Final Report

36
Smart card based Door Access System with LCD 1. INTRODUCTION It is a system which can be used where accessing of door or any other electrical device, can be open using a smart card on inserting the card users data is being by the micro controller which will process the data the card is an EPROM IC where we can store the data in that there where quick updating, quick record database generator for the person using for and where few organization cant work efficiency like post, telegraph, telephone. Manual handling required for telephone. The smart card is one of the latest additions to the world of information technology. Similar in size to today plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different application. As soon as access-control device, smart cards make personal an business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart card provide portability, security and convenience. We use a system that is called smart card connectivity which has the following features. Analysis, computation, decising making is easier & faster. Space constraint sensitive to environmental condition computer D.B. Science College Gondia 1

description

Final Report

Transcript of Final Report

Page 1: Final Report

Smart card based Door Access System with LCD

1. INTRODUCTION

It is a system which can be used where accessing of door or any other

electrical device, can be open using a smart card on inserting the card users data is

being by the micro controller which will process the data the card is an EPROM IC

where we can store the data in that there where quick updating, quick record database

generator for the person using for and where few organization cant work efficiency

like post, telegraph, telephone. Manual handling required for telephone.

The smart card is one of the latest additions to the world of

information technology. Similar in size to today plastic payment card, the smart card

has a microprocessor or memory chip embedded in it that, when coupled with a

reader, has the processing power to serve many different application. As soon as

access-control device, smart cards make personal an business data available only to

the appropriate users. Another application provides users with the ability to make a

purchase or exchange value. Smart card provide portability, security and convenience.

We use a system that is called smart card connectivity which has the

following features. Analysis, computation, decising making is easier & faster. Space

constraint sensitive to environmental condition computer literates are required to

operate. We have developed a system, which can used for remote sites or area.

The EEPROM (memory) on the smart car d I s there for security. The

EEPROM enforces access to the data on the card. If the host computer read and wrote

the smart card random access memory(RAM), it would be no different than a diskette.

Smart card may have up to 512 kilobytes of EEPROM. The smart card

uses a serial interface and receive s its power from external sources liked a card

reader. The processor user a limited instruction set for application such as

cryptography.

Smart card can be used with a smart card reader attachment to a

personal computer to authentic a user. Web browsers also can use smart card

technology to supplement Secure Sockets Layer(SSL) for improved security of

Internaltransaction.

D.B. Science College Gondia 1

Page 2: Final Report

Smart card based Door Access System with LCD

1.1. WHAT IS SMART CARD?

A smart card resembles a credit card in size and shape, but inside it is

completely different. First of all, it has an inside a normal credit card is a simple piece

of plastic. The inside of a smart card usually contains an embedded microprocessor.

The microprocessor is under a gold contact pad on one side of the card. Think of the

microprocessor as replacing the usual magnetic stripe on a credit card or debit card.

Smart cards are much more popular in Europe than in the United States. In Europe,

the health insurance and banking industries use smart cards extensively. Every

German citizen has a smart card for health insurance. Even though smart cards have

been around in their modern form for at least a decade, they are just starting to take

off in the United States.

Magnetic stripe technology remains in wide use in the United States. However, the

data on the stripe can easily be read, written, deleted or changed with off-the-shelf

equipment. Therefore, the stripe is really not the best place to store sensitive

information. To protect the consumer, businesses in the U.S. have invested in

extensive online mainframe-based computer networks for verification and processing.

In Europe, such an infrastructure did not develop instead, the card carries the

intelligence.

The microprocessor on the smart card is there for security. The host computer and

card reader actually "talk" to the microprocessor. The microprocessor enforces access

to the data on the card. If the host computer read and wrote the smart card's random

access memory (RAM), it would be no different than a diskette.

D.B. Science College Gondia 2

Page 3: Final Report

Smart card based Door Access System with LCD

Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of

ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart

card uses a serial interface and receives its power from external sources like a card

reader. The processor uses a limited instruction set for applications such as

cryptography.

