Group 1 -Intelligent Unlocking System

40
CE6011 - Smart Buildings and Automation INTELLIGENT UNLOCKING SYSTEM 1 INTELLIGENT UNLOCKING SYSTEM The project is about unlocking an office door using the facial recognition system with owner’s authentication. This system will be helpful in a building which is used by multiple sources. For example, a lab which is to be accessed by many research students use either multiple keys or a biometric access to the registered users. Giving away multiple keys might be misused and the biometric access requires the registration and the updating is not easy. Through this system, user can allow access to any person either once or for every time the person comes. It makes updating the database simpler and the one-time access for a person to enter. OUR TEAM (Group 1) CE11B032 - Chaitra Lakshmi Mallela CE11B022 - Anusha GVV CE11B030 - K Sravan Kumar Reddy CE11B036 - Kavya Marupudi CE11B094 - Palash Somani

description

iukjh

Transcript of Group 1 -Intelligent Unlocking System

Page 1: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 1

INTELLIGENT

UNLOCKING

SYSTEM

The project is about unlocking an office door using the facial recognition system with

owner’s authentication. This system will be helpful in a building which is used by multiple

sources. For example, a lab which is to be accessed by many research students use either

multiple keys or a biometric access to the registered users. Giving away multiple keys might be

misused and the biometric access requires the registration and the updating is not easy. Through

this system, user can allow access to any person either once or for every time the person comes.

It makes updating the database simpler and the one-time access for a person to enter.

OUR TEAM (Group 1)

CE11B032 - Chaitra Lakshmi Mallela

CE11B022 - Anusha GVV

CE11B030 - K Sravan Kumar Reddy

CE11B036 - Kavya Marupudi

CE11B094 - Palash Somani

Page 2: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 2

Table of Contents:

S.No. Content Page Number

1 Conceptual Design 3

2 Components & Softwares 4

3 Specifications of components 4

4 Softwares 8

5 Proposed System 11

6 Benefits 15

7 Issues 16

8 Bill of Quantities 16

9 References 17

10 Contributions 17

11 Brochures 18

Page 3: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 3

Conceptual Design

When the bell is pressed or the RFID tag is read, the camera gets switched on.

Images are sent to the facial recognition software.

If match is found, the door is opened. Else, the image is sent to the virtual sensor in the

Global Sensor Network.

This sends the image to the mobile phone of the client.

Then the response of the client is taken using an application which is again connected to the

virtual sensor.

Depending on the response, the door is opened or an alert system gives a voice message

that access is denied.

Page 4: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 4

Components

Hardware:

Push Button

RFID Reader module

Wireless IP Camera

Computer

Smart Phone

Door Lock system

o Mechanical Lock

o Communication Hub

o Access Control

Software:

Global Sensor network

Mobile application

Specifications of Components

Push button:

50 mA 12V DC rating

Through hole mounting design

Single or dual LED options

Momentary actuation

RFID reader module:

Support external antenna

Maximum effective distance up to

50mm

Less than 100ms decoding time

UART TTL interface

Support EM4100 compatible read only

or read/write tags

Built-in external bi-color LED and buzzer

driver

Frequency: 125 KHz

Baud Rate - 9600 (TTL Electricity Level RS232 format)

Page 5: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 5

Power Supply: DC 5V

Current: <50 Ma

Operating Range: >50 mm

Working Temperature: -100C to 700C

Wireless IP camera

Sensor: CMOS 1/4 inch

Network Interface: 802.11b/g/n

Network Protocol: TCP/IP, DHCP, SMTP, TP, DDNS, UPNP

White Balance: Auto

Working Temperature: 0 - 50 C

Power Source: Power Adapter (100V-240V)

Power Consumption 3W

Viewing Distance: 80 - 100 meters

Resolution - 320 x 240, 640 x 480

Mode - 50 Hz/60Hz, Outdoor

Lock parts and Specifications:

SNo Component Qty

1 Cylinder 1

2 Control Unit 1

3 Cover 1

4 Spacer (thick) 1

5 Spacer(thin) 1

6 Mounting plate 1

7 Locking unit 1

8 Locking nut tool 1

9 Mounting

screws

1

10 Allen wrench 1

11 Battery 1

12 Cover screw 1

13 Set screw 1

14 Thumbturn 1

Page 6: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 6

Mounting hardware:

S.No Component Qty

1 Screw caps 2

2 2-56 x 1 1/4” screw 2

3 6-32 x 1 ¼” screw 2

4 2-56 x 1 3/8” screw 2

Wireless Frequency: 2.4 GHz, IEEE 802.15.4, using AES 128bit encryption

Hub Power Requirement: 8-24VDC, 250mA

Lock Battery Type: CR2, providing 30,000 Cycles

Operating Temperature: -10C to 50C

FCC Part 15, Class B Compliant

Credentials Supported: 13.56MHz iCLASS credentials are supported

Communication Hub

Communication Hub is the link between locks and the existing access control system. Up to 8 locks

can be paired to one Hub and has a standard RS485 connection, making it compatible with most

systems on the market today. It communicates directly with enabled locks via an encrypted 2.4GHz

wireless link, and is designed to be positioned above the door within approximately 5 -25m of the

lock.

