The Electronic Passport and the Future of Government-Issued Rfid-based Identification

114
CHAPTER-1 INTRODUCTION 1.1 OVERVIEW Since many years, the aid for accident victims is given only after the arrival of the ambulance. The accidents that occur in the highways or the unpopulated area or a deserted place cannot be detected due to lack of technology and source, hence the victims lose their lives. There are many cases where people have lost their lives due to lack of assistance and help at the right time. As we see from many years the death rate has been increasing mainly due to accidents. These days the density of traffic has been increasing in the increasing population resulting too many accidents India is ranking no. 1 in road accident deaths and they are about 1, 05,000 annually. As road traffic crashes takes the lives of nearly 1.3 million every year, and injure up to 20-50 million and more in the world. Poor road infrastructure, failure to compile with speed limits, increasing drunken drive habits, and refusal to usage of proper motorcycle helmets and car seat belts are one among the main factors for the cause for increase to deaths by road accidents. The irregular roads also lead to the accidents and inspite of this usage technology.

Transcript of The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Page 1: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

CHAPTER-1

INTRODUCTION

1.1 OVERVIEW

Since many years, the aid for accident victims is given only after the arrival of the

ambulance. The accidents that occur in the highways or the unpopulated area or a

deserted place cannot be detected due to lack of technology and source, hence the victims

lose their lives.

There are many cases where people have lost their lives due to lack of assistance

and help at the right time. As we see from many years the death rate has been increasing

mainly due to accidents. These days the density of traffic has been increasing in the

increasing population resulting too many accidents

India is ranking no. 1 in road accident deaths and they are about 1, 05,000

annually. As road traffic crashes takes the lives of nearly 1.3 million every year, and

injure up to 20-50 million and more in the world.

Poor road infrastructure, failure to compile with speed limits, increasing drunken

drive habits, and refusal to usage of proper motorcycle helmets and car seat belts are one

among the main factors for the cause for increase to deaths by road accidents. The

irregular roads also lead to the accidents and inspite of this usage technology.

WHO (Worlds health organization) said in its report that “Decade f action for

road safety 2011-2010”

1.2 STATEMENT OF THE PROBLEM

The problem here is that due to lack of assistance and help at the right time the

people lose their lives in the accidents. There is no indication to the concern people about

the place where it took place and the information of the person and the vehicle who met

with the accident. For this particular problem there are many solutions to handle. Our

project is one of the solutions “Accident Alerting System using RF”.

Accident Alerting System is mainly a device that identifies the accident that has

been accrued and sends the information to the destination that may be any control room,

hospital or the victim’s home.

Page 2: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

This particular system uses radio frequency (RF) signals for its communication

from recover to trams miter i.e. from victim to the required office. Since the medium is

wireless system the cost of this system is low compared to other and also less power

consumption takes place. This accident alerting system is significantly used to help the

victims and to reduce the death rate in India.

1.3 OBJECTIVE OF THE STUDY

The main objective of our project is to save the life of the victims who met with

road accidents by providing the information of the incident to the respective destination.

Accident Alerting System, in this we use sensors to detect the occurrence of the

accident. This system consists of transmitter and receiver where vehicle is considered to

be transmitter and respective destination is considered to be receiver. Once accident

occurs it is sensed by the sensor. Then the information is sent though air (RF) to the

receiver where LCD is placed for the information display. By this process person in the

vehicle would be saved by taking precautionary actions.

All the components in this system are interfaced with each other using

microcontroller unit. It provides the logics gate inputs to the encoder circuit sends to the

receiver circuit by decoding it by using a decoder. At both ends s desired antenna is fixed

according to the frequency

1.4 LITERATURE SURVAY

EMBEDDED SYSTEMS

Embedded systems are designed to do some specific task rather than be a general-

purpose computer for multiple tasks.Some also has real time performance constraints that

must be met, for reason such as safety and usability; others may have low or no

performance requirements, allowing the system hardware to be simplified to reduce costs.

An embedded system is not always a separate block - very often it is physically

built-in to the device it is controlling.

The software written for embedded systems is often called firmware, and is stored

in read-only memory or flash convector chips rather than a disk drive. It often runs with

limited computer hardware resources: small or no keyboard, screen, and little memory.

Page 3: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Communication:

Communication refers to the sending, receiving and processing of information by

electric means. As such, it started with wire telegraphy in the early 80’s, developing with

telephony and radio some decades later. Radio communication became the most widely

used and refined through the invention of and use of transistor, integrated circuit, and

other semi-conductor devices. Most recently, the use of satellites and fiber optics has

made communication even more wide spread, with an increasing emphasis on computer

and other data communications.

A modern communications system is first concerned with the sorting, processing

and storing of information before its transmission. The actual transmission then follows,

with further processing and the filtering of noise. Finally we have reception, which may

include processing steps such as decoding, storage and interpretation. In this context,

forms of communications include radio, telephony and telegraphy, broadcast, point to

point and mobile communications (commercial and military), computer communications,

radar, radio telemetry and radio aids to navigation. It is also important to consider the

human factors influencing a particular system, since they can always affect its design,

planning and use.