The most common smart card applications are:

Credit cards

Electronic cash

Computer security systems

Wireless communication

Loyalty systems (like frequent flyer points)

Banking

Satellite TV

Government identification

Smart cards can be used with a smart-card reader attachment to a

personal computer to authenticate a user. Web browsers also can use smart card

technology to supplement Secure Sockets Layer (SSL) for improved security of

Internet transactions. Visa's Smart Card FAQ shows how online purchases work using

a smart card and a PC equipped with a smart-card reader. Smart-card readers can also

be found in mobile phones and vending machines.

1.2. TYPES OF SMART CARD

D.B. Science College Gondia 3

Page 4: Final Report

Smart card based Door Access System with LCD

Smart cards are defined according to

1). How the card data is read and written

2). The type of chip implanted within the card and its capabilities.

There is a wide range of options to choose from when designing your system.

1.3. CARD CONSTRUCTION

D.B. Science College Gondia 4

Page 5: Final Report

Smart card based Door Access System with LCD

Mostly all chip cards are built from layers of differing materials, or

substrates, that when brought together properly gives the card a specific life and

functionality. The typical card today is made from PVC, Polyester or Polycarbonate.

The card layers are printed first and then laminated in a large press. The next step in

construction is the blanking or die cutting. This is followed by embedding a chip and

then adding data to the card. In all, there may be up to 30 steps in constructing a card.

The total components, including software and plastics, may be as many as 12 separate

items; all this in a unified package that appears to the user as a simple device.

1.4. CONTACT CARDS

D.B. Science College Gondia 5

Page 6: Final Report

Smart card based Door Access System with LCD

These are the most common type of smart card. Electrical contacts

located on the outside of the card connect to a card reader when the card is inserted.

This connector is bonded to the encapsulated chip in the card.

Increased levels of processing power, flexibility and memory will add

cost. Single function cards are usually the most cost-effective solution. Choose the

right type of smart card for your application by determining your required level of

security and evaluating cost versus functionality in relation to the cost of the other

hardware elements found in a typical workflow. All of these variables should be

weighted against the expected lifecycle of the card. On average the cards typically

comprise only 10 to 15 percent of the total system cost with the infrastructure,

issuance, software, readers, training and advertising making up the other 85 percent.

The following chart demonstrates some general rules of thumb:

1.5. MICROPROCESSOR MULTIFUNCTION CARDS

D.B. Science College Gondia 6

Page 7: Final Report

Smart card based Door Access System with LCD

These cards have on-card dynamic data processing capabilities.

Multifunction smart cards allocate card memory into independent sections or files

assigned to a specific function or application. Within the card is a microprocessor or

microcontroller chip that manages this memory allocation and file access. This type of

chip is similar to those found inside all personal computers and when implanted in a

smart card, manages data in organized file structures, via a card operating system

(COS). Unlike other operating systems, this software controls access to the on-card

user memory. This capability permits different and multiple functions and/or different

applications to reside on the card, allowing businesses to issue and maintain a

diversity of ‘products’ through the card. One example of this is a debit card that also

enables building access on a college campus. Multifunction cards benefit issuers by

enabling them to market their products and services via state-of-the-art transaction

and encryption technology. Specifically, the technology enables secure identification

of users and permits information updates without replacement of the installed base of

cards, simplifying program changes and reducing costs. For the card user,

multifunction means greater convenience and security, and ultimately, consolidation

of multiple cards down to a select few that serve many purposes.

There are many configurations of chips in this category, including

chips that support cryptographic Public Key Infrastructure (PKI) functions with on-

board math co-processors or javacard® with virtual machine hardware blocks. As a

rule of thumb - the more functions, the higher the cost

D.B. Science College Gondia 7

Page 8: Final Report

Smart card based Door Access System with LCD

1.6. SMART CARD OVERVIEW

A smart card, typically a type of chip card, is a plastic card that

contains an embedded computer chip–either a memory or microprocessor type–that

stores and transacts data. This data is usually associated with either value,

information, or both and is stored and processed within the card's chip. The card data

is transacted via a reader that is part of a computing system. Systems that are

enhanced with smart cards are in use today throughout several key applications,

including healthcare, banking, entertainment, and transportation. All applications can

benefit from the added features and security that smart cards provide. According to

Eurosmart, worldwide smart card shipments will grow 10% in 2010 to 5.455 billion

cards. Markets that have been traditionally served by other machine readable card

technologies, such as barcode and magnetic stripe, are converting to smart cards as

the calculated return on investment is revisited by each card issuer year after year.

