Final Report
-
Upload
ravi-joshi -
Category
Documents
-
view
11 -
download
0
description
Transcript of Final Report
Smart card based Door Access System with LCD
1. INTRODUCTION
It is a system which can be used where accessing of door or any other
electrical device, can be open using a smart card on inserting the card users data is
being by the micro controller which will process the data the card is an EPROM IC
where we can store the data in that there where quick updating, quick record database
generator for the person using for and where few organization cant work efficiency
like post, telegraph, telephone. Manual handling required for telephone.
The smart card is one of the latest additions to the world of
information technology. Similar in size to today plastic payment card, the smart card
has a microprocessor or memory chip embedded in it that, when coupled with a
reader, has the processing power to serve many different application. As soon as
access-control device, smart cards make personal an business data available only to
the appropriate users. Another application provides users with the ability to make a
purchase or exchange value. Smart card provide portability, security and convenience.
We use a system that is called smart card connectivity which has the
following features. Analysis, computation, decising making is easier & faster. Space
constraint sensitive to environmental condition computer literates are required to
operate. We have developed a system, which can used for remote sites or area.
The EEPROM (memory) on the smart car d I s there for security. The
EEPROM enforces access to the data on the card. If the host computer read and wrote
the smart card random access memory(RAM), it would be no different than a diskette.
Smart card may have up to 512 kilobytes of EEPROM. The smart card
uses a serial interface and receive s its power from external sources liked a card
reader. The processor user a limited instruction set for application such as
cryptography.
Smart card can be used with a smart card reader attachment to a
personal computer to authentic a user. Web browsers also can use smart card
technology to supplement Secure Sockets Layer(SSL) for improved security of
Internaltransaction.
D.B. Science College Gondia 1
Smart card based Door Access System with LCD
1.1. WHAT IS SMART CARD?
A smart card resembles a credit card in size and shape, but inside it is
completely different. First of all, it has an inside a normal credit card is a simple piece
of plastic. The inside of a smart card usually contains an embedded microprocessor.
The microprocessor is under a gold contact pad on one side of the card. Think of the
microprocessor as replacing the usual magnetic stripe on a credit card or debit card.
Smart cards are much more popular in Europe than in the United States. In Europe,
the health insurance and banking industries use smart cards extensively. Every
German citizen has a smart card for health insurance. Even though smart cards have
been around in their modern form for at least a decade, they are just starting to take
off in the United States.
Magnetic stripe technology remains in wide use in the United States. However, the
data on the stripe can easily be read, written, deleted or changed with off-the-shelf
equipment. Therefore, the stripe is really not the best place to store sensitive
information. To protect the consumer, businesses in the U.S. have invested in
extensive online mainframe-based computer networks for verification and processing.
In Europe, such an infrastructure did not develop instead, the card carries the
intelligence.
The microprocessor on the smart card is there for security. The host computer and
card reader actually "talk" to the microprocessor. The microprocessor enforces access
to the data on the card. If the host computer read and wrote the smart card's random
access memory (RAM), it would be no different than a diskette.
D.B. Science College Gondia 2
Smart card based Door Access System with LCD
Smarts cards may have up to 8 kilobytes of RAM, 346 kilobytes of
ROM, 256 kilobytes of programmable ROM, and a 16-bit microprocessor. The smart
card uses a serial interface and receives its power from external sources like a card
reader. The processor uses a limited instruction set for applications such as
cryptography.
The most common smart card applications are:
Credit cards
Electronic cash
Computer security systems
Wireless communication
Loyalty systems (like frequent flyer points)
Banking
Satellite TV
Government identification
Smart cards can be used with a smart-card reader attachment to a
personal computer to authenticate a user. Web browsers also can use smart card
technology to supplement Secure Sockets Layer (SSL) for improved security of
Internet transactions. Visa's Smart Card FAQ shows how online purchases work using
a smart card and a PC equipped with a smart-card reader. Smart-card readers can also
be found in mobile phones and vending machines.
