

Wait for Responce

Card Swipe

Receive Info

Release lock or not Trigger Buzzer

Database In

Database Out

Page 25: Final Presentation
Page 26: Final Presentation

Current System Functionality Current System Functionality User swipes his card and is granted access if he or she User swipes his card and is granted access if he or she

is in the database.is in the database.- The Java program with database is connected via - The Java program with database is connected via wireless connection.wireless connection.

The RFID system keeps track of equipment leaving the The RFID system keeps track of equipment leaving the room.room.

The Java program allows the administrator to add or The Java program allows the administrator to add or remove persons and equipment as necessary.remove persons and equipment as necessary.- - If equipment is allowed to leave the room then no alarm willIf equipment is allowed to leave the room then no alarm will

sound.sound.- Alarm sounds and a log is then taken if the equipment is not- Alarm sounds and a log is then taken if the equipment is not

authorized to leave the room.authorized to leave the room.

Page 27: Final Presentation

Possible Future Modifications Possible Future Modifications Antenna for RFID that matches the impedance Antenna for RFID that matches the impedance

of the system to improve RFID reading range.of the system to improve RFID reading range. Cameras can be added to improve surveillance Cameras can be added to improve surveillance

of the room.of the room. The Wireless signal could be encrypted to The Wireless signal could be encrypted to

improve security of incoming and out going improve security of incoming and out going signals.signals.

Special RFID override tags could be given to Special RFID override tags could be given to administrators to remove items not permitted by administrators to remove items not permitted by others.others.

Live inventory control can be added.Live inventory control can be added.

Page 28: Final Presentation

Budget

HardwareHardware

Card ReaderCard Reader $ 160$ 160

PIC KitPIC Kit $ 175$ 175

Wireless UnitsWireless Units $ 250$ 250

Door LockDoor Lock $ 100$ 100

Door Lock – Electrical InterfaceDoor Lock – Electrical Interface $ 50$ 50

RF Surveillance Kit from TIRF Surveillance Kit from TI $ 650 $ 650

Product Display InterfaceProduct Display InterfaceConnectorsConnectors

$ 50$ 50$ 25$ 25

TotalTotal $ 1460 $ 1460

Page 29: Final Presentation

TimelineTimeline

Page 30: Final Presentation

Virtual TourVirtual Tour

Page 31: Final Presentation