Sie sind auf Seite 1von 20

RFID Based Door Access System

RFID Based Door Access System


Students name:

RFID Based Door Access System

INDEX

Sr No

Topics Name

INTRODUCTION

BLOCK DIAGRAM

CIRCUIT DIAGRAM

COMPONENT LIST

WORKING

FLOW CHART

ADVANTAGES

APPLICATIONS

LAYOUT

10

BIBLOGRAPHY

RFID Based Door Access System

INTRODUCTION OF PROJECT

INTRODUCTION OF PROJECT:
In todays world security systems are gaining more importance because of their number of
advantages. They are very accurate, reliable and error free systems. They provide futures like

RFID Based Door Access System

programmable control, access verification and authentification. Hence these systems can easily modified
as per the need of user
In our project we have tried to build a RFID based Door Security System which will allow us
to provide access to the registered users and restricting the unregistered users from entering the house.
For achieving the goal we have used RFID Tags and RFID receiver which will together form a access
verification and authentification system hence allowing the access to registered users who have
registered Tag with him. To make the system simpler. We have used LCD in order to display the user ID
In this way our system will help to secure the access and hence providing the complete
security solution for door access system

RFID Based Door Access System

BLOCK DIAGRAM & DESCRIPTION

PIC 16F72 Microcontroller


Special Microcontroller Features:
Precision Internal Oscillator:
- Factory calibrated to 1%

RFID Based Door Access System

- Software selectable frequency range of


8 MHz to 32 kHz
- Software tunable
- Two-Speed Start-up mode
- Crystal fail detect for critical applications
- Clock mode switching during operation for
power savings
Power-saving Sleep mode
Wide operating voltage range (2.0V-5.5V)
Industrial and Extended temperature range
Power-on Reset (POR)
Power-up Timer (PWRT) and Oscillator Start-up
Timer (OST)
Brown-out Reset (BOR) with software control
option
Enhanced Low-Current Watchdog Timer (WDT)
with on-chip oscillator (software selectable
nominal 268 seconds with full prescaler) with
software enable
Multiplexed Master Clear with pull-up/input pin
- Flash/Data EEPROM retention: > 40 years
High-Performance RISC CPU:
Only 35 instructions to learn:
- All single-cycle instructions except branches
Operating speed:
- DC 20 MHz oscillator/clock input
- DC 200 ns instruction cycle
Program Memory Read (PMR) capability
Interrupt capability
Peripheral Features:
Liquid Crystal Display module:

RFID Based Door Access System

- Up to 60 pixel drive capability on 28-pin


devices
- Up to 96 pixel drive capability on 40-pin
devices
- Four commons
Up to 35 I/O pins and 1 input-only pin:
- High-current source/sink for direct LED drive
- Interrupt-on-pin change
- Individually programmable weak pull-ups
In-Circuit Serial Programming (ICSP) via two
I/O PORTS
This device includes four 8-bit port registers along with their corresponding TRIS registers and one four
bitport:
PORTA and TRISA
PORTB and TRISB
PORTC and TRISC
PORTD and TRISD
PORTE and TRISE
PORTA, PORTB, PORTC and RE3/MCLR/VPP are implemented on all devices. PORTD and RE<2:0>
are implemented only on the PIC16F914 and PIC16F917.
PORTA and TRISA Registers
PORTA is a 8-bit wide, bidirectional port. The corresponding data direction register is TRISA
(Register 3-2). Setting a TRISA bit (= 1) will make the corresponding PORTA pin an input (i.e., put the
corresponding output driver in a High-impedance mode).Clearing a TRISA bit (= 0) will make the
corresponding PORTA pin an output (i.e., put the contents of the output latch on the selected pin).
Example 3-1 shows how to initialize PORTA.

GENERAL PURPOSE REGISTER

RFID Based Door Access System

FILE
The register file is organized as 256 x 8 in thePIC16F913/914 and 352 x 8 in the PIC16F916/917.Each
register is accessed either directly or indirectly through the File Select Register (FSR)
SPECIAL FUNCTION REGISTERS
The Special Function Registers are registers used byte CPU and peripheral functions for controlling the
desired operation of the device These registers are static RAM. The special registers can be classified
into two sets: core and peripheral. The Special Function Registers
associated with the core are described in this section. Those related to the operation of the peripheral
features are described in the section of that peripheral feature.
Option Register
The Option register is a readable and writable register, which contains various control bits to configure:
TMR0/WDT prescaler
External RB0/INT interrupt
TMR0
Weak pull-ups on PORTB
INTCON Register
The INTCON register is a readable and writable register, which contains the various enable and flag
bits for TMR0 register overflow, PORTB change and external RB0/INT/SEG0 pin interrupts.

