final presentation
TRANSCRIPT
Access Control & Security Access Control & Security SystemSystem
Department of Electrical & Computer Engineering
University Of Connecticut
Advisors: Dr. Rajeev Bansal & Dr. John Chandy
Project EngineersProject Engineers Syed A. Ali (EE)Syed A. Ali (EE)
- Project Management- Project Management- Design Circuitry & Connectivity- Design Circuitry & Connectivity- Alternate Software Development - Alternate Software Development
Chuong Nguyen (CMPE)Chuong Nguyen (CMPE)- Microcontroller Programming- Microcontroller Programming- Alternate Software Development - Alternate Software Development - Card Reader & Wireless Support - Card Reader & Wireless Support
Jonathan Vanase (CMPE)Jonathan Vanase (CMPE)- Chief Software Development- Chief Software Development- RFID Support- RFID Support- Project Progress Reports - Project Progress Reports
George Kutsaftis (CMPE)George Kutsaftis (CMPE)- Front-End Demonstration Display- Front-End Demonstration Display- RF Device Antenna - RF Device Antenna
Zachary J. Maura (EE)Zachary J. Maura (EE)- Front-End Demonstration Display- Front-End Demonstration Display- Product Ordering- Product Ordering
Team work made this project a success
OutlineOutline OverviewOverview Statement of NeedStatement of Need Design GoalsDesign Goals Competitive SolutionsCompetitive Solutions System StructureSystem Structure Design ComponentsDesign Components Control Software Control Software System FunctionalitySystem Functionality Future Modifications Future Modifications BudgetBudget TimelineTimeline
OverviewOverview
Restrict unauthorized access to Design labs.Restrict unauthorized access to Design labs. Keep track of who enters these labs.Keep track of who enters these labs. Protect valuable equipment in labs. Protect valuable equipment in labs. Restrict unauthorized equipment movement. Restrict unauthorized equipment movement. Keeping a live database of equipment inventory.Keeping a live database of equipment inventory. Centralized system control that is easy to Centralized system control that is easy to
maintain.maintain.
Our system will not let this happen
Design GoalsDesign Goals
Design a card swipe type access control system.Design a card swipe type access control system. Use Husky One Card for access.Use Husky One Card for access. Wireless interface between the components in the Wireless interface between the components in the
labs and the centralized authentication system.labs and the centralized authentication system. Live Inventory control database integrated with Live Inventory control database integrated with
RFID based equipment security system.RFID based equipment security system. User friendly surveillance and maintenance User friendly surveillance and maintenance
software control based on Windows PC.software control based on Windows PC.
Competitive SolutionsCompetitive Solutions
VingCards SystemsVingCards Systems - Popular Access Control System used by major - Popular Access Control System used by major
hotel chains.hotel chains.- All in one system, very easy to use and install.- All in one system, very easy to use and install.
DrawbacksDrawbacks - Does not use the “Husky one-card” system. - Does not use the “Husky one-card” system. - The system is very costly. Approximate cost of - The system is very costly. Approximate cost of
$10,000 + Maintenance Fees$10,000 + Maintenance Fees
Competitive Analysis, Cont.Competitive Analysis, Cont.
EAS Surveillance SystemEAS Surveillance System- Commonly used by major retail stores.- Commonly used by major retail stores.- A Small magnetic strip is hidden on product, - A Small magnetic strip is hidden on product,
which is read by the towers and producing an which is read by the towers and producing an alarm when passed through.alarm when passed through.
DrawbacksDrawbacks - The strips are cheap and the system is very - The strips are cheap and the system is very
easy to use however the towers themselves easy to use however the towers themselves cost over $4000 cost over $4000
System StructureSystem Structure
Card Reader Reads Student ID cards.
MicrocontrollerReceives commands from the control system and actives the alarm and the Door strike respectively
Wireless Units (1)Client Sends Data to Server
Electric LockDoor Strike
Wireless Units (3)Server receives data from clients
Control System(PC – Windows)
RF Tag Detection Detects the Flow of Equipment. If a Tagged Equipment leaves the room it informs the Control System
AlarmActivated if an unregulated flow of Equipment is made.
Control CircuitryRelay Based circuitry
Wired
Wireless
SplitterWireless Units (2)Client Sends Data to Server
Design ComponentsDesign Components
MicrocontrollerMicrocontrollerWireless UnitsWireless UnitsPower RegulationPower RegulationControl SystemControl SystemCard ReaderCard ReaderRFID SystemRFID SystemDoor Lock & AlarmDoor Lock & AlarmDemonstration DisplayDemonstration Display
Design Components, Cont.Design Components, Cont.
MicrocontrollerMicrocontroller• Receives corresponding commands Receives corresponding commands
from control unit to control the from control unit to control the unlocking of the door and signal unlocking of the door and signal alarm.alarm.