1.6.1. APPLICATIONS

First introduced in Europe nearly three decades ago, smart cards

debuted as a stored value tool for payphones to reduce theft. As smart cards and other

chip-based cards advanced, people found new ways to use them, including charge

cards for credit purchases and for record keeping in place of paper.

In the U.S., consumers have been using chip cards for everything from

visiting libraries to buying groceries to attending movies, firmly integrating them into

our everyday lives. Several U.S. states have chip card programs in progress for

government applications ranging from the Department of Motor Vehicles to

Electronic Benefit Transfers (ebts). Many industries have implemented the power of

smart cards in their products, such as the GSM digital cellular phones as well as TV-

satellite decoders.

D.B. Science College Gondia 8

Page 9: Final Report

Smart card based Door Access System with LCD

1.7. WHY SMART CARDS

Cards improve the convenience and security of any transaction. They

provide tamper-proof storage of user and account identity. Smart card systems have

proven to be more reliable than other machine-readable cards, like magnetic stripe

and barcode, with many studies showing card read life and reader life improvements

demonstrating much lower cost of system maintenance. Smart cards also provide vital

components of system security for the exchange of data throughout virtually any type

of network. They protect against a full range of security threats, from careless storage

of user passwords to sophisticated system hacks. The costs to manage password resets

for an organization or enterprise are very high, thus smart making smart cards a cost-

effective solution in these environments. Multifunction cards can also be used to

manage network system access and store value and other data. Worldwide, people are

now using smart cards for a wide variety of daily tasks, which include:

1.7.1. PHYSICAL ACCESS

Businesses and universities of all types need simple identity cards for

all employees and students. Most of these individuals are also granted access to

certain data, equipment, and departments according to their status. Multifunction,

microprocessor-based smart cards incorporate identity with access privileges and can

also store value for use in various locations, such as cafeterias and stores. Many hotels

have also adopted ISO 7816 type card readers to secure staff-only rooms and

facilities.

All U.S. government and many corporations have now incorporated a

contactless reader as an access point to their facilities. Some companies have

incorporated a biometric component to this credential as well. The older systems

deploy a simple proximity card system as the gate keeper. But as the security

requirements have become stronger and the cost of ISO 14443 standard systems have

become lower, the world is rapidly adopting this new standard. This market shift is

partially driven by the US government’s adoption of the mandated Personal Identity

Verification (PIV) standard. There is a rich ecosystem of suppliers and integrators for

this standard.

D.B. Science College Gondia 9

Page 10: Final Report

Smart card based Door Access System with LCD

1.8. SMART CARD READERS & TERMINALS

Readers and terminals operate with smart cards to obtain card

information and perform a transaction.

Generally, a reader interfaces with a PC for the majority of its

processing requirements. A terminal is a self-contained processing device. Both

readers and terminals read and write to smart cards.

1.8.1. Readers

This type of reader requires a physical connection to the cards, made

by inserting the card into the reader. This is the most common reader type for

applications such as ID and Stored Value. The card-to-reader communications is often

ISO 7816 T=0 only. This communication has the advantage of direct coupling to the

reader and is considered more secure. The other advantage is speed. The typical PTS

Protocol Type Selection (ISO7816-3) negotiated speed can be up to 115 kilo baud.

This interface enables larger data transport without the overhead of anti-collision and

wireless breakdown issues that are a result from the card moving in and out of the

reader antenna range.

D.B. Science College Gondia 10

Page 11: Final Report

Smart card based Door Access System with LCD

1.9. SMART CARD SECURITY

Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications.

The following is a basic discussion of system security and smart cards, designed to familiarize you with the terminology and concepts you need in order to start your security planning.

1.8.1. WHAT IS SECURITY?

Smart cards provide computing and business systems the enormous

benefit of portable and secure storage of data and value. At the same time, the

integration of smart cards into your system introduces its own security management

issues, as people access card data far and wide in a variety of applications.