RFID System
Purpose of Radio frequency Identification and Detection system is to facilitate data
transmission through the portable device known as tag that is read with the help of RFID reader; and
process it as per the needs of an application. Information transmitted with the help of tag offers location
or identification along with other specifics of product tagged purchase date, color, and price. Typical
FID tag includes microchip with radio antenna, mounted on substrate.

RFID Based Door Access System

The RFID tags are configured to respond and receive signals from an RFID transceiver. This allows
tags to be read from a distance, unlike other forms of authentication technology. The RFID system has
gained wide acceptance in businesses, and is gradually replacing the barcode system.
How RFID Works
Basic RFID consists of an antenna, transceiver and transponder.
Antenna emits the radio signals to activate tag and to read as well as write information to it. Reader
emits the radio waves, ranging from one to 100 inches, on the basis of used radio frequency and power
output. While passing through electronic magnetic zone, RFID tag detects activation signals of readers.
Powered by its internal battery or by the reader signals, the tag sends radio waves back to the reader.
Reader receives these waves and identifies the frequency to generate a unique ID. Reader then decodes
data encoded in integrated circuit of tags and transmits it to the computers for use.
Types of RFID
Active and passive RFID are different technologies but are usually evaluated together. Even though
both of them use the radio frequency for communication between tag and reader, means of providing
power to tags is different. Active RFID makes use of battery within tag for providing continuous power
to tag and radio frequency power circuitry. Passive RFID on the other hand, relies on energy of radio
frequency transferred from reader to tag for powering it.
Passive RFID needs strong signals from reader but signal strength bounced from tag is at low levels.
Active RFID receives low level signals by tag but it can create higher level signals to readers. This type
of RFID is constantly powered, whether in or out of the readers field. Active tags consist of external
sensors for checking humidity, temperature, motion as well as other condi
RFID frequencies
Just like you can tune a radio in various frequencies for listening to different channels, RFID readers and
tags need to be tuned in to a same frequency for communication. RFID system uses various frequencies
but most common and popularly used frequency is low, high and ultra high frequency. Low frequency is
around 125 KHz, high is around 13.56 MHz and ultra high varies between 860-960 MHz. Some
applications also make use of microwave frequency of 2.45 GHz. It is imperative to choose right
frequency for an application as radio waves work different at various frequencies.
RFID Applications
The role of RFID is not just confined to Aircraft identification anymore; it is also lending a hand in
various commercial uses. Asset tracking is one of the most popular uses of RFID. Companies are using
RFID tags on the products that might get stolen or misplaced. Almost each type of Radio frequency
Identification and Detection system can be used for the purpose of asset management.
Manufacturing plants have also been using RFID from a long time now. These systems are used for
tracking parts and working in process for reduction of defects, managing production of various versions

RFID Based Door Access System

and increasing output. The technology has also been useful in the closed looped supply chains for years.
More and more companies are turning to this technology for tracking shipments among the supply chain
allies. Not just manufacturers but retailers also are using this RFID technology for proper placement of
their products and improvements in the supply chain.
RFID also plays an important role in the access and security control. The newly introduced 13.56 MHz
RFID systems provide long range readings to the users. The best part is that RFID is convenient to
handle and requires low maintenance at the same time.
Current Scenario and future
Present trends point towards the fast growth of RFID in the next decade. With around 600 million RFID
tags sold in the year 2005 alone, value of market including systems, services and hardware is likely to
grow by factor of 10 between years 2006 -2016. It is expected that total number of RFID tags delivered
in the year 2016 will be around 450 times as compared to the ones delivered in the year 2006.
Commercial applications using Radio Frequency Identification and Detection like logistics, transport,
supply chain supervision, processing, manufacturing, medicine, access control are also likely to grow by
leaps and bounds. But this smart technology will influence consumer sectors and government too.
Barcodes and RFID will coexist for years to come, although the latter is expected to replace the former
in many sectors.

RFID Based Door Access System

Circuit Diagram & Description

Working of project:
In this system each user will have its own unique RFID Tag. This tag is a preprogrammed devise which
contain a unique code assigned to it. So each user will have its own unique registration ID for himself

RFID Based Door Access System

Thus when the user, will come the door. It will bring his tag near the system. The RFID Receiver will
detect the tag and extract the information from it. The output of receiver is connected to the PIC
Controller. Hence when the registered user will come near the system the receiver will get a valid data
and this valid ID is then pass to the controller which will interns do the cross verification by comparing
the ID with its data base
If the user is valid, then controller will Display the user ID on LCD Display connected to the system
also will open the door motor. In this way the registered user will gate the door

Liquid Crystal Display


LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of
applications. A 16x2 LCD display is very basic module and is very commonly used in various devices
and circuits. These modules are preferred over seven segments and other multi segment LEDs. The
reasons being: LCDs are economical; easily programmable; have no limitation of displaying special &

RFID Based Door Access System

even custom

characters (unlike

in

seven

segments), animations and

so

on.

