Post on 30-Jan-2016
description
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 1
INTELLIGENT
UNLOCKING
SYSTEM
The project is about unlocking an office door using the facial recognition system with
owner’s authentication. This system will be helpful in a building which is used by multiple
sources. For example, a lab which is to be accessed by many research students use either
multiple keys or a biometric access to the registered users. Giving away multiple keys might be
misused and the biometric access requires the registration and the updating is not easy. Through
this system, user can allow access to any person either once or for every time the person comes.
It makes updating the database simpler and the one-time access for a person to enter.
OUR TEAM (Group 1)
CE11B032 - Chaitra Lakshmi Mallela
CE11B022 - Anusha GVV
CE11B030 - K Sravan Kumar Reddy
CE11B036 - Kavya Marupudi
CE11B094 - Palash Somani
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 2
Table of Contents:
S.No. Content Page Number
1 Conceptual Design 3
2 Components & Softwares 4
3 Specifications of components 4
4 Softwares 8
5 Proposed System 11
6 Benefits 15
7 Issues 16
8 Bill of Quantities 16
9 References 17
10 Contributions 17
11 Brochures 18
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 3
Conceptual Design
When the bell is pressed or the RFID tag is read, the camera gets switched on.
Images are sent to the facial recognition software.
If match is found, the door is opened. Else, the image is sent to the virtual sensor in the
Global Sensor Network.
This sends the image to the mobile phone of the client.
Then the response of the client is taken using an application which is again connected to the
virtual sensor.
Depending on the response, the door is opened or an alert system gives a voice message
that access is denied.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 4
Components
Hardware:
Push Button
RFID Reader module
Wireless IP Camera
Computer
Smart Phone
Door Lock system
o Mechanical Lock
o Communication Hub
o Access Control
Software:
Global Sensor network
Mobile application
Specifications of Components
Push button:
50 mA 12V DC rating
Through hole mounting design
Single or dual LED options
Momentary actuation
RFID reader module:
Support external antenna
Maximum effective distance up to
50mm
Less than 100ms decoding time
UART TTL interface
Support EM4100 compatible read only
or read/write tags
Built-in external bi-color LED and buzzer
driver
Frequency: 125 KHz
Baud Rate - 9600 (TTL Electricity Level RS232 format)
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 5
Power Supply: DC 5V
Current: <50 Ma
Operating Range: >50 mm
Working Temperature: -100C to 700C
Wireless IP camera
Sensor: CMOS 1/4 inch
Network Interface: 802.11b/g/n
Network Protocol: TCP/IP, DHCP, SMTP, TP, DDNS, UPNP
White Balance: Auto
Working Temperature: 0 - 50 C
Power Source: Power Adapter (100V-240V)
Power Consumption 3W
Viewing Distance: 80 - 100 meters
Resolution - 320 x 240, 640 x 480
Mode - 50 Hz/60Hz, Outdoor
Lock parts and Specifications:
SNo Component Qty
1 Cylinder 1
2 Control Unit 1
3 Cover 1
4 Spacer (thick) 1
5 Spacer(thin) 1
6 Mounting plate 1
7 Locking unit 1
8 Locking nut tool 1
9 Mounting
screws
1
10 Allen wrench 1
11 Battery 1
12 Cover screw 1
13 Set screw 1
14 Thumbturn 1
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 6
Mounting hardware:
S.No Component Qty
1 Screw caps 2
2 2-56 x 1 1/4” screw 2
3 6-32 x 1 ¼” screw 2
4 2-56 x 1 3/8” screw 2
Wireless Frequency: 2.4 GHz, IEEE 802.15.4, using AES 128bit encryption
Hub Power Requirement: 8-24VDC, 250mA
Lock Battery Type: CR2, providing 30,000 Cycles
Operating Temperature: -10C to 50C
FCC Part 15, Class B Compliant
Credentials Supported: 13.56MHz iCLASS credentials are supported
Communication Hub
Communication Hub is the link between locks and the existing access control system. Up to 8 locks
can be paired to one Hub and has a standard RS485 connection, making it compatible with most
systems on the market today. It communicates directly with enabled locks via an encrypted 2.4GHz
wireless link, and is designed to be positioned above the door within approximately 5 -25m of the
lock.