Key Features

Connect up to 8 devices on a single hub

RS485 interface

Encrypted radio communication

Integrated antenna

LED status for visual indication

Applications

Internal doors only

Expand existing access control systems

New access control installations

Doors that can't be hard wired

Technical Information:

Page 7: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 7

Power: 8-24Vdc

Power consumption: 250 mA - Minimum 80mA at 12VDC

Radio standard: IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)

Encryption: AES 128 Bit

Range between Locks and Hubs - 15 - 25 m depending on building environments

Operating temperature: 5°C to 35°C

Humidity: < 95% non condensation

IP-degree: IP 20

Access Control System:

Access control system is an integrated solution that consists of hardware and software designed to

control entry into selected areas and manage movement of people/vehicles within. The system is

designed to increase security by defining access permissions based on area and time for each user

and maintaining a log of all events.

Components of an access control system:

- Electric locks

- Controllers: receive settings from software and control the electromechanical hardware of

the system.

- Contactless readers: use the image from the camera to read the relative position, size and

shape of the user's eyes, nose, cheekbones and jaw features to ensure accuracy of the

identification

Technical requirements

1. Systems using Ethernet converters, adapters, or terminal servers that enable

network connectivity for legacy controllers by tunneling RS-485 serial data over

Ethernet shall not be acceptable.

2. Single-door controller and IP-reader/Camera shall have at least 32Mb SDRAM

operating memory and 8 MB Flash memory for database and events. Two-door

controller shall have an option for expanding Flash memory to 32MB.

3. All controllers and IP-readers/Camera shall use a 32Bit 100Mhz RISC processor (or

better) in order to enable fast execution of advanced functions.

4. Controllers and IP-readers shall be capable of supplying up to 600mA @ 12VDC to

peripheral devices: readers, electric locks, sirens, detectors, etc.

5. Controllers and IP-readers shall accept the standard 12VDC power input in case an

existing network infrastructure does not support PoE.

Page 8: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 8

Software

Global Sensor Network

Sensor data is captured using sensors built into the mobile phones. The open source sensor data

stream processing engine called “Global Sensor Network” (GSN) with android platform is used to

capture the data. A prototype application should be developed which can be installed on android

devices and an Android wrapper is used as a GSN middleware component.

Global Sensor Network makes the access to sensor networks and data simple, powerful and flexible

just as accessing web documents.

Simplicity: The sensor networks are defined in a declarative way using SQL as data manipulation

language.

Adaptability: Adding new types of sensor networks and dynamic reconfiguration of data sources has

to be supported without interfering with the ongoing system operation which can be achieved using

a container based implementation.

Scalability: The design of GSN is based on peer-to-peer architecture for distributed query processing

and discovery of sensor networks.

Page 9: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 9

GLOBAL SENSOR NETWORK MODEL

Single sensors or whole sensor networks are connected via wireless connections to an access point.

Ad-hoc routing protocols route data to selected sensors that communicate with an access point

which is connected to the Internet and can process and make available the data received from the

sensors. Applications wanting to use the sensor data need to first identify the access points, possibly

through multiple layers and then follow the specific access protocols defined.

GSN provides logical view on sensor networks based on the virtual sensor abstraction. They abstract

implementation details to access sensor

data and model sensor data as temporal

streams of relational data. They can also

represent derived views on sensor data

streams, resulting from post-processing

and combination of sensor data from

different sources. Applications can

discover sensor networks using the

registry and subsequently access sensor

networks by using standard data access

interface.

SYSTEM ARCHITECTURE AND IMPLEMENTATION:

Each GSN container hosts a number of virtual sensor definitions for the set of virtual sensors it is

responsible for.

Virtual Sensor : A virtual sensor corresponds either to a data stream received directly from sensors

or to a data stream derived from other virtual sensors. The specification of a virtual sensor provides

all necessary information required for deploying and using it including:

Metadata used for identification and discovery

Structure of data streams which the virtual sensor consumes and produces

A declarative SQL based specification of the data stream processing performed in a

virtual sensor.

Functional properties related to persistency, error handling, life cycle management and

physical deployment.

Virtual Sensor Manager (VSM) : It is responsible for providing access to the virtual sensors,

managing the delivery of sensor data, and providing the necessary administrative infrastructure. The

VSM has two main subcomponents: The life-cycle manager (LCM) provides and manages the

resources provided to a virtual sensor and manages the interactions with a virtual sensor (sensor

readings, etc.)

The input stream manager (ISM): It is responsible for handling sensor disconnections, missing

values, unexpected delays, etc., thus ensuring stream quality of service via the included stream

Page 10: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 10

quality manager (SQM). The data from/to the VSM passes through the storage layer which is in

charge of providing and managing persistent storage for data streams.