Wireless communication has become an important feature for commercial

products and a popular research topic within the last ten years. There are now more

mobile phone subscriptions than wired-line subscriptions. Lately, one area of commercial

interest has been low-cost, low-power, and short-distance wireless communication used

for personal wireless networks." Technology advancements are providing smaller and

more cost effective devices for integrating computational processing, wireless

communication, and a host of other functionalities. These embedded communications

devices will be integrated into applications ranging from homeland security to industry

automation and monitoring. They will also enable custom tailored engineering solutions,

creating a revolutionary way of disseminating and processing information. With new

technologies and devices come new business activities, and the need for employees in

these technological areas. Engineers who have knowledge of embedded systems and

wireless communications will be in high demand.

Page 4: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Unfortunately, there are few adorable environments available for development

and classroom use, so students often do not learn about these technologies during hands-

on lab exercises. The communication mediums were twisted pair, optical fiber, infrared,

and generally wireless radio.

1.5 ORGANISATION OF THESIS

This thesis consists of six chapters. This chapter discuss about overview of

project, statement of the problem, objective of the study, literature survey and

organization of thesis.

Chapter 2 contains a brief description of block diagram.

Chapter 3 includes the project methodology. It will give detailed explanation

about the materials and methods used in the project. Also in this topic discusses the

methodology of the system, circuit design, software design and the mechanical design.

Chapter 4 includes the flow chart and the programming code used in the project.

Chapter 5 gives the more details about the results and the project implementation.

The last chapter contained the detailed description about conclusion and

recommendation. This chapter will conclude the whole project and give a future

recommendation to make this project perfect.

Page 5: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

PASSPORTS

A passport is a document, issued by a national government, which certifies, for

the purpose of international travel, the identity and nationality of its holder. The elements

of identity are name, date of birth, sex, and place of birth. Most often, nationality and

citizenship are congruent.

A passport does not of itself entitle the passport holder entry into another

country, nor to consular protection while abroad or any other privileges. It does, however,

normally entitle the passport holder to return to the country that issued the passport.

Rights to consular protection arise from international agreements, and the right to return

arises from the laws of the issuing country. A passport does not represent the right or the

place of residence of the passport holder in the country that issued the passport.

The terminology related to passports has become generally standardized around the

world. The typical passports include:

ORDINARY PASSPORT also called Tourist or Regular passport:

Issued to ordinary citizens

OFFICIAL PASSPORT also called Service passport:

Issued to government employees for work-related travel, and to

accompanying dependents

DIPLOMATIC PASSPORT:

Issued to diplomats and consuls for work-related travel, and to

accompanying dependents

Having a diplomatic passport is not the equivalent of having diplomatic

immunity. A grant of diplomatic status, a privilege of which is diplomatic immunity, has

to come from the government of the country in relation to which diplomatic status is

claimed. Also, having a diplomatic passport does not mean visa-free travel. A holder of a

Page 6: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

diplomatic passport usually has to obtain a diplomatic visa, even if a holder of an

ordinary passport may enter a country visa-free or may obtain a visa on arrival.

In exceptional circumstances, a diplomatic passport is given to a foreign

citizen with no passport of his own, such as an exiled VIP who lives, by invitation, in a

foreign country.

EMERGENCY PASSPORT also called Temporary passport:

Issued to persons whose passports were lost or stolen, and who do not

have time to obtain replacement passports.

COLLECTIVE PASSPORT:

Issued to defined groups for travel together to particular destinations, such

as a group of school children on a school trip to a specified country

FAMILY PASSPORT:

Issued to family members—father, mother, son, daughter. There is one

passport holder. The passport holder may travel alone or with one or more

other family members. A family member who is not the passport holder

cannot use the passport for travel unless accompanied by the passport

holder.

LAISSEZ-PASSER:

Not a full passport, but a document which serves the function of a

passport. Laissez-passer is issued by international organizations to their

officers and employees for official travel.

CERTIFICATE OF IDENTITY also called Alien's passport

Not a full passport, but a document issued under certain circumstances,

such as statelessness, to non-citizen residents. An example of this is the "Nansen

passport".

Page 7: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

In Latvia, an alien's passport is a passport for non-citizens - former

citizens of the Soviet Union who reside in Latvia, but are not entitled to citizenship. It is

used as an internal passport inside Latvia, and as a travel document outside Latvia.

REFUGEE TRAVEL DOCUMENT:

Not a full passport, but a document issued to a refugee by the state in

which she or he normally resides allowing him or her to travel outside that

state and to return there. Refugees are unlikely to be able to obtain

passports from their state of nationality (from which they have sought

asylum) and therefore need travel document so that they might engage in

international travel.

INTERNAL PASSPORT:

Not a full passport, but an identity document which keeps track of

migration within a country. Examples: The internal passport of Russia or

the hukou residence-registration system in mainland China, both dating

back to imperial times.