Key Features
Connect up to 8 devices on a single hub
RS485 interface
Encrypted radio communication
Integrated antenna
LED status for visual indication
Applications
Internal doors only
Expand existing access control systems
New access control installations
Doors that can't be hard wired
Technical Information:
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 7
Power: 8-24Vdc
Power consumption: 250 mA - Minimum 80mA at 12VDC
Radio standard: IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)
Encryption: AES 128 Bit
Range between Locks and Hubs - 15 - 25 m depending on building environments
Operating temperature: 5°C to 35°C
Humidity: < 95% non condensation
IP-degree: IP 20
Access Control System:
Access control system is an integrated solution that consists of hardware and software designed to
control entry into selected areas and manage movement of people/vehicles within. The system is
designed to increase security by defining access permissions based on area and time for each user
and maintaining a log of all events.
Components of an access control system:
- Electric locks
- Controllers: receive settings from software and control the electromechanical hardware of
the system.
- Contactless readers: use the image from the camera to read the relative position, size and
shape of the user's eyes, nose, cheekbones and jaw features to ensure accuracy of the
identification
Technical requirements
1. Systems using Ethernet converters, adapters, or terminal servers that enable
network connectivity for legacy controllers by tunneling RS-485 serial data over
Ethernet shall not be acceptable.
2. Single-door controller and IP-reader/Camera shall have at least 32Mb SDRAM
operating memory and 8 MB Flash memory for database and events. Two-door
controller shall have an option for expanding Flash memory to 32MB.
3. All controllers and IP-readers/Camera shall use a 32Bit 100Mhz RISC processor (or
better) in order to enable fast execution of advanced functions.
4. Controllers and IP-readers shall be capable of supplying up to 600mA @ 12VDC to
peripheral devices: readers, electric locks, sirens, detectors, etc.
5. Controllers and IP-readers shall accept the standard 12VDC power input in case an
existing network infrastructure does not support PoE.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 8
Software
Global Sensor Network
Sensor data is captured using sensors built into the mobile phones. The open source sensor data
stream processing engine called “Global Sensor Network” (GSN) with android platform is used to
capture the data. A prototype application should be developed which can be installed on android
devices and an Android wrapper is used as a GSN middleware component.
Global Sensor Network makes the access to sensor networks and data simple, powerful and flexible
just as accessing web documents.
Simplicity: The sensor networks are defined in a declarative way using SQL as data manipulation
language.
Adaptability: Adding new types of sensor networks and dynamic reconfiguration of data sources has
to be supported without interfering with the ongoing system operation which can be achieved using
a container based implementation.
Scalability: The design of GSN is based on peer-to-peer architecture for distributed query processing
and discovery of sensor networks.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 9
GLOBAL SENSOR NETWORK MODEL
Single sensors or whole sensor networks are connected via wireless connections to an access point.
Ad-hoc routing protocols route data to selected sensors that communicate with an access point
which is connected to the Internet and can process and make available the data received from the
sensors. Applications wanting to use the sensor data need to first identify the access points, possibly
through multiple layers and then follow the specific access protocols defined.
GSN provides logical view on sensor networks based on the virtual sensor abstraction. They abstract
implementation details to access sensor
data and model sensor data as temporal
streams of relational data. They can also
represent derived views on sensor data
streams, resulting from post-processing
and combination of sensor data from
different sources. Applications can
discover sensor networks using the
registry and subsequently access sensor
networks by using standard data access
interface.
SYSTEM ARCHITECTURE AND IMPLEMENTATION:
Each GSN container hosts a number of virtual sensor definitions for the set of virtual sensors it is
responsible for.
Virtual Sensor : A virtual sensor corresponds either to a data stream received directly from sensors
or to a data stream derived from other virtual sensors. The specification of a virtual sensor provides
all necessary information required for deploying and using it including:
Metadata used for identification and discovery
Structure of data streams which the virtual sensor consumes and produces
A declarative SQL based specification of the data stream processing performed in a
virtual sensor.
Functional properties related to persistency, error handling, life cycle management and
physical deployment.
Virtual Sensor Manager (VSM) : It is responsible for providing access to the virtual sensors,
managing the delivery of sensor data, and providing the necessary administrative infrastructure. The
VSM has two main subcomponents: The life-cycle manager (LCM) provides and manages the
resources provided to a virtual sensor and manages the interactions with a virtual sensor (sensor
readings, etc.)
The input stream manager (ISM): It is responsible for handling sensor disconnections, missing
values, unexpected delays, etc., thus ensuring stream quality of service via the included stream
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 10
quality manager (SQM). The data from/to the VSM passes through the storage layer which is in
charge of providing and managing persistent storage for data streams.
Query processing: It is done by the query manager (QM) which includes the query processor being in
charge of SQL parsing, query planning, execution of queries. The query repository manages all
registered queries(subscriptions) and defines and maintains the set of currently active queries for
the query processor.