1.2. TYPES OF SMART CARD
D.B. Science College Gondia 3
Smart card based Door Access System with LCD
Smart cards are defined according to
1). How the card data is read and written
2). The type of chip implanted within the card and its capabilities.
There is a wide range of options to choose from when designing your system.
1.3. CARD CONSTRUCTION
D.B. Science College Gondia 4
Smart card based Door Access System with LCD
Mostly all chip cards are built from layers of differing materials, or
substrates, that when brought together properly gives the card a specific life and
functionality. The typical card today is made from PVC, Polyester or Polycarbonate.
The card layers are printed first and then laminated in a large press. The next step in
construction is the blanking or die cutting. This is followed by embedding a chip and
then adding data to the card. In all, there may be up to 30 steps in constructing a card.
The total components, including software and plastics, may be as many as 12 separate
items; all this in a unified package that appears to the user as a simple device.
1.4. CONTACT CARDS
D.B. Science College Gondia 5
Smart card based Door Access System with LCD
These are the most common type of smart card. Electrical contacts
located on the outside of the card connect to a card reader when the card is inserted.
This connector is bonded to the encapsulated chip in the card.
Increased levels of processing power, flexibility and memory will add
cost. Single function cards are usually the most cost-effective solution. Choose the
right type of smart card for your application by determining your required level of
security and evaluating cost versus functionality in relation to the cost of the other
hardware elements found in a typical workflow. All of these variables should be
weighted against the expected lifecycle of the card. On average the cards typically
comprise only 10 to 15 percent of the total system cost with the infrastructure,
issuance, software, readers, training and advertising making up the other 85 percent.
The following chart demonstrates some general rules of thumb:
1.5. MICROPROCESSOR MULTIFUNCTION CARDS
D.B. Science College Gondia 6
Smart card based Door Access System with LCD
These cards have on-card dynamic data processing capabilities.
Multifunction smart cards allocate card memory into independent sections or files
assigned to a specific function or application. Within the card is a microprocessor or
microcontroller chip that manages this memory allocation and file access. This type of
chip is similar to those found inside all personal computers and when implanted in a
smart card, manages data in organized file structures, via a card operating system
(COS). Unlike other operating systems, this software controls access to the on-card
user memory. This capability permits different and multiple functions and/or different
applications to reside on the card, allowing businesses to issue and maintain a
diversity of ‘products’ through the card. One example of this is a debit card that also
enables building access on a college campus. Multifunction cards benefit issuers by
enabling them to market their products and services via state-of-the-art transaction
and encryption technology. Specifically, the technology enables secure identification
of users and permits information updates without replacement of the installed base of
cards, simplifying program changes and reducing costs. For the card user,
multifunction means greater convenience and security, and ultimately, consolidation
of multiple cards down to a select few that serve many purposes.
There are many configurations of chips in this category, including
chips that support cryptographic Public Key Infrastructure (PKI) functions with on-
board math co-processors or javacard® with virtual machine hardware blocks. As a
rule of thumb - the more functions, the higher the cost
D.B. Science College Gondia 7
Smart card based Door Access System with LCD
1.6. SMART CARD OVERVIEW
A smart card, typically a type of chip card, is a plastic card that
contains an embedded computer chip–either a memory or microprocessor type–that
stores and transacts data. This data is usually associated with either value,
information, or both and is stored and processed within the card's chip. The card data
is transacted via a reader that is part of a computing system. Systems that are
enhanced with smart cards are in use today throughout several key applications,
including healthcare, banking, entertainment, and transportation. All applications can
benefit from the added features and security that smart cards provide. According to
Eurosmart, worldwide smart card shipments will grow 10% in 2010 to 5.455 billion
cards. Markets that have been traditionally served by other machine readable card
technologies, such as barcode and magnetic stripe, are converting to smart cards as
the calculated return on investment is revisited by each card issuer year after year.
1.6.1. APPLICATIONS
First introduced in Europe nearly three decades ago, smart cards
debuted as a stored value tool for payphones to reduce theft. As smart cards and other
chip-based cards advanced, people found new ways to use them, including charge
cards for credit purchases and for record keeping in place of paper.