CAMOUFLAGE AND FANTASY PASSPORTS:

A Camouflage passport is a document that appears to be a regular passport

but is actually in the name of a country that no longer exists, never existed,

or the previous name a country that has changed its name. Companies that

sell camouflage passports make the rather dubious claim that in the event

of a hijacking they could be shown to terrorists to aid escape. There is no

known instance of this happening. Because a camouflage passport is not

issued in the name of a real country, it is not a counterfeit and is not illegal

per se to have. However attempting to use it to actually enter a country

would be illegal in most jurisdictions.

A fantasy passport is likewise a document not issued by a recognized

government and invalid for legitimate travel. Fantasy passports are

Page 8: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

distinguished from camouflage passports in that they are issued by an

actual, existent group, organization, or tribe. In some cases the goal of the

fantasy passport is to make a political statement or to denote membership

in the organization. In other cases they are issued more or less as a joke or

for novelty souvenir purposes, such as those sold as "Conch Republic"

passports.

Page 9: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

BIOMETRICS

Biometrics refers to methods for uniquely recognizing humans based upon

one or more intrinsic physical or behavioral traits. In information technology, in

particular, biometrics is used as a form of identity access management and access control.

It is also used to identify individuals in groups that are under surveillance.

Biometric characteristics can be divided in two main classes:

Physiological are related to the shape of the body. Examples include, but

are not limited to fingerprint, face recognition, DNA, hand and palm

geometry, iris recognition, which has largely replaced retina, and

odor/scent.

Behavioral are related to the behavior of a person. Examples include, but

are not limited to typing rhythm, gait, and voice. Some researchers have

coined the term behaviometrics for this class of biometrics.

It is possible to understand if a human characteristic can be used for biometrics in

terms of the following parameters

Universality – each person should have the characteristic.

Uniqueness – is how well the biometric separates individuals from

another.

Permanence – measures how well a biometric resists aging.

Collect ability – ease of acquisition for measurement.

Performance – accuracy, speed, and robustness of technology used.

Acceptability – degree of approval of a technology.

Circumvention – ease of use of a substitute.

A biometric system can provide the following two functions

Verification – Authenticates its users in conjunction with a smart card,

username or ID number. The biometric template captured is compared

Page 10: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

with that stored against the registered user either on a smart card or

database for verification.

Identification – Authenticates its users from the biometric characteristic

alone without the use of smart cards, usernames or ID numbers. The

biometric template is compared to all records within the database and a

closest match score is returned. The closest match within the allowed

threshold is deemed the individual and authenticated.

The main operations a system can perform are enrollment and test. During the

enrollment, biometric information from an individual is stored. During the test, biometric

information is detected and compared with the stored information. Note that it is crucial

that storage and retrieval of such systems themselves be secure if the biometric system is

to be robust. The first block (sensor) is the interface between the real world and the

system; it has to acquire all the necessary data. Most of the times it is an image

acquisition system, but it can change according to the characteristics desired. The second

block performs all the necessary pre-processing: it has to remove artifacts from the

sensor, to enhance the input (e.g. removing background noise), to use some kind of

normalization, etc. In the third block features needed are extracted. This step is an

important step as the correct features need to be extracted in the optimal way. A vector of

numbers or an image with particular properties is used to create a template. A template is

a synthesis of all the characteristics extracted from the source, in the optimal size to allow

for adequate identifiably.

If enrollment is being performed the template is simply stored somewhere (on a

card or within a database or both). If a matching phase is being performed, the obtained

template is passed to a matcher that compares it with other existing templates, estimating

the distance between them using any algorithm (e.g. Hamming distance). The matching

program will analyze the template with the input. This will then be output for any

specified use or purpose (e.g. entrance in a restricted area).

Hand geometry systems are commonly available in two main forms. Full hand

geometry systems take an image of the entire hand for comparison while Two Finger

Page 11: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

readers only image two fingers of the hand. Hand recognition technology is currently one

of the most deployed biometrics disciplines world wide and is used in over 46% of the

worlds Time and Attendance / Access Control solutions. Hand recognition systems are

especially useful in outdoor environments. Hand recognition templates are also extremely

small, a characteristic that makes the templates very portable. Typical templates sizes are

as small as 9 bytes.

Iris recognition is a Biometrics technology that uses a camera, much like face

recognition does, to capture an image of the Iris and then convert that image to a template

using complex algorithms and 2D Gabor Wavelets. Iris recognition is widely regarded as

the most accurate biometrics technology and is used very effectively all over the world.

The structures creating the human Iris pattern are highly advanced by the 8th month of

gestation and are complete during the first postnatal years. This makes Iris recognition

ideal for use with humans of all ages.