Query processing: It is done by the query manager (QM) which includes the query processor being in

charge of SQL parsing, query planning, execution of queries. The query repository manages all

registered queries(subscriptions) and defines and maintains the set of currently active queries for

the query processor.

Notification Manager: The notification manager deals with the delivery of events and query results

to the registered clients. The notification manager has an extensible architecture which allows the

user to customize its functionality, for example, having results mailed or being notified via SMS.

Wrapper: In order to refer to data

streams produced by a virtual sensor we

use logical addressing. Each virtual sensor

can be equipped with a set of key value

pairs which can be registered and

discovered in GSN. To specify the

processing of the input streams we use

SQL queries which refer to the input

streams by the reserved keyword

WRAPPER. A wrapper connection request

is an object which contains a wrapper

name and its initialisation parameters as defined in the Virtual sensor. Whenever a WCR is

generated at the virtual sensor loader, it will be sent to the wrapper repository.

Few methods used in wrapper:

Initialise() – creates a socket and waits until the client mobile sends the metadata

packet.

createDataFieldCollection() – The information is passed into this method and stored.

Finalise() – End of wrapper’s life cycle. It closes all the connection established.

getOutputFormat() – returns a data field object that provides a description of the data

provided by the wrapper.

Run() – retrieves data from the mobile phone.

mapSensorData() – maps the newly received data to the GSN model structure.

After the data is sent to the GSN data model, querying, filtering and other functionalities provided by

GSN can be done.

Mobile Application

The Android SDK provides you the API libraries and developer tools necessary to build, test, and

debug apps for Android. The ADT Bundle should be downloaded for this purpose. It includes the

essential Android SDK components and a version of the Eclipse IDE with built-in ADT (Android

Developer Tools) to streamline your Android app development.

Page 11: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 11

User Interface:

Notification to user, when the image is received

Option to click yes/no to unlock the door or keep the door locked respectively

Behavior:

The input stream from the virtual sensor is directed to the mobile application and the app

should display the notification

The input given by the user should be sent back to the virtual sensor where the respective

queries are processed

Proposed System

Initializing the camera:

When the bell is pressed or RFID card is read, the camera is switched on and starts recording. When

it is activated once, the circuit will be closed til the images are sent to the computer.

Facial Recognition:

Below is the process of setting up a wireless network camera sensor to monitor a office building

Mounting the camera

Before the camera is configured, the position of it has to be fixed. The best position would

be to place at six feet above the ground, but since it disturbs the aesthetic sense, we should

place at the left top corner on the wall next to the door

The switch (used for bells) will be an input source of voltage signals to power the camera on.

Configuration

Connect the Camera to the computer, which acts as the router, by using Ethernet. This is

done by installing the software CD provided by the camera's company

Working:

When a person wants to enter the building, he is to press the bell which will initiate the camera.

Then the camera will take continuous pictures using the Eigen face generation system. Using this,

the unique identity with the relevant features, from facial images were extracted and sent to the

database through Ethernet. The method involved in extracting the data for identifying the facial

features is explained as below:

Eigen face generation

This camera uses Principle Component Analysis (PCA) which is a well known Eigen face based face

recognition algorithm. Here a set of Eigen faces, Eigen vectors and mean were extracted by

performing a mathematical process on a set of trained images depicting different human faces. Here

Page 12: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 12

the training images are defined as a set of flattened vectors and these vectors are assembled

together into a single matrix. The extracted Eigen vectors of the matrix are stored in a database.

Eigen vectors are defined by the face spaces which are the training face images that are projected.

This results in the variation between the set of faces without emphasis on any one facial region like

the eyes or nose. The projected face space representation of each training image is also saved to a

database. To identify a face, the test image is projected to face space using the saved Eigen vectors.

The projected test image is then compared against each saved projected training image for

similarity. The identity of the person in the test image is assumed to be the same as the person

depicted in the most similar training image. Then the final recognized images are sent to the router.

Action taken from the Facial Recognition responses:

If the face is recognised, the door will open. The process of opening the door will be explained in the

later section.

If the face is not recognised, the image is sent to the virtual sensor in GSN. The process is explained

under working of GSN section.

Intelligent Wi-Fi Access Control Locking :

The reach of the access control system is extended using IEEE 802.11b/g WiFi infrastructure. This

system provides complete access control in locations where it would be difficult or cost-prohibitive

to install a wired lock. With no wires to run, installation time is significantly reduced . It can be

simply installed on the door and configured to communicate with the wireless network.

Page 13: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 13

The Locking system offers an easy retrofit solution for mechanical door hardware. Access control is

added to the door in the time it takes to switch out a cylinder. Local wireless communication

between the lock and a hub connects to the access control system, eliminating the inconvenience of

bringing wiring to the door. The lock communicates wirelessly to an Hub, which connects to the

access control system using RS-485 or Wiegand wiring. Industry standard Wiegand output offers

easy integration with many popular access control systems, while the RS-485 version offers the

flexibility and scalability to support up to eight locks per hub. We choose to use RS-485 as it can be

used for opening multiple doors and it would be convenient for scaling up the project in the future.