Notification Manager: The notification manager deals with the delivery of events and query results
to the registered clients. The notification manager has an extensible architecture which allows the
user to customize its functionality, for example, having results mailed or being notified via SMS.
Wrapper: In order to refer to data
streams produced by a virtual sensor we
use logical addressing. Each virtual sensor
can be equipped with a set of key value
pairs which can be registered and
discovered in GSN. To specify the
processing of the input streams we use
SQL queries which refer to the input
streams by the reserved keyword
WRAPPER. A wrapper connection request
is an object which contains a wrapper
name and its initialisation parameters as defined in the Virtual sensor. Whenever a WCR is
generated at the virtual sensor loader, it will be sent to the wrapper repository.
Few methods used in wrapper:
Initialise() – creates a socket and waits until the client mobile sends the metadata
packet.
createDataFieldCollection() – The information is passed into this method and stored.
Finalise() – End of wrapper’s life cycle. It closes all the connection established.
getOutputFormat() – returns a data field object that provides a description of the data
provided by the wrapper.
Run() – retrieves data from the mobile phone.
mapSensorData() – maps the newly received data to the GSN model structure.
After the data is sent to the GSN data model, querying, filtering and other functionalities provided by
GSN can be done.
Mobile Application
The Android SDK provides you the API libraries and developer tools necessary to build, test, and
debug apps for Android. The ADT Bundle should be downloaded for this purpose. It includes the
essential Android SDK components and a version of the Eclipse IDE with built-in ADT (Android
Developer Tools) to streamline your Android app development.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 11
User Interface:
Notification to user, when the image is received
Option to click yes/no to unlock the door or keep the door locked respectively
Behavior:
The input stream from the virtual sensor is directed to the mobile application and the app
should display the notification
The input given by the user should be sent back to the virtual sensor where the respective
queries are processed
Proposed System
Initializing the camera:
When the bell is pressed or RFID card is read, the camera is switched on and starts recording. When
it is activated once, the circuit will be closed til the images are sent to the computer.
Facial Recognition:
Below is the process of setting up a wireless network camera sensor to monitor a office building
Mounting the camera
Before the camera is configured, the position of it has to be fixed. The best position would
be to place at six feet above the ground, but since it disturbs the aesthetic sense, we should
place at the left top corner on the wall next to the door
The switch (used for bells) will be an input source of voltage signals to power the camera on.
Configuration
Connect the Camera to the computer, which acts as the router, by using Ethernet. This is
done by installing the software CD provided by the camera's company
Working:
When a person wants to enter the building, he is to press the bell which will initiate the camera.
Then the camera will take continuous pictures using the Eigen face generation system. Using this,
the unique identity with the relevant features, from facial images were extracted and sent to the
database through Ethernet. The method involved in extracting the data for identifying the facial
features is explained as below:
Eigen face generation
This camera uses Principle Component Analysis (PCA) which is a well known Eigen face based face
recognition algorithm. Here a set of Eigen faces, Eigen vectors and mean were extracted by
performing a mathematical process on a set of trained images depicting different human faces. Here
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 12
the training images are defined as a set of flattened vectors and these vectors are assembled
together into a single matrix. The extracted Eigen vectors of the matrix are stored in a database.
Eigen vectors are defined by the face spaces which are the training face images that are projected.
This results in the variation between the set of faces without emphasis on any one facial region like
the eyes or nose. The projected face space representation of each training image is also saved to a
database. To identify a face, the test image is projected to face space using the saved Eigen vectors.
The projected test image is then compared against each saved projected training image for
similarity. The identity of the person in the test image is assumed to be the same as the person
depicted in the most similar training image. Then the final recognized images are sent to the router.
Action taken from the Facial Recognition responses:
If the face is recognised, the door will open. The process of opening the door will be explained in the
later section.
If the face is not recognised, the image is sent to the virtual sensor in GSN. The process is explained
under working of GSN section.
Intelligent Wi-Fi Access Control Locking :
The reach of the access control system is extended using IEEE 802.11b/g WiFi infrastructure. This
system provides complete access control in locations where it would be difficult or cost-prohibitive
to install a wired lock. With no wires to run, installation time is significantly reduced . It can be
simply installed on the door and configured to communicate with the wireless network.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 13
The Locking system offers an easy retrofit solution for mechanical door hardware. Access control is
added to the door in the time it takes to switch out a cylinder. Local wireless communication
between the lock and a hub connects to the access control system, eliminating the inconvenience of
bringing wiring to the door. The lock communicates wirelessly to an Hub, which connects to the
access control system using RS-485 or Wiegand wiring. Industry standard Wiegand output offers
easy integration with many popular access control systems, while the RS-485 version offers the
flexibility and scalability to support up to eight locks per hub. We choose to use RS-485 as it can be
used for opening multiple doors and it would be convenient for scaling up the project in the future.