Iris recognition technology is safe, accurate and capable of performing 1-to-many

matches at extraordinarily high speeds, without sacrificing accuracy. Iris recognition has

also become more passive, and acquisition devices can be situated at distances of up to

10" away from the individual attempting verification. Due to its accuracy, and speed

capabilities, Iris recognition is sometimes used within the Bio MAP platform as the

primary reference biometrics technology. The primary reference biometrics technology is

that biometrics technology which performs the one-to-many search and identifies the

subject for verification by the other linked biometrics.

Face recognition is a Biometrics technology that uses an image or series of

images either from a camera or photograph to recognize a person. Unlike other

biometrics technologies, face recognition is a passive biometrics and does not require a

person’s cooperation. It can recognize people from a distance without them realizing that

they are being analyzed. Face recognition is completely oblivious to differences in

appearance as a result of race or gender differences and is a highly robust Biometrics.

This Biometrics technology has been used extensively throughout the world over the last

three to five years in industries like Banking, Gaming, Healthcare, Law enforcement,

Page 12: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Customs and excise and Retail. The technology has proven it extremely successful and is

currently the fastest growing Biometrics in the world.

The technology uses any one of a number of sophisticated algorithms and

techniques. Some technologies use an algorithm called LFA (Local Feature Analysis) to

identify and derive a representation in terms of the spatial relationships between

irreducible local features, or ‘nodal points’ on the face. Others use an approach known as

Eigen faces while some use an advanced neural network technology to recognize faces

electronically.

Fingerprint recognition is an extremely useful biometrics technology since

fingerprints have long been recognized as a primary and accurate identification method.

It is as a direct result of this recognition, that large fingerprint databases can be found

within law enforcement agencies the world over. Fingerprint technology can be used for

both verification (1:1) matching as well as for Identification (1:n) matching. Electronic

Fingerprint matching can be achieved through one of two methodologies. The first uses

the ridge endings and bifurcation's on a person’s finger to plot points known as Minutiae

(Minutiae based approach). These Minutiae allow for the comparison of two fingerprints

to be achieved electronically. The second methodology uses a pattern based approached.

This comparison technique (Pattern based) is performed in two fundamental blocks:

Image Enhancement and Distortion Removal. In each instance that a finger is applied to a

fingerprint device, the ridge pattern exhibits a different degree of distortion. The key to

accurate comparison of the ridge pattern is the ability to ascertain and then remove the

relative distortion between the fingerprint template and the candidate fingerprint image.

In a recent competition, one Pattern based technology outperformed almost all other

technologies to take top honors.

Fingerprint technology is available as an option on all of our products and can be

used either stand-alone, or in conjunction with our Face recognition, Iris recognition

and/or Hand Geometry technologies. The Biocom fingerprint systems integrate into our

Bio MAP platform seamlessly and perform exceptionally well when used in a Multi-

Modal configuration with other biometrics technologies.

Page 13: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

CHAPTER-2

BLOCK DIAGRAM

ATMEGA162

FEATURES:

High-performance, Low-power AVR 8-bit Microcontroller

Advanced RISC Architecture

– 131 Powerful Instructions – Most Single-clock Cycle Execution

– 32 x 8 General Purpose Working Registers

– Fully Static Operation

– Up to 16 MIPS Throughput at 16 MHz

– On-chip 2-cycle Multiplier

Non-volatile Program and Data Memories

– 16K Bytes of In-System Self-programmable Flash

ATMEGA 162

LCD

KEYPAD

MAX 232

OP-69(FINGER PRINT

MODULE)

RFID READER

GREEN LED

RED LED & BUZZER

AT24C08

Page 14: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Endurance: 1,000 Write/Erase Cycles

Endurance: 10,000 Write/Erase Cycles for ATmega16

– Optional Boot Code Section with Independent Lock Bits

In-System Programming by On-chip Boot Program True Read-While-

Write Operation

– 512 Bytes EEPROM

Endurance: 100,000 Write/Erase Cycles

– 1K Bytes Internal SRAM

– Programming Lock for Software Security

Peripheral Features

– Two 8-bit Timer/Counters with Separate Prescalers and Compare Modes

One 16-bit Timer/Counter with Separate Prescaler, Compare Mode, and

Capture Mode

– Real Time Counter with Separate Oscillator

– Six PWM Channels

– Dual Programmable Serial USART’s

– Master/Slave SPI Serial Interface

– Programmable Watchdog Timer with Separate On-chip Oscillator

– On-chip Analog Comparator

Special Microcontroller Features

– Power-on Reset and Programmable Brown-out Detection

– Internal Calibrated RC Oscillator

– External and Internal Interrupt Sources

– Five Sleep Modes: Idle, ADC Noise Reduction, Power-save, Power-down,

Standby and Extended Standby

I/O and Packages

– 35 Programmable I/O Lines

– 40-pin PDIP, 44-lead TQFP, and 44-pad MLF

Operating Voltages

– 1.8 - 3.6V for ATmega162V

– 2.4 - 4.0V for ATmega162U

Page 15: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

– 2.7 - 5.5V for ATmega16L

– 4.5 - 5.5V for ATmega16

Speed Grades

– 0 - 1 MHz for ATmega162V

– 0 - 8 MHz for ATmega16L/U

– 0 - 16 MHz for ATmega16

OVERVIEW:

The ATmega162 is a low-power CMOS 8-bit microcontroller based on the AVR

enhanced RISC architecture. By executing powerful instructions in a single clock cycle,

the ATmega162 achieves throughputs approaching 1 MIPS per MHz allowing the system

designer to optimize power consumption versus processing speed.