The following is a basic discussion of system security and smart cards,

designed to familiarize you with the terminology and concepts you need in order to

start your security planning.

Security is basically the protection of something valuable to ensure that

it is not stolen, lost, or altered. The term "data security" governs an extremely wide

range of applications and touches everyone's daily life. Concerns over data security

are at an all-time high, due to the rapid advancement of technology into virtually

every transaction, from parking meters to national defense.

Data is created, updated, exchanged and stored via networks. A

network is any computing system where users are highly interactive and

interdependent and by definition, not all in the same physical place. In any network,

diversity abounds, certainly in terms of types of data, but also types of users. For that

reason, a system of security is essential to maintain computing and network functions,

keep sensitive data secret, or simply maintain worker safety. Any one company might

provide an example of these multiple security concerns: Take, for instance, a

pharmaceutical manufacturer.

D.B. Science College Gondia 11

Page 12: Final Report

Smart card based Door Access System with LCD

Type of data Security concern Type of access

Drug FormulaBasis of business income. Competitor spying

Highly selective list of executives

Accounting, Regulatory Required by lawRelevant executives and departments

Personnel Files Employee privacyRelevant executives and departments

Employee IDNon-employee access. Inaccurate payroll, benefits assignment

Relevant executives and departments

Facilities Access authorization

Individuals per function and clearance such as customers, visitors, or vendors

Building safety, emergency response

All employeesOutside emergency response

1.8.2. WHAT IS INFORMATION SECURITY?

Information security is the application of measures to ensure the safety

and privacy of data by managing its storage and distribution. Information security has

both technical and social implications. The first simply deals with the 'how' and 'how

much' question of applying secure measures at a reasonable cost. The second grapples

with issues of individual freedom, public concerns, legal standards and how the need

for privacy intersects them. This discussion covers a range of options open to business

managers, system planners and programmers that will contribute to your ultimate

security strategy. The eventual choice rests with the system designer and issuer.

D.B. Science College Gondia 12

Page 13: Final Report

Smart card based Door Access System with LCD

1.8.3. The Elements of Data Security

In implementing a security system, all data networks deal with the following main

elements:

Hardware, including servers, redundant mass storage devices, communication

channels and lines, hardware tokens (smart cards) and remotely located

devices (e.g., thin clients or Internet appliances) serving as interfaces between

users and computers

Software, including operating systems, database management systems,

communication and security application programs

Data, including databases containing customer - related information.

Personnel, to act as originators and/or users of the data; professional

personnel, clerical staff, administrative personnel, and computer staf.

1.8.4. The Mechanisms of Data Security

Working with the above elements, an effective data security system works with the

following key mechanisms to answer,

Has My Data Arrived Intact? (Data Integrity) This mechanism ensures that

data was not lost or corrupted when it was sent to you

Is The Data Correct And Does It Come From The Right Person?

(Authentication) This proves user or system identities

Can I Confirm Receipt Of The Data And Sender Identity Back To The

Sender? (Non-Repudiation)

Can I Keep This Data Private? (Confidentiality) - Ensures only senders and

receivers access the data. This is typically done by employing one or more

encryption techniques to secure your data

Can I Safely Share This Data If I Choose? (Authorization and Delegation)

You can set and manage access privileges for additional users and groups

Can I Verify That The System Is Working? (Auditing and Logging)

Provides a constant monitor and troubleshooting of security system function

Can I Actively Manage The System? (Management) Allows administration

of your security system

D.B. Science College Gondia 13

Page 14: Final Report

Smart card based Door Access System with LCD

2. IMPLEMENTATION

2.1. INTRODUCTION

The smart card is one of the latest additions to the world of information

technology. Similar in size to today plastic payment card, the smart card has a

microprocessor or memory chip embedded in it that, when coupled with a reader, has

the processing power to serve many different application. As soon as access-control

device, smart cards make personal an business data available only to the appropriate

users. Another application provides users with the ability to make a purchase or

exchange value. Smart card provide portability, security and convenience.

We use a system that is called smart card connectivity which has the

following features. Analysis, computation, decising making is easier & faster. Space

constraint sensitive to environmental condition computer literates are required to

operate. We have developed a system, which can used for remote sites or area.