Choosing the hub location
It is recommended that the hub be mounted near the top of a wall, on the ceiling or above the
ceiling to reduce potential for interference. For a stable and
reliable radio link, it is recommended that the hub is located
within 45 feet of the lock. A maximum of two interior walls
between the hub and lock can be present.
Recommended locations:
Wall Mount
Ceiling Mount
Inside Ceiling Mount
Wall Mount, Adjacent Room
Mounting the hub
The adapter plate is used to mount the hub on a
single or double gang box.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 14
Wiring the hub:
Connects to the Access
Control system via Wiegand
wiring.
Requires 8-24VDC power
(250mA).
Includes three form C relays
that can be used to
transmit Lock jamb status,
low battery signal and a
tamper signal.
Connects to the mortise
lock wirelessly.
Then the hub connected to power and the access control system. With a known credential to
confirm, the lock will open as desired.
Authentication from the client
If the image is not recognized by the facial recognition software, the image is sent to the virtual
sensor in the GSN whose input stream comes from the web cam. The image is sent to the owner via
mail. Then the user can choose whether to open the door or not using the application installed in
the phone. The response of the application is sent to the virtual sensor via Android wrapper and the
corresponding query processing is done.
Acting to the responses of the owner:
If the command is yes, the command is sent to door unlocking system to open the door.
If the command is no, the voice alert system is activated
Code - Wireless camera to Virtual sensor
1<virtual-sensor name="FacialRec" priority="11"> 2 <class>gsn.vsensor.BridgeVirtualSensor</class> 3 <author>Dslotproj</author> 4 <email>”email”</email> 5 <description>Facial Recognition</description> 6 <life-cycle pool-size="10" /> 7 <output-specification rate="500" /> 8 <addressing> 9 <predicate key="geographical">BC143-N</predicate> 10 <predicate key="type">image</predicate> 11 </addressing> 12 <output-structure>
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 15
13 <field name="image" type=".jpeg" /> 14 </output-structure> 15 <storage history-size="1 hour " permanent-storage="true" /> 16 <input-streams> 17 <input-stream name="image" > 18 <stream-source alias="facreg" storage-size="1"> 19 <address wrapper="tinyos"> 20 <predicate key="host">lsirpc24.epfl.ch</predicate> 21 <predicate key="port">9001</predicate> 22 </address> 23 <query> 24 //Mail the image to the owner 26 </query> 27 </stream-source> 31 </input-stream> 32 </input-streams> 33 </virtual-sensor>
Code - Android wrapper
public class EmptyWrapper extends AbstractWrapper{
public boolean initialize(){
//Wait for client to send meta data packet
//Analyse the meta data packet and identify the enabled application on client side
//CreateDataFieldCollection (Response recorded in the application)
}
public void run(){
while(isActive()){
//Wait for the client to send the data
//mapSensorData(“data from app”, enabled sensors)
}
public DataField getOutputFormat(){…….}
public string getWrapperName(){…….}
public void finalise(){……}
}
Benefits:
Improvising the quality and energy efficiency of the environmental system while allowing
almost unlimited reconfiguration and customization in the future.
The door can be accessed from anywhere.
It provides real-time information about who is accessing the office.
We can also choose to receive notifications about all the activity around the door to our mobile phone. All activity is recorded and logged by the system, and it is available for review at any time.
One of the main advantages of automatic door unlock is the fact that you will not be required to carry a key all the time.
We can provide entry into the workplace to others at our discretion.
Local wireless communication eliminates the cost and inconvenience of wiring in and around the door. With no wires to run, installation time is significantly reduced.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 16
The images captured by the camera system are recorded and stored into a database. These
are helpful in maintaining records so that they can be easily retrieved later, when needed.
Reducing the amount of communication required to perform tasks by distributed or local pre
computations
Issues:
The system is highly dependent on the smart phone of the owner. It becomes difficult to
access the door if the phone is misplaced.
No alternative is provided if even one of the components malfunctions.
Camera system cannot monitor every area of your office at all times, hence may not be able
to detect everyone arriving at the door.
If several persons are standing at the door, the image sent to the system is analyzed and
even if one person’s image is authenticated, the system opens the door.
The initial costs incurred are high. The installation may also increase the initial expenditure.
Developing wrappers is a time consuming and tedious job. Therefore, research is conducted
to develop automatic wrappers.