Page 16: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

BLOCK DIAGRAM:

PIN CONFIGURATIONS

Page 17: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

PIN CONFIGURATION:

PIN DESCRIPTIONS:

VCC:

Digital supply voltage

GND:

Ground

PORT A (PA7…PA0):

Port A is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for

each bit). The Port A output buffers have symmetrical drive characteristics with both high

sink and source capability. When pins PA0 to PA7 are used as inputs and are externally

pulled low, they will source current if the internal pull-up resistors are activated. The

PortA pins are tri-stated when a reset condition becomes active, even if the clock is not

running. Port A also serves the functions of various special features of the ATmega162.

Page 18: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

PORT B (PB7…PB0):

Port B is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for

each bit). The Port B output buffers have symmetrical drive characteristics with both high

sink and source capability. As inputs, Port B pins that are externally pulled low will

source current if the pull-up resistors are activated. The Port B pins are tri-stated when a

reset condition becomes active, even if the clock is not running. Port B also serves the

functions of various special features of the ATmega162.

PORT C (PC7…PC0):

Port C is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for

each bit). The Port C output buffers have symmetrical drive characteristics with both high

sink and source capability. As inputs, Port C pins that are externally pulled low will

source current if the pull-up resistors are activated. The Port C pins are tri-stated when a

reset condition becomes active, even if the clock is not running. If the JTAG interface is

enabled, the pull-up resistors on pins PC5 (TDI), PC3 (TMS) and PC2 (TCK) will be

activated even if a reset occurs. Port C also serves the functions of the JTAG interface

and other special features of the ATmega16

PORT D (PD7…PD0):

Port D is an 8-bit bi-directional I/O port with internal pull-up resistors (selected for

each bit). The Port D output buffers have symmetrical drive characteristics with both high

sink and source capability. As inputs, Port D pins that are externally pulled low will

source current if the pull-up resistors are activated. The Port D pins are tri-stated when a

reset condition becomes active, even if the clock is not running. Port D also serves the

functions of various special features of the ATmega162.

PORT E (PE2...PE0):

Port E is a 3-bit bi-directional I/O port with internal pull-up resistors (selected for

each bit). The Port E output buffers have symmetrical drive characteristics with both high

sink and source capability. As inputs, Port E pins that are externally pulled low will

source current if the pull-up resistors are activated. The Port E pins are tri-stated when a

reset condition becomes active, even if the clock is not running. Port E also serves the

functions of various special features of the ATmega162

Page 19: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

RESET:

Reset Input. A low level on this pin for longer than the minimum pulse length will

generate a reset, even if the clock is not running. Shorter pulses are not guaranteed to

generate a reset.

XTAL1:

Input to the inverting Oscillator amplifier and input to the internal clock operating

circuit.

XTAL2:

Output from the inverting Oscillator amplifier

USART:

The Universal Synchronous and Asynchronous serial Receiver and Transmitter

(USART) is a highly flexible serial communication device. The main features are:

Full Duplex Operation (Independent Serial Receive and Transmit Registers)

Asynchronous or Synchronous Operation

Master or Slave Clocked Synchronous Operation

High Resolution Baud Rate Generator

Supports Serial Frames with 5, 6, 7, 8, or 9 Data Bits and 1 or 2 Stop Bits

Odd or Even Parity Generation and Parity Check Supported by Hardware

Data Over Run Detection

Framing Error Detection

Noise Filtering Includes False Start Bit Detection and Digital Low Pass Filter

Three Separate Interrupts on TX Complete, TX Data Register Empty, and RX

Complete

Multi-processor Communication Mode

Double Speed Asynchronous Communication Mode

DUAL USART:

The ATmega162 has two USART’s, USART0 and USART1. The

functionality for both USART’s is described below. USART0 and USART1 have

Page 20: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

different I/O Registers. Note that in ATmega161 compatibility mode, the double

buffering of the USART Receive Register is disabled. Note also that the shared UBRRHI

Register in ATmega161 has been split into two separate registers, UBRR0H and

UBRR1H, in ATmega162.

OVERVIEW:

A simplified block diagram of the USART transmitter is shown in Figure below.

CPU accessible I/O Registers and I/O pins are shown in bold.

AVR USART vs. AVR UART – COMPATIBILITY

The USART is fully compatible with the AVR UART regarding:

Bit locations inside all USART Registers

Baud Rate Generation

Transmitter Operation

Transmit Buffer Functionality

Receiver Operation

However, the receive buffering have two improvements that will affect the

compatibility in some special cases:

A second buffer register has been added. The two buffer registers operate as a

circular FIFO buffer. Therefore the UDR must only be read once for each incoming

data! More important is the fact that the error flags (FE and DOR) and the 9th data bit

(RXB8) are buffered with the data in the receive buffer. Therefore the status bits must

always be read before the UDR Register is read. Otherwise the error status will be lost

since the buffer state is lost.