Choosing the hub location

It is recommended that the hub be mounted near the top of a wall, on the ceiling or above the

ceiling to reduce potential for interference. For a stable and

reliable radio link, it is recommended that the hub is located

within 45 feet of the lock. A maximum of two interior walls

between the hub and lock can be present.

Recommended locations:

Wall Mount

Ceiling Mount

Inside Ceiling Mount

Wall Mount, Adjacent Room

Mounting the hub

The adapter plate is used to mount the hub on a

single or double gang box.

Page 14: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 14

Wiring the hub:

Connects to the Access

Control system via Wiegand

wiring.

Requires 8-24VDC power

(250mA).

Includes three form C relays

that can be used to

transmit Lock jamb status,

low battery signal and a

tamper signal.

Connects to the mortise

lock wirelessly.

Then the hub connected to power and the access control system. With a known credential to

confirm, the lock will open as desired.

Authentication from the client

If the image is not recognized by the facial recognition software, the image is sent to the virtual

sensor in the GSN whose input stream comes from the web cam. The image is sent to the owner via

mail. Then the user can choose whether to open the door or not using the application installed in

the phone. The response of the application is sent to the virtual sensor via Android wrapper and the

corresponding query processing is done.

Acting to the responses of the owner:

If the command is yes, the command is sent to door unlocking system to open the door.

If the command is no, the voice alert system is activated

Code - Wireless camera to Virtual sensor

1<virtual-sensor name="FacialRec" priority="11"> 2 <class>gsn.vsensor.BridgeVirtualSensor</class> 3 <author>Dslotproj</author> 4 <email>”email”</email> 5 <description>Facial Recognition</description> 6 <life-cycle pool-size="10" /> 7 <output-specification rate="500" /> 8 <addressing> 9 <predicate key="geographical">BC143-N</predicate> 10 <predicate key="type">image</predicate> 11 </addressing> 12 <output-structure>

Page 15: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 15

13 <field name="image" type=".jpeg" /> 14 </output-structure> 15 <storage history-size="1 hour " permanent-storage="true" /> 16 <input-streams> 17 <input-stream name="image" > 18 <stream-source alias="facreg" storage-size="1"> 19 <address wrapper="tinyos"> 20 <predicate key="host">lsirpc24.epfl.ch</predicate> 21 <predicate key="port">9001</predicate> 22 </address> 23 <query> 24 //Mail the image to the owner 26 </query> 27 </stream-source> 31 </input-stream> 32 </input-streams> 33 </virtual-sensor>

Code - Android wrapper

public class EmptyWrapper extends AbstractWrapper{

public boolean initialize(){

//Wait for client to send meta data packet

//Analyse the meta data packet and identify the enabled application on client side

//CreateDataFieldCollection (Response recorded in the application)

}

public void run(){

while(isActive()){

//Wait for the client to send the data

//mapSensorData(“data from app”, enabled sensors)

}

public DataField getOutputFormat(){…….}

public string getWrapperName(){…….}

public void finalise(){……}

}

Benefits:

Improvising the quality and energy efficiency of the environmental system while allowing

almost unlimited reconfiguration and customization in the future.

The door can be accessed from anywhere.

It provides real-time information about who is accessing the office.

We can also choose to receive notifications about all the activity around the door to our mobile phone. All activity is recorded and logged by the system, and it is available for review at any time.

One of the main advantages of automatic door unlock is the fact that you will not be required to carry a key all the time.

We can provide entry into the workplace to others at our discretion.

Local wireless communication eliminates the cost and inconvenience of wiring in and around the door. With no wires to run, installation time is significantly reduced.

Page 16: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 16

The images captured by the camera system are recorded and stored into a database. These

are helpful in maintaining records so that they can be easily retrieved later, when needed.

Reducing the amount of communication required to perform tasks by distributed or local pre

computations

Issues:

The system is highly dependent on the smart phone of the owner. It becomes difficult to

access the door if the phone is misplaced.

No alternative is provided if even one of the components malfunctions.

Camera system cannot monitor every area of your office at all times, hence may not be able

to detect everyone arriving at the door.

If several persons are standing at the door, the image sent to the system is analyzed and

even if one person’s image is authenticated, the system opens the door.

The initial costs incurred are high. The installation may also increase the initial expenditure.

Developing wrappers is a time consuming and tedious job. Therefore, research is conducted

to develop automatic wrappers.

Location privacy against a global eavesdropper:

While many protocols for sensor network security provide confidentiality for the

content of messages, contextual information usually remains exposed. The location privacy

issues can be formalized under a strong adversary model and communication overhead

needed for achieving a given level of privacy can be determined. Periodic collection and

source simulation can be used to prevent leakage of information. Periodic collection

provides a high level of location privacy, while source simulation provides trade-offs

between privacy, communication cost, and latency.