In the U.S., consumers have been using chip cards for everything from
visiting libraries to buying groceries to attending movies, firmly integrating them into
our everyday lives. Several U.S. states have chip card programs in progress for
government applications ranging from the Department of Motor Vehicles to
Electronic Benefit Transfers (ebts). Many industries have implemented the power of
smart cards in their products, such as the GSM digital cellular phones as well as TV-
satellite decoders.
D.B. Science College Gondia 8
Smart card based Door Access System with LCD
1.7. WHY SMART CARDS
Cards improve the convenience and security of any transaction. They
provide tamper-proof storage of user and account identity. Smart card systems have
proven to be more reliable than other machine-readable cards, like magnetic stripe
and barcode, with many studies showing card read life and reader life improvements
demonstrating much lower cost of system maintenance. Smart cards also provide vital
components of system security for the exchange of data throughout virtually any type
of network. They protect against a full range of security threats, from careless storage
of user passwords to sophisticated system hacks. The costs to manage password resets
for an organization or enterprise are very high, thus smart making smart cards a cost-
effective solution in these environments. Multifunction cards can also be used to
manage network system access and store value and other data. Worldwide, people are
now using smart cards for a wide variety of daily tasks, which include:
1.7.1. PHYSICAL ACCESS
Businesses and universities of all types need simple identity cards for
all employees and students. Most of these individuals are also granted access to
certain data, equipment, and departments according to their status. Multifunction,
microprocessor-based smart cards incorporate identity with access privileges and can
also store value for use in various locations, such as cafeterias and stores. Many hotels
have also adopted ISO 7816 type card readers to secure staff-only rooms and
facilities.
All U.S. government and many corporations have now incorporated a
contactless reader as an access point to their facilities. Some companies have
incorporated a biometric component to this credential as well. The older systems
deploy a simple proximity card system as the gate keeper. But as the security
requirements have become stronger and the cost of ISO 14443 standard systems have
become lower, the world is rapidly adopting this new standard. This market shift is
partially driven by the US government’s adoption of the mandated Personal Identity
Verification (PIV) standard. There is a rich ecosystem of suppliers and integrators for
this standard.
D.B. Science College Gondia 9
Smart card based Door Access System with LCD
1.8. SMART CARD READERS & TERMINALS
Readers and terminals operate with smart cards to obtain card
information and perform a transaction.
Generally, a reader interfaces with a PC for the majority of its
processing requirements. A terminal is a self-contained processing device. Both
readers and terminals read and write to smart cards.
1.8.1. Readers
This type of reader requires a physical connection to the cards, made
by inserting the card into the reader. This is the most common reader type for
applications such as ID and Stored Value. The card-to-reader communications is often
ISO 7816 T=0 only. This communication has the advantage of direct coupling to the
reader and is considered more secure. The other advantage is speed. The typical PTS
Protocol Type Selection (ISO7816-3) negotiated speed can be up to 115 kilo baud.
This interface enables larger data transport without the overhead of anti-collision and
wireless breakdown issues that are a result from the card moving in and out of the
reader antenna range.
D.B. Science College Gondia 10
Smart card based Door Access System with LCD
1.9. SMART CARD SECURITY
Smart cards provide computing and business systems the enormous benefit of portable and secure storage of data and value. At the same time, the integration of smart cards into your system introduces its own security management issues, as people access card data far and wide in a variety of applications.
The following is a basic discussion of system security and smart cards, designed to familiarize you with the terminology and concepts you need in order to start your security planning.
1.8.1. WHAT IS SECURITY?
Smart cards provide computing and business systems the enormous
benefit of portable and secure storage of data and value. At the same time, the
integration of smart cards into your system introduces its own security management
issues, as people access card data far and wide in a variety of applications.
The following is a basic discussion of system security and smart cards,
designed to familiarize you with the terminology and concepts you need in order to
start your security planning.