The receiver Shift Register can now act as a third buffer level. This is done by

allowing the received data to remain in the serial Shift Register if the buffer

registers are full, until a new start bit is detected. The USART is therefore more

resistant to Data Over Run (DOR) error conditions.

The following control bits have changed name, but have same functionality and

register location:

CHR9 is changed to UCSZ2

Page 21: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

OR is changed to DOR

CLOCK GENERATION

The clock generation logic generates the base clock for the Transmitter and

Receiver. The USART supports four modes of clock operation: Normal Asynchronous,

Double Speed Asynchronous, Master Synchronous and Slave Synchronous mode. The

UMSEL bit in USART Control and Status Register C (UCSRC) selects between

asynchronous and synchronous operation. Double Speed (Asynchronous mode only) is

controlled by the U2X found in the UCSRA Register. When using Synchronous mode

(UMSEL = 1), the Data Direction Register for the XCK pin (DDR_XCK) controls

whether the clock source is internal (Master mode) or external (Slave mode). The XCK

pin is only active when using Synchronous mode. Figure below shows a block diagram of

the clock generation logic.

Page 22: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

RFID

The first disturbing fact is that RFID is not a new technology. It was first used

over sixty years ago by Britain to identify aircraft in World War II and was part of the

refinement of radar. It was during the 1960s that RFID was first considered as a solution

for the commercial world. The first commercial applications involving RFID followed

during the 70s and 80s. These commercial applications were concerned with identifying

some asset inside a single location. They were based on proprietary infrastructures.

The third era of RFID started in 1998, when researchers at the Massachusetts

Institute of Technology (MIT) Auto ID Center began to research new ways to track and

identify objects as they moved between physical locations. This research which has a

global outlook, centered on radio frequency technology and how information that is held

on tags can be effectively scanned and shared with business partners in near real time.To

do this we needed standards. The work of the Auto ID Center focused on:

Reducing the cost of manufacturing RFID tags.

Optimizing data networks for storing and delivering larger amounts of data.

Developing open standards.

Radio-frequency-identification (RFID) is an automatic identification method,

relying on storing and remotely retrieving data using devices called RFID tags or

transponders. The technology requires some extent of cooperation of an RFID reader and

an RFID tag.

An RFID tag is an object that can be applied to or incorporated into a product,

animal, or person for the purpose of identification and tracking using radio waves. Some

tags can be read from several meters away and beyond the line of sight of the reader.

Most RFID tags contain at least two parts. One is an integrated circuit for storing and

processing information, modulating and demodulating a radio-frequency (RF) signal, and

other specialized functions. The second is an antenna for receiving and transmitting the

signal.

Page 23: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Future Chip less RFID allows for discrete identification of tags without an

integrated circuit, thereby allowing tags to be printed directly onto assets at a lower cost

than traditional tags. Currently none of the chip less concepts has become operational.

Today, RFID is used in enterprise supply chain management to improve the efficiency of

inventory tracking and management.

RFID is an identification technology. It holds data you can access by using a

reader. RFID uses radio technology. RFID (Radio Frequency Identification) is best

described as a wireless memory chip. Today RFID is the most intelligent technology for

managing and collecting a product's data or tracking it as it moves through the supply

chain. RFID technology has been used in various applications for many years, but now

chips are getting smaller and tags cheaper. With new applications developing, the

benefits are undeniable.

No single RFID transponder technology is ideal for implementation in all areas.

Different frequency bands are better suited for specific applications. When selecting the

proper solution, the following issues should be taken into consideration.

Geographical region

Regional regulatory requirements

General performance characteristics

Application requirements

Two frequency ranges are generally distinguished for smart RFID systems, High

Frequency (HF) 13.56 MHz and Ultra High Frequency (UHF) 860-956 MHz. SATO can

support the encoding requirements for both Wal-Mart and Metro following the general

epic and ISO regulations.

This plays a major work in some applications like:

If this RFID is implemented in a library as the RFID tag can contain identifying

information, such as a book's title or material type without having to be pointed to a

separate database. The information is read by an RFID reader, which replaces the

standard barcode reader commonly found at a library's circulation desk. It may replace or

be added to the barcode, offering a different means of inventory management by the staff

and self service by the borrowers. It can also act as a security device, taking the place of

Page 24: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

the more traditional electromagnetic security strip and not only the books, but also the

membership cards could be fitted with an RFID tag.

The scenarios focus on a bicycle manufacturer that produces high-end bicycles for

the global market. All parts are purchased from vendors, except for the frames, which are

made in-house from raw steel pipe. The description shows the potential of RFID to

deliver benefits at every stage of the supply chain as the bikes are assembled, distributed

to retailers, and finally sold to customers.