Location privacy against a global eavesdropper:
While many protocols for sensor network security provide confidentiality for the
content of messages, contextual information usually remains exposed. The location privacy
issues can be formalized under a strong adversary model and communication overhead
needed for achieving a given level of privacy can be determined. Periodic collection and
source simulation can be used to prevent leakage of information. Periodic collection
provides a high level of location privacy, while source simulation provides trade-offs
between privacy, communication cost, and latency.
Bill Of Quantities:
S.No Component* Quantity Price(INR)
1 Bell Switch 1 150
2 RFID reader module 1 865
3 Wireless camera (D-Link DCS-932L) 1 4599
4 Communication hub 1
8500 5 Lock 1
6 Access control 1
*Cost of assembled components is mentioned above. The separate hardware components required
for each of the above mentioned components are listed in the Specifications.
CE6011 - Smart Buildings and Automation
INTELLIGENT UNLOCKING SYSTEM 17
References:
http://www.intelligentopenings.com/en/site
http://www.medeco.com/Other/Medeco
http://www.assaabloy.com.au/
http://gadgets.ndtv.com/mobile
http://www.hidglobal.com/product-display
http://www.alibaba.com/showroom
http://sweets.construction.com/
http://startrinity.com/VideoRecognition/Resources
http://arxiv.org/abs/1301.0157
Contributions:
We have divided the whole project equally and everyone contributed the same.
Hence we are giving equal weightage to everyone's work.
20% - CE11B032 - Chaitra Lakshmi Mallela
20% - CE11B022 - Anusha GVV
20% - CE11B030 - K Sravan Kumar Reddy
20% - CE11B036 - Kavya Marupudi
20% - CE11B094 - Palash Somani
AperioTM Technology
1
Aperio Technology (Version 1.2)
Contents
Introducing Aperio Technology 2
Aperio System Overview 3
Aperio System Components 4
Upgrading System Components 5
Simplified Management of Security 6
E100 Series Escutcheon 8
C100 Series Cylinder 10
K100 Cabinet Lock 12
1 to 8 Communication Hub 14
Software & USB Radio Dongle 15
2 aperiotechnology.com.au
Introducing Aperio™ Technology
Aperio is a new technology developed to complement new and existing electronic access control systems, providing end users with a simple, intelligent way to upgrade the controllability and security level of their premises.
The heart of Aperio is a short distance wireless communication protocol; designed to link an online electronic access control system with an Aperio enabled mechanical lock.
“Wireless Locking Evolution for Online Door Control”
Key BenefitsAffordable online door control of internal doors• Few components
• Very easy installation
• No changes to existing access control installation
Extends existing access control system• Connects over standard interface
• No separate management software – uses existing access control system management software
• No change of cards
Enhances security for internal doors• Eliminates key management issues
• Authorization changes in real time
• Encrypted communication
• Audit trails and time zones through existing system
3
Aperio Technology (Version 1.2)
The open architecture of Aperio provides a convenient way of connecting with most access control systems via a standard RS485 Interface. Cylinders or escutcheons communicate via an encrypted wireless link to a communication hub that is wired directly to the existing system.
Aperio System Overview
Communication Hub
Existing Electronic Access Control System Software
Aperio Lock
RS485
Wired access control door Aperio enabled door
Existing Electronic Access Control Panel
4 aperiotechnology.com.au
C100 Series CylinderDesigned to fit the standard Lockwood oval 570 series cylinder, the C100 provides a unique and cost effective migration to an on line electronic access control door.
Aperio System Components
Communication HubThe Communication Hub is the link between Aperio locks and the existing access control system. The Hub has a standard RS485 connection, making it compatible with most systems on the market today. Up to 8 Aperio locks can be connected to one Hub.
Programming ApplicationThe Aperio programming Application is the software tool used to set up and programme Aperio based products.
USB Radio Dongle The Radio Dongle is used in conjunction with the programming application. It communicates via an encrypted wireless link directly to the Hub and Aperio enabled lock.
E100 Series EscutcheonThe E100 series escutcheon is designed to fit Lockwood mechanical 3570 series mortice locks. In addition to card access the external side of the door provides for key override entry, whilst the inside lever is designed for emergency egress.
5
Aperio Technology (Version 1.2)
Upgrading Existing Systems
Expanding an electronic access control system with Aperio is more cost effective than alternative solutions because it is easy to install and does not require any wiring of the door.
Electronic cylinders and escutcheons have been designed to suit existing mechanical locks, so in many cases doors and locking systems do not need to be changed – only upgraded with Aperio enabled products.
Being compatible with most RFID technologies, there is no need to change user’s credentials – just use existing cards.