Security is basically the protection of something valuable to ensure that
it is not stolen, lost, or altered. The term "data security" governs an extremely wide
range of applications and touches everyone's daily life. Concerns over data security
are at an all-time high, due to the rapid advancement of technology into virtually
every transaction, from parking meters to national defense.
Data is created, updated, exchanged and stored via networks. A
network is any computing system where users are highly interactive and
interdependent and by definition, not all in the same physical place. In any network,
diversity abounds, certainly in terms of types of data, but also types of users. For that
reason, a system of security is essential to maintain computing and network functions,
keep sensitive data secret, or simply maintain worker safety. Any one company might
provide an example of these multiple security concerns: Take, for instance, a
pharmaceutical manufacturer.
D.B. Science College Gondia 11
Smart card based Door Access System with LCD
Type of data Security concern Type of access
Drug FormulaBasis of business income. Competitor spying
Highly selective list of executives
Accounting, Regulatory Required by lawRelevant executives and departments
Personnel Files Employee privacyRelevant executives and departments
Employee IDNon-employee access. Inaccurate payroll, benefits assignment
Relevant executives and departments
Facilities Access authorization
Individuals per function and clearance such as customers, visitors, or vendors
Building safety, emergency response
All employeesOutside emergency response
1.8.2. WHAT IS INFORMATION SECURITY?
Information security is the application of measures to ensure the safety
and privacy of data by managing its storage and distribution. Information security has
both technical and social implications. The first simply deals with the 'how' and 'how
much' question of applying secure measures at a reasonable cost. The second grapples
with issues of individual freedom, public concerns, legal standards and how the need
for privacy intersects them. This discussion covers a range of options open to business
managers, system planners and programmers that will contribute to your ultimate
security strategy. The eventual choice rests with the system designer and issuer.
D.B. Science College Gondia 12
Smart card based Door Access System with LCD
1.8.3. The Elements of Data Security
In implementing a security system, all data networks deal with the following main
elements:
Hardware, including servers, redundant mass storage devices, communication
channels and lines, hardware tokens (smart cards) and remotely located
devices (e.g., thin clients or Internet appliances) serving as interfaces between
users and computers
Software, including operating systems, database management systems,
communication and security application programs
Data, including databases containing customer - related information.
Personnel, to act as originators and/or users of the data; professional
personnel, clerical staff, administrative personnel, and computer staf.
1.8.4. The Mechanisms of Data Security
Working with the above elements, an effective data security system works with the
following key mechanisms to answer,
Has My Data Arrived Intact? (Data Integrity) This mechanism ensures that
data was not lost or corrupted when it was sent to you
Is The Data Correct And Does It Come From The Right Person?
(Authentication) This proves user or system identities
Can I Confirm Receipt Of The Data And Sender Identity Back To The
Sender? (Non-Repudiation)
Can I Keep This Data Private? (Confidentiality) - Ensures only senders and
receivers access the data. This is typically done by employing one or more
encryption techniques to secure your data
Can I Safely Share This Data If I Choose? (Authorization and Delegation)
You can set and manage access privileges for additional users and groups
Can I Verify That The System Is Working? (Auditing and Logging)
Provides a constant monitor and troubleshooting of security system function
Can I Actively Manage The System? (Management) Allows administration
of your security system
D.B. Science College Gondia 13
Smart card based Door Access System with LCD
2. IMPLEMENTATION
2.1. INTRODUCTION
The smart card is one of the latest additions to the world of information
technology. Similar in size to today plastic payment card, the smart card has a
microprocessor or memory chip embedded in it that, when coupled with a reader, has
the processing power to serve many different application. As soon as access-control
device, smart cards make personal an business data available only to the appropriate
users. Another application provides users with the ability to make a purchase or
exchange value. Smart card provide portability, security and convenience.
We use a system that is called smart card connectivity which has the
following features. Analysis, computation, decising making is easier & faster. Space
constraint sensitive to environmental condition computer literates are required to
operate. We have developed a system, which can used for remote sites or area.