PIC16F87X w/ Qikstart BoardPIC16F87X w/ Qikstart Board• Contains RS232 chip for Contains RS232 chip for
communicationcommunication• Prior knowledge of operationPrior knowledge of operation• High current output (350mA)High current output (350mA)
Design Components, ContDesign Components, Cont
Wireless ConnexLinkWireless ConnexLink- 900MHz Transceiver - 900MHz Transceiver
- Provides reliable communication at - Provides reliable communication at
up to 115.2 Kbps even in RF- up to 115.2 Kbps even in RF-
hostile environmentshostile environments
- Serial RS232 interface - Serial RS232 interface
- Up to 1500 feet operating range - Up to 1500 feet operating range
Design Components, ContDesign Components, Cont
Driving CircuitryDriving Circuitry
- - Controls the Controls the
triggering of to triggering of to
the alarm and the alarm and
the door strikethe door strike
- Receives input from - Receives input from
Microcontroller Microcontroller
CO
MAB
NC
NO
U2
Relay
CO
MAB
NC
NO
U1
Relay
Q1 Q2R 1
4.7k
R 2
4.7K
R 3
47kR 4
47K
1 2D 3
1 N 4 5 0 0
1 2D 4
1 N 4 5 0 0
From PIC kit / PortD1
From PIC kit / PortD4
ALARMDOOR LOCK
5V
12V (unregulated)
Design Components, ContDesign Components, Cont
Power Power ManagementManagement
- - InputInput: 12VDC : 12VDC
unregulatedunregulated
-- Output Output: 9V, 7.5V : 9V, 7.5V
& 5V regulated& 5V regulated
I N1
O U T2
COM
3
U 17805
I N1
O U T2
COM
3
U 27809
I N1
O U T2
COM
3
U 3 7809
1 2D 1
1N4007
1 2D 2
1N4007
9V
5V
7.5V
GND
12V unregulated
C 1
.01C 2
.01C 3
.01
Design Components, Cont.Design Components, Cont.
Card ReaderCard Reader• Read Husky One Card.Read Husky One Card.• Rugged, Reliable, Compact & Rugged, Reliable, Compact &
PresentablePresentable
MSR200-33RMSR200-33R• Decoded Magnetic Stripe ReaderDecoded Magnetic Stripe Reader• Provides LED & Buzzer Feedback Provides LED & Buzzer Feedback • RS-232 Port InterfaceRS-232 Port Interface
Design Components, ContDesign Components, Cont
RFID Detection SystemRFID Detection System- - Signal alarm when devices Signal alarm when devices
leave the room and keep a logleave the room and keep a log- Track which items are in the Track which items are in the
room to keep a live database room to keep a live database of inventoryof inventory
TI RFID S4100 SeriesTI RFID S4100 Series- 1 Meter read range1 Meter read range- Variety of TagsVariety of Tags- RS-232 InterfaceRS-232 Interface
Design Components, ContDesign Components, Cont
Door Lock and StrikeDoor Lock and Strike- Unlocks the door when it - Unlocks the door when it
receives a 12V signal.receives a 12V signal.
- The interior is always - The interior is always
unlocked vice versaunlocked vice versa
- In case of power outages the - In case of power outages the
door can still be unlocked door can still be unlocked
using a key using a key
Design Components, ContDesign Components, Cont
Demonstration DisplayDemonstration Display
- This display has - This display has
been scaled down for been scaled down for
mobility purposes.mobility purposes.
- Wood construction- Wood construction
due to the customization due to the customization
options inherent.options inherent.
- The main visible parts - The main visible parts
have been labeled in the have been labeled in the
drawing to the right.drawing to the right.
Control SoftwareControl Software
Interface allows management of personnel Interface allows management of personnel and equipment accessand equipment access
Software continuously polls the RFID Software continuously polls the RFID detection field for devicesdetection field for devices
Interprets incoming signal as personnel or Interprets incoming signal as personnel or equipment and takes appropriate actionequipment and takes appropriate action
Actions include unlocking the door, Actions include unlocking the door, triggering an alarm and logging the eventtriggering an alarm and logging the event
Control Software Screen ShotControl Software Screen Shot
Control Software
Control SoftwareControl SoftwareHigh Level Flow ChartHigh Level Flow Chart
User Input
Database
Wireless Transceiver
DoorSystem
Control Software
Control SoftwareControl SoftwareInternal Flow ChartInternal Flow Chart
GUI Display User Input
RFid Polling
Poll
Wait for Responce
Card Swipe
Receive Info
Release lock or not Trigger Buzzer
Database In
Database Out
Current System Functionality Current System Functionality User swipes his card and is granted access if he or she User swipes his card and is granted access if he or she
is in the database.is in the database.- The Java program with database is connected via - The Java program with database is connected via wireless connection.wireless connection.
The RFID system keeps track of equipment leaving the The RFID system keeps track of equipment leaving the room.room.
The Java program allows the administrator to add or The Java program allows the administrator to add or remove persons and equipment as necessary.remove persons and equipment as necessary.- - If equipment is allowed to leave the room then no alarm willIf equipment is allowed to leave the room then no alarm will
sound.sound.- Alarm sounds and a log is then taken if the equipment is not- Alarm sounds and a log is then taken if the equipment is not
authorized to leave the room.authorized to leave the room.
Possible Future Modifications Possible Future Modifications Antenna for RFID that matches the impedance Antenna for RFID that matches the impedance
of the system to improve RFID reading range.of the system to improve RFID reading range. Cameras can be added to improve surveillance Cameras can be added to improve surveillance
of the room.of the room. The Wireless signal could be encrypted to The Wireless signal could be encrypted to
improve security of incoming and out going improve security of incoming and out going signals.signals.
Special RFID override tags could be given to Special RFID override tags could be given to administrators to remove items not permitted by administrators to remove items not permitted by others.others.
Live inventory control can be added.Live inventory control can be added.
Budget
HardwareHardware
Card ReaderCard Reader $ 160$ 160
PIC KitPIC Kit $ 175$ 175
Wireless UnitsWireless Units $ 250$ 250
Door LockDoor Lock $ 100$ 100
Door Lock – Electrical InterfaceDoor Lock – Electrical Interface $ 50$ 50
RF Surveillance Kit from TIRF Surveillance Kit from TI $ 650 $ 650
Product Display InterfaceProduct Display InterfaceConnectorsConnectors
$ 50$ 50$ 25$ 25
TotalTotal $ 1460 $ 1460
TimelineTimeline
Virtual TourVirtual Tour