Bill Of Quantities:

S.No Component* Quantity Price(INR)

1 Bell Switch 1 150

2 RFID reader module 1 865

3 Wireless camera (D-Link DCS-932L) 1 4599

4 Communication hub 1

8500 5 Lock 1

6 Access control 1

*Cost of assembled components is mentioned above. The separate hardware components required

for each of the above mentioned components are listed in the Specifications.

Page 17: Group 1 -Intelligent Unlocking System

CE6011 - Smart Buildings and Automation

INTELLIGENT UNLOCKING SYSTEM 17

References:

http://www.intelligentopenings.com/en/site

http://www.medeco.com/Other/Medeco

http://www.assaabloy.com.au/

http://gadgets.ndtv.com/mobile

http://www.hidglobal.com/product-display

http://www.alibaba.com/showroom

http://sweets.construction.com/

http://startrinity.com/VideoRecognition/Resources

http://arxiv.org/abs/1301.0157

Contributions:

We have divided the whole project equally and everyone contributed the same.

Hence we are giving equal weightage to everyone's work.

20% - CE11B032 - Chaitra Lakshmi Mallela

20% - CE11B022 - Anusha GVV

20% - CE11B030 - K Sravan Kumar Reddy

20% - CE11B036 - Kavya Marupudi

20% - CE11B094 - Palash Somani

Page 18: Group 1 -Intelligent Unlocking System

AperioTM Technology

Page 19: Group 1 -Intelligent Unlocking System
Page 20: Group 1 -Intelligent Unlocking System

1

Aperio Technology (Version 1.2)

Contents

Introducing Aperio Technology 2

Aperio System Overview 3

Aperio System Components 4

Upgrading System Components 5

Simplified Management of Security 6

E100 Series Escutcheon 8

C100 Series Cylinder 10

K100 Cabinet Lock 12

1 to 8 Communication Hub 14

Software & USB Radio Dongle 15

Page 21: Group 1 -Intelligent Unlocking System

2 aperiotechnology.com.au

Introducing Aperio™ Technology

Aperio is a new technology developed to complement new and existing electronic access control systems, providing end users with a simple, intelligent way to upgrade the controllability and security level of their premises.

The heart of Aperio is a short distance wireless communication protocol; designed to link an online electronic access control system with an Aperio enabled mechanical lock.

“Wireless Locking Evolution for Online Door Control”

Key BenefitsAffordable online door control of internal doors• Few components

• Very easy installation

• No changes to existing access control installation

Extends existing access control system• Connects over standard interface

• No separate management software – uses existing access control system management software

• No change of cards

Enhances security for internal doors• Eliminates key management issues

• Authorization changes in real time

• Encrypted communication

• Audit trails and time zones through existing system

Page 22: Group 1 -Intelligent Unlocking System

3

Aperio Technology (Version 1.2)

The open architecture of Aperio provides a convenient way of connecting with most access control systems via a standard RS485 Interface. Cylinders or escutcheons communicate via an encrypted wireless link to a communication hub that is wired directly to the existing system.

Aperio System Overview

Communication Hub

Existing Electronic Access Control System Software

Aperio Lock

RS485

Wired access control door Aperio enabled door

Existing Electronic Access Control Panel

Page 23: Group 1 -Intelligent Unlocking System

4 aperiotechnology.com.au

C100 Series CylinderDesigned to fit the standard Lockwood oval 570 series cylinder, the C100 provides a unique and cost effective migration to an on line electronic access control door.

Aperio System Components

Communication HubThe Communication Hub is the link between Aperio locks and the existing access control system. The Hub has a standard RS485 connection, making it compatible with most systems on the market today. Up to 8 Aperio locks can be connected to one Hub.

Programming ApplicationThe Aperio programming Application is the software tool used to set up and programme Aperio based products.

USB Radio Dongle The Radio Dongle is used in conjunction with the programming application. It communicates via an encrypted wireless link directly to the Hub and Aperio enabled lock.

E100 Series EscutcheonThe E100 series escutcheon is designed to fit Lockwood mechanical 3570 series mortice locks. In addition to card access the external side of the door provides for key override entry, whilst the inside lever is designed for emergency egress.

Page 24: Group 1 -Intelligent Unlocking System

5

Aperio Technology (Version 1.2)

Upgrading Existing Systems

Expanding an electronic access control system with Aperio is more cost effective than alternative solutions because it is easy to install and does not require any wiring of the door.

Electronic cylinders and escutcheons have been designed to suit existing mechanical locks, so in many cases doors and locking systems do not need to be changed – only upgraded with Aperio enabled products.

Being compatible with most RFID technologies, there is no need to change user’s credentials – just use existing cards.