The EEPROM (memory) on the smart car d I s there for security. The
EEPROM enforces access to the data on the card. If the host computer read and wrote
the smart card random access memory(RAM), it would be no different than a diskette.
Smart card may have up to 512 kilobytes of EEPROM. The smart card
uses a serial interface and receive s its power from external sources liked a card
reader. The processor user a limited instruction set for application such as
cryptography.
Smart card can be used with a smart card reader attachment to a
personal computer to authentic a user. Web browsers also can use smart card
technology to supplement Secure Sockets Layer(SSL) for improved security of
Internaltransaction.
D.B. Science College Gondia 14
Smart card based Door Access System with LCD
2.2. BLOCK DIAGRAM
This is smart card system for Bank, ATM , Bank lockers, School,
College and home security application. Its using micro controller and smart card
(Memory Card). LCD Interfaces for Display user ID.
Figure-Block diagram of smart card based door access system with LCD
D.B. Science College Gondia 15
Smart card based Door Access System with LCD
2.3. CIRCUIT EXPLANATION
Figure- Circuit diagram of smart card based door access system with LCD
D.B. Science College Gondia 16
Smart card based Door Access System with LCD
2.3.1. SMART CARD
Figure-block diagram of smart card
The general block diagram of the system consist of the card which
provided a predefined code(STORED IN THE EEPROM OF the card IC) every card
has some unique code stored in its EEPROM also known as firmware, is an
integrated circuit programmed with specific data when it is manufactured. Working
with ROM’s and EPROM’s can be wastful business. Even though they are
inexpensive per chip, the cost can add up over time. Erastable programmable read
only memory addresses this issue. EPROM chips can be rewritten many times.
Erasing an EPROM requires a special tool that emits a certain frequency of
ultraviolet light. EPROM’s are configured using an EPROM programmer that
provides voltage at specified levels depending on the type of EPROM used .In the
smart card we used two wire serial EEPROM AT24C04 is used in the circuit to stoare
the user coad as the memory ensure reading of the latest saved setting bya the micro
controller . this 12c bus compatible 2048-bit EPROM is organized as 256*8 bits. It
can retain data for more than ten year. Using just two lines (SCL and SDA) of the
memory, the microcontroller can read the dada
D.B. Science College Gondia 17
Smart card based Door Access System with LCD
2.3.2. MICROCONTEROLLER INTERFACING
PIC16F72 is an 8-bit CMOS microcontroller . its internal circuitry
reducing the need for external component , thus reducing the cost and power
consumption and inhancing the reliability .PIC16F72 is an 8-bit,low-cast,high
performance flash micto controller. its keys feature are 4K words of flash program
memory, 192 bytes of data RAM, eleven interrupts, three i/o ports,8-bit ADC and
only 35 powerful single-cycle instruction(each 14bit wide).
The pic 16f72 micro controller is a 28 pin IC with three input/output
ports; port A(RAO through RA5), port B(RBO through RB7) and port C(RCO
through RC7). All 22 bi-directional I/O pins are used for smart card (serial
EEPROM), LED Interface, Buzzer and realy interfacing. Port RC4 is pulled up via
4K7 resistor and used as enter key and mode selection( read and write).
The user code is store in the smart card (serial EPROM (AT 24C04)
memory. The memoollry can be read by the micro controller, which activates an
output when the correct access code has been read in the smart card, All Read Data
send to the PC serial port via RS232 interferece. A buzzer has been added to provide
input feedback; the number of beep indicates weather the input has been entered
correctly or not.
D.B. Science College Gondia 18
Smart card based Door Access System with LCD
2.3.3. SMART CARD INTERFACE
Pins RC3 and RC2 of the microcontroller are used as serial data (SDA)
and serial clock (SCL) lines for the I2C bus for communicating with the smart card
(EEPROM _AT24C04).These two lines are connected to pull-up resistors, which are
required for 12C bus devices. AT 24C04 is an i2C bus compatible 4k – bit EEPROM
organized as 256x8-bit that can retain data for more than the years. Various user
codes can be stored in it. Using SCL and SDA lines, the microcontroller can read
and write data for all the parameters. For more details on 12c bus and memory
interface, please refer to the AT24c04 datasheet.
