rfid based access control and proximity security system
TRANSCRIPT
![Page 1: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/1.jpg)
![Page 2: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/2.jpg)
RFID BASED ACCESS CONTROL AND PROXIMITY SECURITY SYSTEM
![Page 3: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/3.jpg)
PROJECT PRESENTERS
Group Members:
Faiz Ur Rehman Toor (BEE-FA11-099)
Hafiz Abdul Hannan (BEE-FA11-058)
Muhammad Hammad Malik (BEE-FA11-055)
Supervisor:
Engineer Muhammad Ishfaq
Co-Supervisor:
Engineer Qamar Raza
![Page 4: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/4.jpg)
CONTENTS
Abstract
Introduction
Objectives
Applications
Working Principal
Block Diagram
Components
Equipment's
Overview About RF
Gantt Chart
![Page 5: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/5.jpg)
ABSTRACT
The present system is designed for the growingneeds of security in the educational institutes andother organizations threatened off and on by thecriminal organization.
In the background of terrorist attack on educationaland other governments or non governmentorganizations, we sought to evolve such a securitysystem as could ensure not only fool proof securityat educational institutes and many otherorganizations of Pakistan but also easier to apply.
![Page 6: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/6.jpg)
INTRODUCTION
Our system uses the radio frequency as a procedureto track the activity of the people entering orleaving the institutions. It ensures maximal checkon the movement of the suspected. It is a relativelya new technology which is flawless as it is notreplicable.
Each vehicle or person, in entry, would be given aRF tag to record information during the time thevehicle remains in the territory of the institution.The system comprising a computer and RFIDreader-writer and tags, would maintain all data anddetect all unauthorized entries by giving signalthrough buzzer.
![Page 7: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/7.jpg)
OBJECTIVES
The objective of this project is to develop a RFID baseaccess control and proximity security system that is ableto:
1. Enhance security to limited access to restricted areasin the university/organization.
2. Allow access only to authorized people, employees toenter the premises of the department.
3. Uniquely identify the authorized student/employeedata and store students/employee ID and name.
![Page 8: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/8.jpg)
APPLICATION
1. The same system could also be used for studentand employee attendance on the campus.Instead of the student/employee identity card,each student/employee would be issued asimilar RFID tag which would be automaticallydetected by the RFID reader and it wouldsubsequently save the administration as wellas faculty of maintaining and keeping therecord.
2. Vehicle identification when ever passing fromany toll plaza.
![Page 9: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/9.jpg)
WORKING PRINCIPAL
![Page 10: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/10.jpg)
WORKING(TAG)
Gen 2 RFID tags are comprised of an antenna and a chip (moreaccurately called an integrated circuit, or IC). The ICs for Gen 2tags contain four types of memory:
Reserved memory(32bit).
EPC memory(96bit).
TID memory(unique ID).
User memory(4K or 8K bytes).
![Page 11: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/11.jpg)
BLOCK DIAGRAM
![Page 12: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/12.jpg)
COMPONENTS
Hardware
1. A Reader.
2. Passive RFID Tag.
3. Host Computer.
Software
1. C Programming Language.
Or C++
![Page 13: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/13.jpg)
EQUIPMENT
Reader
1. Transmitter.
2. Receiver.
3. Microprocessor.
4. Memory.
5. Controller.
6. Communication Interface.
7. Power.
Passive RFID Tag
1. Microchip.
2. Antenna.
Host Computer
1. Software.
![Page 14: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/14.jpg)
RFID RANGES
We Works on Active Radio Frequency.
![Page 15: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/15.jpg)
WE HAVE DECIDED TO WORK ON FOLLOWING SCHEDULE.
Gantt Chart
![Page 16: RFID Based Access Control And Proximity Security System](https://reader034.vdocument.in/reader034/viewer/2022042817/55a6c3af1a28ab9a428b464c/html5/thumbnails/16.jpg)