Page 25: Group 1 -Intelligent Unlocking System

6 aperiotechnology.com.au

Simplified Management of Security

Installing Aperio provides a simple way to facilitate card-based access, while also fulfilling end-users needs for an easily operated system.

Aperio enabled products are managed with existing electronic access control systems and management software. This means that all decisions and updates are in real time. This offers a high level of security and control over audit trails, usage, and adding/deleting users.

Any number of doors can be wirelessly connected to the access control system through Aperio technology, providing a cost effective solution to upgrade internal mechanical doors to online access control.

Wired access control door

Aperio enabled door

Page 26: Group 1 -Intelligent Unlocking System
Page 27: Group 1 -Intelligent Unlocking System

8 aperiotechnology.com.au

Function• External lever is always locked.

To unlock badge card and activate lever. Door automatically re locks after set time. Can also be opened via Key override.

• Internal lever is set to escape – free egress at all times.

General DescriptionThe E100 series escutcheon is designed to fit Lockwood mechanical 3570 series mortice locks & provide a cost effective migration to an on line electronic access control door. In addition to card access the external side of the door provides for key override entry, whilst the inside lever is designed for emergency egress.

The external plate incorporates a sophisticated battery powered proximity reader that communicates wirelessly to a hub. The Hub is then wired directly to the access control system and enables standard on line access control functionality at significantly reduced costs to that of a hard wired door.

Key Features• Wireless on line access control

• Authorisation changes in real time

• Audit trails and time zones managed through existing system

• Compatible with Lockwood 3570 series mechanical mortice locks

• Additional Key Override

• Emergency egress

• Lock can store up to 10 override credentials/prox cards

• Store last 200 events and audit trails locally in the lock

• Battery powered – up to 40,000 operations

• LED status

• Battery low warning sent to EAC system

Applications• Internal doors only

• Retro fit mechanical mortice locks

• Expand existing access control installations

• New access control installations

• Doors that cant be hard wired

• Heritage listed buildings

E100 Series Escutcheon

Page 28: Group 1 -Intelligent Unlocking System

9

Aperio Technology (Version 1.2)

E100 Series Escutcheon

E100 Technical Information

Battery type 1 x Lithium CR123A

Battery life time >40,000 cycles

Radio standard IEEE 802.15.4 (2.4GHz)

Encryption AES128 Bit

Wireless range 5-25m depending on location of Hub & environment

RFID technology** Mifare Classic / Desfire, Mifare Classic / PlusiCLASS and Prox 125 Khz

RFID Reading UID / sector / block

Card read range < 4cm

Operating temperature 0ºC – 60ºC

Humidity < 85% non condensating

IP-degree IP30

Approvals CE

Colour Brushed stainless steel

Override cylinder Lockwood Australian oval 570 series

Door Thickness 35-45mm & 46-55mm

Spindles 7.6mm

Backset 60mm

** Model dependant

Ordering Information

Part NumberProduct Description

E100 V2 35-45 Door Mifare Classic / Desfire E102MU1SS1

E100 V2 46-55 Door Mifare Classic / Desfire E102MU1SS2

E100 V2 35-45 Door iCLASS E102IU1SS1

E100 V2 46-55 Door iCLASS E102IU1SS2

Accessories

E100 Cover Plate – Pair E100-PL2SSS

Aperio Hub 1:8 RS485 Hub AH30-3-03572 Series Mortice Lock To Suit E100 Series 3572SCNOHD

Part NumberProduct Description

Spare Parts

Aperio Spindle Kit 35-45mm E-SP35/45

Aperio Spindle Kit 45-55mm E-SP45/55

Notes: • E100 cover plate is used only if required when retro fitting

existing door furniture.• Each cover plate is 1.2mm thick. A total of 2.4mm should be

added to door thickness if using these plates• To change the spindle; special tools may be required

Part NumberProduct Description

323

52

10 40

2022

194.7 155.541

ø22

77.5

13.7

312.

517

2

10 40

2022

194.7 155.541

ø22

77.5

13.7

312.

517

2E100 cover plate

Page 29: Group 1 -Intelligent Unlocking System

10 aperiotechnology.com.au

Function• External – badge card in front of cylinder and

rotate knob to retract latch.

• Internal – lever on mortice lock is set to escape – free egress at all times.

General DescriptionDesigned to fit the standard Lockwood oval 570 series cylinder, the C100 provides a unique and cost effective migration to an online electronic access control door.

The external housing contains a sophisticated battery powered proximity reader that communicates wirelessly to a hub. The hub is then wired directly to the access control system and enables standard on line access control features at significantly reduced costs than that of a hard wired door.