Page 25: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

LCD

A liquid crystal display (LCD) is a thin, flat panel used for electronically

displaying information such as text, images, and moving pictures. Its uses include

monitors for computers, televisions, instrument panels, and other devices ranging from

aircraft cockpit displays, to every-day consumer devices such as video players, gaming

devices, clocks, watches, calculators, and telephones. Among its major features are its

lightweight construction, its portability, and its ability to be produced in much larger

screen sizes than are practical for the construction of cathode ray tube (CRT) display

technology. Its low electrical power consumption enables it to be used in battery-powered

electronic equipment. It is an electronically-modulated optical device made up of any

number of pixels filled with liquid crystals and arrayed in front of a light source

(backlight) or reflector to produce images in color or monochrome. The earliest discovery

leading to the development of LCD technology, the discovery of liquid crystals, dates

from 1888. By 2008, worldwide sales of televisions with LCD screens had surpassed the

sale of CRT units.

PIN DESCRIPTION:

Page 26: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

PIN DESCRIPTION:

PIN SYMBOL I/O DESCRIPTION

1 VSS -- Ground

2 VCC -- +5V power supply

3 VEE -- Power supply to control contrast

4 RS I RS=0 to select command register

RS=1 to select data register

5 R/W I R/W=0 for write

R/W=1 for read

6 EN I/O Enable

7 DB0 I/O The 8-bit data bus

8 DB1 I/O The 8-bit data bus

9 DB2 I/O The 8-bit data bus

10 DB3 I/O The 8-bit data bus

11 DB4 I/O The 8-bit data bus

12 DB5 I/O The 8-bit data bus

13 DB6 I/O The 8-bit data bus

14 DB7 I/O The 8-bit data bus

LCD COMMAND CODES:

CODE (HEX) COMMAND TO LCD INSTRUCTION REGISTER

1 CLEAR DISPLAY SCREEN

2 RETURN HOME

4 DECREMENT CURSOR(SHIFT CURSOR TO LEFT)

6 INCREMENT CURSOR(SHIFT CURSOR TO RIGHT)

5 SHIFT DISPLAY RIGHT

7 SHIFT DISPLAY LEFT

8 DISPLAY OFF,CURSOR OFF

A DISPLAY OFF,CURSOR ON

Page 27: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

C DISPLAY ON,CURSOR OFF

E DISPLAY ON CURSOR BLINKING

F DISPLAY ON CURSOR BLINKING

10 SHIFT CURSOR POSITION TO LEFT

14 SHIFT CURSOR POSITION TO RIGHT

18 SHIFT THE ENTIRE DISPLAY TO THE LEFT

1C SHIFT THE ENTIRE DISPLAY TO THE RIGHT

80 FORCE CURSOR TO BEGINNING OF 1ST LINE

C0 FORCE CURSOR TO BEGINNING OF 2ND LINE

38 2 LINES AND 5x7 MATRIX

ADVANTAGES:

LCD interfacing with 8051 is a real-world application. In recent years the LCD is

finding widespread use replacing LED’s (seven segment LED’s or other multi segment

LED’s).

This is due to following reasons:

The declining prices of LCD’s.

The ability to display numbers, characters and graphics. This is in contrast to

LED’s, which are limited to numbers and a few characters. An intelligent LCD

displays two lines, 20 characters per line, which is interfaced to the 8051.

Incorporation of a refreshing controller into the LCD, thereby relieving the CPU

to keep displaying the data.

Ease of programming for characters and graphics.

Page 28: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

LIGHT EMITTING DIODE

A light-emitting diode (LED) is a semiconductor diode that emits incoherent

narrow spectrum light when electrically biased in the forward direction of the pn-

junction, as in the common LED circuit. This effect is a form of electroluminescence.

Like a normal diode, the LED consists of a chip of semi-conducting material

impregnated, or doped, with impurities to create a p-n junction. As in other diodes,

current flows easily from the p-side, or anode, to the n-side, or cathode, but not in the

reverse direction. Charge-carriers—electrons and holes—flow into the junction from

electrodes with different voltages. When an electron meets a hole, it falls into a lower

energy level, and releases energy in the form of a photon.

The wavelength of the light emitted, and therefore its color, depends on the band

gap energy of the materials forming the p-n junction. In silicon or germanium diodes, the

electrons and holes recombine by a non-radiative transition which produces no optical

emission, because these are indirect band gap materials. The materials used for the LED

have a direct band gap with energies corresponding to near-infrared, visible or near-

ultraviolet light.

Page 29: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

LED development began with infrared and red devices made with gallium

arsenide. Advances in materials science have made possible the production of devices

with ever-shorter wavelengths, producing light in a variety of colors.

LEDs are usually built on an n-type substrate, with an electrode attached to the p-

type layer deposited on its surface. P-type substrates, while less common, occur as well.

Many commercial LEDs, especially GaN/InGaN, also use sapphire substrate.