A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this LCD each
character is displayed in 5x7 pixel matrix. This LCD has two registers, namely, Command and Data.
The command register stores the command instructions given to the LCD. A command is an instruction
given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position,
controlling display etc. The data register stores the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD.
Pin Diagram:

Pin Description:
Pin No
1
2
3

Function
Ground (0V)
Supply voltage; 5V (4.7V 5.3V)
Contrast adjustment; through a variable resistor

Name
Ground
Vcc
VEE

RFID Based Door Access System

Selects command register when low; and data register when high

Register Select

5
6
7
8
9
10
11
12
13
14
15
16

Low to write to the register; High to read from the register


Sends data to data pins when a high to low pulse is given

Read/write
Enable
DB0
DB1
DB2
DB3
DB4
DB5
DB6
DB7
Led+
Led-

8-bit data pins

Backlight VCC (5V)


Backlight Ground (0V)

RELAYS:
Relays are used throughout the automobile. Relays which come in assorted sizes, ratings, and
applications, are used as remote control switches. A typical vehicle can have 20 relays or more.

RELAY ENERGIZED (ON)


Current flowing through the control circuit coil (pins 1 and 3) creates a small magnetic field which
causes the switch to close, pins 2 and 4. The switch, which is part of the load circuit, is used to control
an electrical circuit that may connect to it. Current now flows through pins 2 and 4 shown in RED, when
the relay is energized.

RFID Based Door Access System

PCB Design Basics:


PCB Design Layout
In the PCB design of electronics circuit, it is important that one plan and has a checklist of the do's and
don'ts before proceeding to do the printed circuit board layout. The understanding of the circuit is
critical to the design, for example one needs to understand the maximum current and voltage that are
carried by each conductor in order to determine the track width of the conductor and the type of PCB
that will be used.
The voltage difference between each track will determine the clearance between each conductor. If the
clearance is not enough, chances are that the electrical potential between each track will cause spark
over and short circuit the PCB. This will cause functional failure to the product and the safety of the
users that are using the product will be compromised. It is therefore critical for one to understand some
of these basics requirements before one proceed to design the PCB.
Conductor Thickness and Width
The PCB conductor thickness and width will determine the current carrying capacity of the track. The
IPC standard for the conductor thickness and width of the common 1 oz/square-feet PCB is as shown
below. However, it is always advisable to use a bigger value due to the tolerance and variation of the
PCB processes. If higher current carrying capacity is required, a 2 oz/square-feet or 3 oz/square-feet
type of PCB is preferred. Many electronics hobbyist prefer to solder a thick cooper conductor on the
PCB track to increase the current carrying capacity of the track.

RFID Based Door Access System

LAYERS OF PCB:
*.BOT - bottom copper
*.SMB - Solder mask bottom
*.SST - Silk screen top
*.ASY - Assembly top, contains the board outline
*.DS - drill sizes
Tracks Restricted Area Tracks should not be located on the areas that can cause them to be peeled off
easily. One of the restricted areas is holes on the PCB which are used to mount screws or PCB spacers.
These holes are usually used to secure the PCB to a casing or to secure it in a fixed place.
The edges of the PCB should not have any tracks as these areas are usually used to transport the PCB
from one process to another process by using a conveyor belt. These edges are places where the
possibility of scratches and cracking of the PCB happens. The recommended areas that should not have
any track is as shown in the diagram below assuming a hole diameter of 4 mm which is used to mount a
PCB spacer.

RFID Based Door Access System

FLOW CHARTS

RFID Based Door Access System

BILL OF MATERIAL:
Description
PIC16F72
Transformer 18 V, 0.5A
LM7805
Diode 1N4007
Capacitor 1000 f
Disc Capacitor
IC Base 40 Pin
Relimate Base
Relimate Connector
Pull Up Resistance 10 K
PCB
Reset Switch
12 V Relay
230 v relay
Resistance
RFID Module
transistor Bc 547
transistor Bc 557

Quantity

Heat Sink
LCD

Price
1
1
1
4
1
10
1
10
10
4
1
3
2
1
20
2
5
5

200
120
8
8
7
5
18
40
88
8
700
3
20
35
10
1400
18
18

150
TOTAL AMOUNT
2860

Advantages
1. Highly reliable as each user will have its unique ID

RFID Based Door Access System

2. Modification can be made very easily by just increasing the unique User IDs
3. Low cost, highly accurate, easy to implement
4. Entire system can be made battery operated, hence avoiding losses of power failure

Applications
1. Office access system
2. Restricted access area like R&D Department, Power supply department
3. VIP conference halls
4. Cash Department security access in Banks

Bibliography:
REFERENCE BOOKS:-

RFID Based Door Access System

PIC Controller Programming


Programming and Customizing the PIC Microcontroller
WEB-SITES:www.datasheetarchieve.com
www.microchip.com
www.alldatasheet.com

Das könnte Ihnen auch gefallen