Key Features• Wireless Online access control

• Authorisation changes in real time

• Audit trails and time zones managed through existing system

• Compatible with standard Lockwood 3570 series mortice locks

• Cylinder can store up to 10 override credentials/prox cards

• Stores last 200 events and audit trails locally in the cylinder

• LED status indication

• Battery powered 40,000 operations

• Battery low warning sent to EAC system

• Available in Stainless Steel Knob

Applications• Internal doors only

• Expand existing access control systems

• New access control installations

• Doors that cant be hard-wired

• Heritage listed buildings

C100 Series Cylinder

Page 30: Group 1 -Intelligent Unlocking System

11

Aperio Technology (Version 1.2)

C100 Technical Information

Battery type 1 x Lithium CR2

Battery lifetime >40,000 cycles

Radio standard IEEE 802.15.4 (2.4GHz)

Encryption AES 128 Bit

Wireless range: Cylinder to Hub

5-25m depending on location of Hub & environment

RFID technology** Mifare Classic / Desfire, Mifare Classic / Plus iCLASS Prox 125 Khz

RFID reading UID / sector / block

Card reading range < 4cm

Operating temperature 0ºC - 60º

Humidity < 85% non condensation

IP-degree IP 30

Knob colour Black

Cylinder Colour Satin Chrome. Other finishes on application

Cylinder format Lockwood Australian oval 570 series

Door thickness Suits standard doors up to 50mm

Approvals CE

** Model dependant

36.4

44.7 36

31.6

9

17.9

Ordering Information

Aperio C100 Cylinder SC V2 iCLASS C102IASC

Aperio C100 Cylinder SC V2 iCLASS SS Knob C102IASCSS

Aperio C100 Cylinder SC V2 Mifare Classic / Desfire C102MASC

Aperio C100 Cylinder SC V2 Mifare C102MASCSS Classic /Desfire SS Knob

Part NumberProduct Description

C100 Series Cylinder

Accessories

Aperio Hub 1:8 RS485 Hub AH30-3-0Aperio Stainless Steel Hub only A-KN-SS-C100

Part NumberProduct Description

Page 31: Group 1 -Intelligent Unlocking System

12 aperiotechnology.com.au

Add cabinet security without adding another credential

The K100 Cabinet Lock uses Aperio wireless technology making it easy and cost effective to bring access control to cabinets and drawers where audit trail and monitoring are becoming increasingly critical. It uses local wireless communication between the lock and an Aperio Hub to connect to an Access Control system, eliminating the cost and difficulty of wiring integrated Access Control to the cabinet.

Features & Benefits

• High security Grade 1 asset protection with audit control » Cabinet lock latch bolt status monitoring » 250 lb holding force, Grade 1 rating per ANSI A156.11-2003 » Online & offline transaction audit trail capabilities

• Fast, easy to install wireless lock tied to existing electronic access control system infrastructure

• Low maintenance with 50,000 cycles of operation with a single CR123A battery

• Low battery signalling and reporting

• Two forms of override available, including mechanical key override and battery jump start pack

• Easy to manage user access

• Convenient, quick response, single-card system uses existing ID badges (no keys to control or replace, no codes to secure or remember)

K100 Cabinet Lock

Page 32: Group 1 -Intelligent Unlocking System

13

Aperio Technology (Version 1.2)

Ordering Information

K100 iCLASS Cabinet lock K100620IA

K100 Prox 125khz Cabinet lock K100620PA

Product Description Part Number

K100 Technical Information Battery type 1 x Lithium CR123A

Battery life time >40,000 cycles

Radio standard IEEE 802.15.4 (2.4GHz)

Encryption AES128 Bit

Wireless range 5-25m depending on location of Hub & environment

RFID technology iCLASS and Prox 125 khz

RFID Reading UID / sector / block

Card read range < 4cm

Operating

temperature

0ºC – 60ºC

Humidity < 85% non condensating

IP-degree IP30

Approvals CE

Finish Black

Door Thickness 1.25mm-35mm

Spindles 6.25mm

Page 33: Group 1 -Intelligent Unlocking System

14 aperiotechnology.com.au

General DescriptionThe AH30-3-0 Communication Hub is the link between Aperio locks and the existing access control system. Up to 8 locks can be paired to one Hub and has a standard RS485 connection, making it compatible with most systems on the market today. It communicates directly with Aperio enabled locks via an encrypted 2.4GHz wireless link, and is designed to be positioned above the door within approximately 5 -25m of the lock.

Key Features• Connect up to 8 Aperio devices

on a single hub

• RS485 interface

• Encrypted radio communication

• Integrated antenna

• LED status for visual indication

Applications• Internal doors only

• Expand existing access control systems

• New access control installations

• Doors that cant be hard wired

1 To 8 Communication Hub

AH30-3-0 Communication Hub Technical Information

Power 8-24Vdc

Power consumption 250 mA Minimum 80mA at 12VDC

Radio standard IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)

Encryption AES 128 Bit

Range between Locks

and Hubs

15 - 25 m depending on building environments

Operating temperature 5°C to 35°C

Humidity < 95% non condensation

IP-degree IP 20

Approvals CE, C-Tick

Page 34: Group 1 -Intelligent Unlocking System

15

Aperio Technology (Version 1.2)

Ordering Information

USB Dongle APRD1/PAP1

Part NumberProduct Description

General DescriptionThe Aperio Programming Application is the software tool used to set up and programme Aperio based products.