6 aperiotechnology.com.au
Simplified Management of Security
Installing Aperio provides a simple way to facilitate card-based access, while also fulfilling end-users needs for an easily operated system.
Aperio enabled products are managed with existing electronic access control systems and management software. This means that all decisions and updates are in real time. This offers a high level of security and control over audit trails, usage, and adding/deleting users.
Any number of doors can be wirelessly connected to the access control system through Aperio technology, providing a cost effective solution to upgrade internal mechanical doors to online access control.
Wired access control door
Aperio enabled door
8 aperiotechnology.com.au
Function• External lever is always locked.
To unlock badge card and activate lever. Door automatically re locks after set time. Can also be opened via Key override.
• Internal lever is set to escape – free egress at all times.
General DescriptionThe E100 series escutcheon is designed to fit Lockwood mechanical 3570 series mortice locks & provide a cost effective migration to an on line electronic access control door. In addition to card access the external side of the door provides for key override entry, whilst the inside lever is designed for emergency egress.
The external plate incorporates a sophisticated battery powered proximity reader that communicates wirelessly to a hub. The Hub is then wired directly to the access control system and enables standard on line access control functionality at significantly reduced costs to that of a hard wired door.
Key Features• Wireless on line access control
• Authorisation changes in real time
• Audit trails and time zones managed through existing system
• Compatible with Lockwood 3570 series mechanical mortice locks
• Additional Key Override
• Emergency egress
• Lock can store up to 10 override credentials/prox cards
• Store last 200 events and audit trails locally in the lock
• Battery powered – up to 40,000 operations
• LED status
• Battery low warning sent to EAC system
Applications• Internal doors only
• Retro fit mechanical mortice locks
• Expand existing access control installations
• New access control installations
• Doors that cant be hard wired
• Heritage listed buildings
E100 Series Escutcheon
9
Aperio Technology (Version 1.2)
E100 Series Escutcheon
E100 Technical Information
Battery type 1 x Lithium CR123A
Battery life time >40,000 cycles
Radio standard IEEE 802.15.4 (2.4GHz)
Encryption AES128 Bit
Wireless range 5-25m depending on location of Hub & environment
RFID technology** Mifare Classic / Desfire, Mifare Classic / PlusiCLASS and Prox 125 Khz
RFID Reading UID / sector / block
Card read range < 4cm
Operating temperature 0ºC – 60ºC
Humidity < 85% non condensating
IP-degree IP30
Approvals CE
Colour Brushed stainless steel
Override cylinder Lockwood Australian oval 570 series
Door Thickness 35-45mm & 46-55mm
Spindles 7.6mm
Backset 60mm
** Model dependant
Ordering Information
Part NumberProduct Description
E100 V2 35-45 Door Mifare Classic / Desfire E102MU1SS1
E100 V2 46-55 Door Mifare Classic / Desfire E102MU1SS2
E100 V2 35-45 Door iCLASS E102IU1SS1
E100 V2 46-55 Door iCLASS E102IU1SS2
Accessories
E100 Cover Plate – Pair E100-PL2SSS
Aperio Hub 1:8 RS485 Hub AH30-3-03572 Series Mortice Lock To Suit E100 Series 3572SCNOHD
Part NumberProduct Description
Spare Parts
Aperio Spindle Kit 35-45mm E-SP35/45
Aperio Spindle Kit 45-55mm E-SP45/55
Notes: • E100 cover plate is used only if required when retro fitting
existing door furniture.• Each cover plate is 1.2mm thick. A total of 2.4mm should be
added to door thickness if using these plates• To change the spindle; special tools may be required
Part NumberProduct Description
323
52
10 40
2022
194.7 155.541
ø22
77.5
13.7
312.
517
2
10 40
2022
194.7 155.541
ø22
77.5
13.7
312.
517
2E100 cover plate
10 aperiotechnology.com.au
Function• External – badge card in front of cylinder and
rotate knob to retract latch.
• Internal – lever on mortice lock is set to escape – free egress at all times.
General DescriptionDesigned to fit the standard Lockwood oval 570 series cylinder, the C100 provides a unique and cost effective migration to an online electronic access control door.
The external housing contains a sophisticated battery powered proximity reader that communicates wirelessly to a hub. The hub is then wired directly to the access control system and enables standard on line access control features at significantly reduced costs than that of a hard wired door.