The EEPROM (memory) on the smart car d I s there for security. The

EEPROM enforces access to the data on the card. If the host computer read and wrote

the smart card random access memory(RAM), it would be no different than a diskette.

Smart card may have up to 512 kilobytes of EEPROM. The smart card

uses a serial interface and receive s its power from external sources liked a card

reader. The processor user a limited instruction set for application such as

cryptography.

Smart card can be used with a smart card reader attachment to a

personal computer to authentic a user. Web browsers also can use smart card

technology to supplement Secure Sockets Layer(SSL) for improved security of

Internaltransaction.

D.B. Science College Gondia 14

Page 15: Final Report

Smart card based Door Access System with LCD

2.2. BLOCK DIAGRAM

This is smart card system for Bank, ATM , Bank lockers, School,

College and home security application. Its using micro controller and smart card

(Memory Card). LCD Interfaces for Display user ID.

Figure-Block diagram of smart card based door access system with LCD

D.B. Science College Gondia 15

Page 16: Final Report

Smart card based Door Access System with LCD

2.3. CIRCUIT EXPLANATION

Figure- Circuit diagram of smart card based door access system with LCD

D.B. Science College Gondia 16

Page 17: Final Report

Smart card based Door Access System with LCD

2.3.1. SMART CARD

Figure-block diagram of smart card

The general block diagram of the system consist of the card which

provided a predefined code(STORED IN THE EEPROM OF the card IC) every card

has some unique code stored in its EEPROM also known as firmware, is an

integrated circuit programmed with specific data when it is manufactured. Working

with ROM’s and EPROM’s can be wastful business. Even though they are

inexpensive per chip, the cost can add up over time. Erastable programmable read

only memory addresses this issue. EPROM chips can be rewritten many times.

Erasing an EPROM requires a special tool that emits a certain frequency of

ultraviolet light. EPROM’s are configured using an EPROM programmer that

provides voltage at specified levels depending on the type of EPROM used .In the

smart card we used two wire serial EEPROM AT24C04 is used in the circuit to stoare

the user coad as the memory ensure reading of the latest saved setting bya the micro

controller . this 12c bus compatible 2048-bit EPROM is organized as 256*8 bits. It

can retain data for more than ten year. Using just two lines (SCL and SDA) of the

memory, the microcontroller can read the dada

D.B. Science College Gondia 17

Page 18: Final Report

Smart card based Door Access System with LCD

2.3.2. MICROCONTEROLLER INTERFACING

PIC16F72 is an 8-bit CMOS microcontroller . its internal circuitry

reducing the need for external component , thus reducing the cost and power

consumption and inhancing the reliability .PIC16F72 is an 8-bit,low-cast,high

performance flash micto controller. its keys feature are 4K words of flash program

memory, 192 bytes of data RAM, eleven interrupts, three i/o ports,8-bit ADC and

only 35 powerful single-cycle instruction(each 14bit wide).

The pic 16f72 micro controller is a 28 pin IC with three input/output

ports; port A(RAO through RA5), port B(RBO through RB7) and port C(RCO

through RC7). All 22 bi-directional I/O pins are used for smart card (serial

EEPROM), LED Interface, Buzzer and realy interfacing. Port RC4 is pulled up via

4K7 resistor and used as enter key and mode selection( read and write).

The user code is store in the smart card (serial EPROM (AT 24C04)

memory. The memoollry can be read by the micro controller, which activates an

output when the correct access code has been read in the smart card, All Read Data

send to the PC serial port via RS232 interferece. A buzzer has been added to provide

input feedback; the number of beep indicates weather the input has been entered

correctly or not.

D.B. Science College Gondia 18

Page 19: Final Report

Smart card based Door Access System with LCD

2.3.3. SMART CARD INTERFACE

Pins RC3 and RC2 of the microcontroller are used as serial data (SDA)

and serial clock (SCL) lines for the I2C bus for communicating with the smart card

(EEPROM _AT24C04).These two lines are connected to pull-up resistors, which are

required for 12C bus devices. AT 24C04 is an i2C bus compatible 4k – bit EEPROM

organized as 256x8-bit that can retain data for more than the years. Various user

codes can be stored in it. Using SCL and SDA lines, the microcontroller can read

and write data for all the parameters. For more details on 12c bus and memory

interface, please refer to the AT24c04 datasheet.