Using the software the installer simply plugs in the USB radio dongle to the PC to communicate directly to the Aperio lock via the Communication Hub.

The software has an encrypted installation data base that can be used to manage any number of sites.

Key FeaturesSoftware• Multilingual installation tool

• Encrypted installation database

• Installation management:

– Unit configuration

– Firmware update

– Pair/Un-pair

– Override credentials

– Wireless status link

– RS485 settings

Radio Dongle• Provides communication to Aperio

based products

• Encrypted radio communication

Applications• Tools designed for the installer to set up and

program Aperio based products

Software & USB Radio Dongle

Page 35: Group 1 -Intelligent Unlocking System

AAA-

CAT-

050_

Vers

ion

1.2

M

C015

90

ASSA ABLOY is the global leader in door opening solutions, dedicated to satisfying end-user needs for security, safety and convenience.

ASSA ABLOY is represented in all major regions, in both mature and emerging markets, with leading positions in Australia, Europe and North America.

As the world’s leading lock group, ASSA ABLOY offers a more complete product range of door opening solutions than any other company on the market.

ASSA ABLOY Australia Pty Limited ABN 90 086 451 907 ©2013

Head OfficeASSA ABLOY Australia Pty Limited 235 Huntingdale Road, Oakleigh Victoria, 3166 Australia 1300 LOCK UP (1300 562 587) [email protected]

Page 36: Group 1 -Intelligent Unlocking System

RB-See-202

Seeedstudio Grove 125Khz RFID Reader

Introduction

This Grove-125KHz TFID Reader is a module used to read uem4100 RFID card information with two

output formats: Uart and Wiegand. It has a sensitivity with maximum 7cm sensing distance. There is also

the electronic brick version of this module.

Features

Selectable output format: Uart or Wiegand.

4Pins Electronic Grove Interface

Application Ideas

Internet of Thing

Pet Toy

Access Control System

Specifications

Supply voltage: 5v

Max sensing distance: 7cm

Uart output: TTL output, 9600baudrate, 8 data bits, 1 stop bit, and no verify bit.

Wiegand output: 26 bits Wiegand format, 1 even verify bit, 24 data bits, and 1 odd verify bit;

Page 37: Group 1 -Intelligent Unlocking System

Usage

Pin Definition and Rating

Pin Name Function and Note Rating

GND Connect to the Host GND -

VCC Power supply 5V

RX/D0

RX - In Uart mode, it is unused -

D0 - In Wiegand mode, it represents Data0 5V or 0V

TX/D1

TX - In Uart mode, it represents TX data 5V or 0V

D1 - In Wiegand mode, it represents Data1 5V or 0V

Hardware Installation

* Uart Mode (Jumper set to the left two pins)

You would need to select the jumper to "U" to enter this mode, and teh setting is: 9600bps, N, 8, 1, TTL

output

Output Time sequence

Page 38: Group 1 -Intelligent Unlocking System

Output Data Format

0x02 10ASCII Data Characters Checksum 0x03

0x02 - 1 byte start flag

10 ASCII Data Characters – Card number info

Checksum - 2 bytes

0x03 - 1 byte end flag

Example

Card number: 62E3086CED

Checksum:( 62H)XOR(E3H)XOR(08H)XOR(6CH)XOR(EDH)=08H

Note: The 10 ASCII characters grouped as 5 hex data needs to be further processed as you may find that

the 5 hex data is not equal to the number marked on the tags in Decimal. Actually the tag number is

equal to the later 4 bytes in decimal. For example, the card number is 62E3086CED, the corresponding

number marked on the tag should be 60717296877 which is the Decimal format of E3086CED.

* Wiegand Mode (Jumper Set to the Right two Pins)

You would need to select the jumper to "U" to enter this mode, and the setting is: 9600bps, N, 8, 1, TTL

output

In Wiegand Mode, output data is formatted with 26bits including 24bits card info and 2 bits parity.

bit 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

- PE D P0

- - E 0 -

- - D2[7..0] D1[7..0] D0[7..0] -

Page 39: Group 1 -Intelligent Unlocking System

PE is even bit, PO is odd bit;

E is the data bit which was involved in even, O is the data bit which was involved in odd;

DX[7..0] is the data bit which correspond to Mifare@ Standard & Light card read only ID;

Wiegand Format 26bits’ output time sequence;

Notes

Symbol Specification Representative value

THD Sending Start Delay 1.2ms

TSD Sending Stop Delay 1ms

TDW Data pulse width 160μs

TIW Data pulse interval width 880μs

Page 40: Group 1 -Intelligent Unlocking System

Demo code

The demo code for Arduino is designed to read Wiegand data in interrupt mode.

Programming

Includes important code snippet. Demo code like :

Demo code

{

}