Figure-smart card interfacing with microcontroller
D.B. Science College Gondia 19
Smart card based Door Access System with LCD
2.3.4. LCD INTERFACE
The dot matrix liquid crystal display controller and driver LSI
displays alphanumeric character and symbols. it can be configured to drive a dot-
matrix liquid crystal display under the control of a 4 or 8-bit microprocessor. since all
the functions such as display RAM, character generator, liquid crystal driver, required
for driving a dot-matrix liquid crystal display are internally provided on one chip, a
minimal system can be interfaced with this controller/driver. A single HD44780U can
display up to two 8-character lines(16*2).
A 16*2 lines LCD module to display user information. Micro
controller send the data signals through pin 11 through 18(RC0-RC3)and control
signal through 4,6 and 7 of the micro controller. Pin no 3 of the LCD is used to
control the contrast by using present PR1.
Figure-LCD interface
D.B. Science College Gondia 20
Smart card based Door Access System with LCD
2.3.5. BUSSER
A busser connected to port RB1 of the micro controller through a
driver tranistor. The buzzer required 12 volts at a current of the around 50ma, which
can not provide by the micro controller. So the driver transistor is added. The buzzer
is used to audible indication for valid user and error situation and Alarm mode. As
soon as pin of the micro o controller goes high, the buzzer operatesres.
Figure- buzzer
D.B. Science College Gondia 21
Smart card based Door Access System with LCD
2.3.6. RELAY INTERFACE
A Single pole dabble throw (SPDT) relay is connected to port RB0 of
the micro controller through a driver transistor. The relay requires 12 volt s at a
current of around 100ma, which can not provided by the micro controller. So the
driver transistor is added. The relay is used to operate the external solenoid forming
part of a locking devices or for operating any other electrical device. Normally the
relay remains off. As soon as pin of the micro controller goes high, the re lay
operates. When the relay operates and releases. Diode D2 is the standard diode on a
mechanical relay to prevent back EMF for damaging Q3 when the relay release. LED
L1 indicates relay on .
Figure-Relay interfacing
D.B. Science College Gondia 22
Smart card based Door Access System with LCD
2.3.7. POWER SUPPLY
Two supply voltages are required for the circuit. A DC or AC 12v
main adaptor is connected to bridge rectifier (D1,D2,D3,D4) vai CN1 connector. U3
and U4 are supplied with regulated 5v from a 7805 (u2) fixed voltage regulator. The
unregulated voltage of approximately 12v is required for realy and buzzer driving
circuit.
2.3.8. WRITE USER CODE
Press enter button and power on the circuit, if system goes in program
mode buzzer give you single beep. Enter the smart card in socket. Select user code
using SW_UP and SW_DWN (SW2 And SW3).
Note- 101 to 108 is valid user code, remaining all other invalid user code.
D.B. Science College Gondia 23
Smart card based Door Access System with LCD
2.4 PCB DESIGM
Figure- Smart card based door access system with LCD
D.B. Science College Gondia 24
Smart card based Door Access System with LCD
4. CONCLUSION
This project has successfully presented a functional, low cost and low
complexity microcontroller based door access control system. The proposed security
door system adopted a valid smart card to authenticate and/or deny entry to a room or
building. A real-life equivalent of the prototype can be developed with minimal
development costs and with relatively low operational costs for environment where
high degrees of security are required like banks, military research areas, and big
private investment companies.
D.B. Science College Gondia 25
Smart card based Door Access System with LCD
REFERENCES
[1] www.national.com [lm7805/at24c04]
[2] www.microchip.com [pic16f72]
[3] http://www.smartcardalliance.org
[4] http://www.opensecurityexchange.com.
[5] http://www.datasheetarchiv.com.
D.B. Science College Gondia 26