Figure-smart card interfacing with microcontroller

D.B. Science College Gondia 19

Page 20: Final Report

Smart card based Door Access System with LCD

2.3.4. LCD INTERFACE

The dot matrix liquid crystal display controller and driver LSI

displays alphanumeric character and symbols. it can be configured to drive a dot-

matrix liquid crystal display under the control of a 4 or 8-bit microprocessor. since all

the functions such as display RAM, character generator, liquid crystal driver, required

for driving a dot-matrix liquid crystal display are internally provided on one chip, a

minimal system can be interfaced with this controller/driver. A single HD44780U can

display up to two 8-character lines(16*2).

A 16*2 lines LCD module to display user information. Micro

controller send the data signals through pin 11 through 18(RC0-RC3)and control

signal through 4,6 and 7 of the micro controller. Pin no 3 of the LCD is used to

control the contrast by using present PR1.

Figure-LCD interface

D.B. Science College Gondia 20

Page 21: Final Report

Smart card based Door Access System with LCD

2.3.5. BUSSER

A busser connected to port RB1 of the micro controller through a

driver tranistor. The buzzer required 12 volts at a current of the around 50ma, which

can not provide by the micro controller. So the driver transistor is added. The buzzer

is used to audible indication for valid user and error situation and Alarm mode. As

soon as pin of the micro o controller goes high, the buzzer operatesres.

Figure- buzzer

D.B. Science College Gondia 21

Page 22: Final Report

Smart card based Door Access System with LCD

2.3.6. RELAY INTERFACE

A Single pole dabble throw (SPDT) relay is connected to port RB0 of

the micro controller through a driver transistor. The relay requires 12 volt s at a

current of around 100ma, which can not provided by the micro controller. So the

driver transistor is added. The relay is used to operate the external solenoid forming

part of a locking devices or for operating any other electrical device. Normally the

relay remains off. As soon as pin of the micro controller goes high, the re lay

operates. When the relay operates and releases. Diode D2 is the standard diode on a

mechanical relay to prevent back EMF for damaging Q3 when the relay release. LED

L1 indicates relay on .

Figure-Relay interfacing

D.B. Science College Gondia 22

Page 23: Final Report

Smart card based Door Access System with LCD

2.3.7. POWER SUPPLY

Two supply voltages are required for the circuit. A DC or AC 12v

main adaptor is connected to bridge rectifier (D1,D2,D3,D4) vai CN1 connector. U3

and U4 are supplied with regulated 5v from a 7805 (u2) fixed voltage regulator. The

unregulated voltage of approximately 12v is required for realy and buzzer driving

circuit.

2.3.8. WRITE USER CODE

Press enter button and power on the circuit, if system goes in program

mode buzzer give you single beep. Enter the smart card in socket. Select user code

using SW_UP and SW_DWN (SW2 And SW3).

Note- 101 to 108 is valid user code, remaining all other invalid user code.

D.B. Science College Gondia 23

Page 24: Final Report

Smart card based Door Access System with LCD

2.4 PCB DESIGM

Figure- Smart card based door access system with LCD

D.B. Science College Gondia 24

Page 25: Final Report

Smart card based Door Access System with LCD

4. CONCLUSION

This project has successfully presented a functional, low cost and low

complexity microcontroller based door access control system. The proposed security

door system adopted a valid smart card to authenticate and/or deny entry to a room or

building. A real-life equivalent of the prototype can be developed with minimal

development costs and with relatively low operational costs for environment where

high degrees of security are required like banks, military research areas, and big

private investment companies.

D.B. Science College Gondia 25

Page 26: Final Report

Smart card based Door Access System with LCD

REFERENCES

[1] www.national.com [lm7805/at24c04]

[2] www.microchip.com [pic16f72]

[3] http://www.smartcardalliance.org

[4] http://www.opensecurityexchange.com.

[5] http://www.datasheetarchiv.com.

D.B. Science College Gondia 26