Key Features• Wireless Online access control
• Authorisation changes in real time
• Audit trails and time zones managed through existing system
• Compatible with standard Lockwood 3570 series mortice locks
• Cylinder can store up to 10 override credentials/prox cards
• Stores last 200 events and audit trails locally in the cylinder
• LED status indication
• Battery powered 40,000 operations
• Battery low warning sent to EAC system
• Available in Stainless Steel Knob
Applications• Internal doors only
• Expand existing access control systems
• New access control installations
• Doors that cant be hard-wired
• Heritage listed buildings
C100 Series Cylinder
11
Aperio Technology (Version 1.2)
C100 Technical Information
Battery type 1 x Lithium CR2
Battery lifetime >40,000 cycles
Radio standard IEEE 802.15.4 (2.4GHz)
Encryption AES 128 Bit
Wireless range: Cylinder to Hub
5-25m depending on location of Hub & environment
RFID technology** Mifare Classic / Desfire, Mifare Classic / Plus iCLASS Prox 125 Khz
RFID reading UID / sector / block
Card reading range < 4cm
Operating temperature 0ºC - 60º
Humidity < 85% non condensation
IP-degree IP 30
Knob colour Black
Cylinder Colour Satin Chrome. Other finishes on application
Cylinder format Lockwood Australian oval 570 series
Door thickness Suits standard doors up to 50mm
Approvals CE
** Model dependant
36.4
44.7 36
31.6
9
17.9
Ordering Information
Aperio C100 Cylinder SC V2 iCLASS C102IASC
Aperio C100 Cylinder SC V2 iCLASS SS Knob C102IASCSS
Aperio C100 Cylinder SC V2 Mifare Classic / Desfire C102MASC
Aperio C100 Cylinder SC V2 Mifare C102MASCSS Classic /Desfire SS Knob
Part NumberProduct Description
C100 Series Cylinder
Accessories
Aperio Hub 1:8 RS485 Hub AH30-3-0Aperio Stainless Steel Hub only A-KN-SS-C100
Part NumberProduct Description
12 aperiotechnology.com.au
Add cabinet security without adding another credential
The K100 Cabinet Lock uses Aperio wireless technology making it easy and cost effective to bring access control to cabinets and drawers where audit trail and monitoring are becoming increasingly critical. It uses local wireless communication between the lock and an Aperio Hub to connect to an Access Control system, eliminating the cost and difficulty of wiring integrated Access Control to the cabinet.
Features & Benefits
• High security Grade 1 asset protection with audit control » Cabinet lock latch bolt status monitoring » 250 lb holding force, Grade 1 rating per ANSI A156.11-2003 » Online & offline transaction audit trail capabilities
• Fast, easy to install wireless lock tied to existing electronic access control system infrastructure
• Low maintenance with 50,000 cycles of operation with a single CR123A battery
• Low battery signalling and reporting
• Two forms of override available, including mechanical key override and battery jump start pack
• Easy to manage user access
• Convenient, quick response, single-card system uses existing ID badges (no keys to control or replace, no codes to secure or remember)
K100 Cabinet Lock
13
Aperio Technology (Version 1.2)
Ordering Information
K100 iCLASS Cabinet lock K100620IA
K100 Prox 125khz Cabinet lock K100620PA
Product Description Part Number
K100 Technical Information Battery type 1 x Lithium CR123A
Battery life time >40,000 cycles
Radio standard IEEE 802.15.4 (2.4GHz)
Encryption AES128 Bit
Wireless range 5-25m depending on location of Hub & environment
RFID technology iCLASS and Prox 125 khz
RFID Reading UID / sector / block
Card read range < 4cm
Operating
temperature
0ºC – 60ºC
Humidity < 85% non condensating
IP-degree IP30
Approvals CE
Finish Black
Door Thickness 1.25mm-35mm
Spindles 6.25mm
14 aperiotechnology.com.au
General DescriptionThe AH30-3-0 Communication Hub is the link between Aperio locks and the existing access control system. Up to 8 locks can be paired to one Hub and has a standard RS485 connection, making it compatible with most systems on the market today. It communicates directly with Aperio enabled locks via an encrypted 2.4GHz wireless link, and is designed to be positioned above the door within approximately 5 -25m of the lock.
Key Features• Connect up to 8 Aperio devices
on a single hub
• RS485 interface
• Encrypted radio communication
• Integrated antenna
• LED status for visual indication
Applications• Internal doors only
• Expand existing access control systems
• New access control installations
• Doors that cant be hard wired
1 To 8 Communication Hub
AH30-3-0 Communication Hub Technical Information
Power 8-24Vdc
Power consumption 250 mA Minimum 80mA at 12VDC
Radio standard IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)
Encryption AES 128 Bit
Range between Locks
and Hubs
15 - 25 m depending on building environments
Operating temperature 5°C to 35°C
Humidity < 95% non condensation
IP-degree IP 20
Approvals CE, C-Tick
15
Aperio Technology (Version 1.2)
Ordering Information
USB Dongle APRD1/PAP1
Part NumberProduct Description
General DescriptionThe Aperio Programming Application is the software tool used to set up and programme Aperio based products.
Using the software the installer simply plugs in the USB radio dongle to the PC to communicate directly to the Aperio lock via the Communication Hub.
The software has an encrypted installation data base that can be used to manage any number of sites.
Key FeaturesSoftware• Multilingual installation tool
• Encrypted installation database
• Installation management:
– Unit configuration
– Firmware update
– Pair/Un-pair
– Override credentials
– Wireless status link
– RS485 settings
Radio Dongle• Provides communication to Aperio
based products
• Encrypted radio communication
Applications• Tools designed for the installer to set up and
program Aperio based products
Software & USB Radio Dongle
AAA-
CAT-
050_
Vers
ion
1.2
M
C015
90
ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience.
ASSA ABLOY is represented in all major regions, in both mature and emerging markets, with leading positions in Australia, Europe and North America.
As the world’s leading lock group, ASSA ABLOY offers a more complete product range of door opening solutions than any other company on the market.
ASSA ABLOY Australia Pty Limited ABN 90 086 451 907 ©2013
Head OfficeASSA ABLOY Australia Pty Limited 235 Huntingdale Road, Oakleigh Victoria, 3166 Australia 1300 LOCK UP (1300 562 587) info.au@assaabloy.comassaabloy.com.au
RB-See-202
Seeedstudio Grove 125Khz RFID Reader
Introduction
This Grove-125KHz TFID Reader is a module used to read uem4100 RFID card information with two
output formats: Uart and Wiegand. It has a sensitivity with maximum 7cm sensing distance. There is also
the electronic brick version of this module.
Features
Selectable output format: Uart or Wiegand.
4Pins Electronic Grove Interface
Application Ideas
Internet of Thing
Pet Toy
Access Control System
Specifications
Supply voltage: 5v
Max sensing distance: 7cm
Uart output: TTL output, 9600baudrate, 8 data bits, 1 stop bit, and no verify bit.
Wiegand output: 26 bits Wiegand format, 1 even verify bit, 24 data bits, and 1 odd verify bit;
Usage
Pin Definition and Rating
Pin Name Function and Note Rating
GND Connect to the Host GND -
VCC Power supply 5V
RX/D0
RX - In Uart mode, it is unused -
D0 - In Wiegand mode, it represents Data0 5V or 0V
TX/D1
TX - In Uart mode, it represents TX data 5V or 0V
D1 - In Wiegand mode, it represents Data1 5V or 0V
Hardware Installation
* Uart Mode (Jumper set to the left two pins)
You would need to select the jumper to "U" to enter this mode, and teh setting is: 9600bps, N, 8, 1, TTL
output
Output Time sequence
Output Data Format
0x02 10ASCII Data Characters Checksum 0x03
0x02 - 1 byte start flag
10 ASCII Data Characters – Card number info
Checksum - 2 bytes
0x03 - 1 byte end flag
Example
Card number: 62E3086CED
Checksum:( 62H)XOR(E3H)XOR(08H)XOR(6CH)XOR(EDH)=08H
Note: The 10 ASCII characters grouped as 5 hex data needs to be further processed as you may find that
the 5 hex data is not equal to the number marked on the tags in Decimal. Actually the tag number is
equal to the later 4 bytes in decimal. For example, the card number is 62E3086CED, the corresponding
number marked on the tag should be 60717296877 which is the Decimal format of E3086CED.
* Wiegand Mode (Jumper Set to the Right two Pins)
You would need to select the jumper to "U" to enter this mode, and the setting is: 9600bps, N, 8, 1, TTL
output
In Wiegand Mode, output data is formatted with 26bits including 24bits card info and 2 bits parity.
bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
- PE D P0
- - E 0 -
- - D2[7..0] D1[7..0] D0[7..0] -
PE is even bit, PO is odd bit;
E is the data bit which was involved in even, O is the data bit which was involved in odd;
DX[7..0] is the data bit which correspond to Mifare@ Standard & Light card read only ID;
Wiegand Format 26bits’ output time sequence;
Notes
Symbol Specification Representative value
THD Sending Start Delay 1.2ms
TSD Sending Stop Delay 1ms
TDW Data pulse width 160μs
TIW Data pulse interval width 880μs
Demo code
The demo code for Arduino is designed to read Wiegand data in interrupt mode.
Programming
Includes important code snippet. Demo code like :
Demo code
{
}