Most materials used for LED production have very high refractive indices. This

means that much light will be reflected back in to the material at the material/air surface

interface. Therefore Light extraction in LEDs is an important aspect of LED production,

subject to much research and development.

Solid state devices such as LEDs are subject to very limited wear and tear if

operated at low currents and at low temperatures. Many of the LEDs produced in the

1970s and 1980s are still in service today. Typical lifetimes quoted are 25,000 to 100,000

hours but heat and current settings can extend or shorten this time significantly.

Conventional LEDs are made from a variety of inorganic semiconductor

materials; the following table shows the available colors with wavelength range and

voltage drop.

ADVANTAGES OF LEDS:

LED’s have many advantages over other technologies like lasers. As compared to

laser diodes or IR sources

LED’s are conventional incandescent lamps. For one thing, they don't have a

filament that will burn out, so they last much longer. Additionally, their small

plastic bulb makes them a lot more durable. They also fit more easily into modern

electronic circuits.

The main advantage is efficiency. In conventional incandescent bulbs, the light-

production process involves generating a lot of heat (the filament must be

warmed). Unless you're using the lamp as a heater, because a huge portion of the

available electricity isn't going toward producing visible light.

Page 30: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

LED’s generate very little heat. A much higher percentage of the electrical power

is going directly for generating light, which cuts down the electricity demands

considerably.

LED’s offer advantages such as low cost and long service life. Moreover LED’s

have very low power consumption and are easy to maintain.

DISADVANTAGES OF LEDS:

LED’s performance largely depends on the ambient temperature of the operating

environment.

LED’s must be supplied with the correct current.

LED’s do not approximate a "point source" of light, so cannot be used in

applications needing a highly collimated beam.

But the disadvantages are quite negligible as the negative properties of LED’s do

not apply and the advantages far exceed the limitations.

Page 31: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

OP-69 FINGERPRINT INTEGRATED MODULE

OP-69 is the fingerprint module for secondary development which has integrated

fingerprint Collecting and single chip processor together. It features small size, low

power consumption, simple ports, high reliability, small fingerprint template (512bytes),

large fingerprint capacity, etc. It is convenient to be embedded to user system for

realizing clients required fingerprint verification products. OP-69 outstandingly features

self-learning function. During the fingerprint verification process, the latest collected

fingerprint features would be integrated into the fingerprint database automatically so that

the users would obtain better and better fingerprint verification result. SM Series module

is UART communication interface with adjustable safety level function, fingerprint data

reading & writing function, 1: N and 1:1 verification function.

MAIN FUNCTIONS:

Communication interface :UART

Optic sensor is reliable and Low-cost, High ESD Protection

1:N Identification (One-to-Many)

1:1 Verification (One-to-One)

High speed fingerprint identification algorithm engine

Self study function

Fingerprint template data read from /write to FLASH memory function

Get Feature Data of Captured fingerprint and Verify/Identify Downloaded Feature

with Captured fingerprint(Specially designed for fingerprint stored in IC card)

Identify Downloaded Feature with Captured fingerprint

Security Level setting

Able to set Baud Rate / Device ID/Device Password

APPLICATIONS:

Page 32: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Access control systems

Time & Attendance

Locks, safes

POS, handheld terminals

HARDWARE FEATURES:

CONNECTOR SIGNAL DESCRIPTION:

Page 33: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

1. Module Tx : Transmit Output 3.3V TTL Logic

2. Module Rx : Receive Input 3.3V TTL Logic

Page 34: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

3. GND : GND

4. DC3.3V : Power Supply DC3.3V±5%

Note: Module power supply is DC3.3V, UART Port is 3.3V TTL

MODULE TECHNICAL PARAMETERS:

DEFAULT FACTORY SETTINGS:

COMMAND MODE USER’S GUIDE:

Page 35: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

The module is used as a slave device. The Master device sends relative commands

to control it. The CMD sent by the master and the ACK signal returned by the module.

Command interface : UART (Universal Asynchronous Receiver Transmitter)

115200bps 1 start-bit 1 stop-bit (no check bit)

THE PROCESS OF COMMUNICATION:

CLASSIFY OF COMMUNICATION PACKET:

COMMAND PACKET

Command Packet is the instruction from Host to Target (OP-69), Total length of

the command packet is 24 Bytes

Page 36: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

RESPONSE PACKET

Response packet is result of execute command packet, from Target (OP-69) to

Host, Total length of the command packet is 24 Bytes

DATA PACKET

When length of Command Parameter or Data is larger than 16 Bytes, Utilize Data

Packet to transmit block Data, the maximum length of Data Packet is 512Bytes

PACKET STRUCTURE:

PACKET IDENTIFY CODE

Section start 2byte prefix define type of packet

STRUCTURE OF COMMAND PACKET

RESPONSE PACKET

Page 37: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

COMMAND DATA PACKET

Before send Command Data packet, Host first send Command packet which set

the length of next command data packet in Data Field

RESPONSE DATA PACKET

Page 38: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

STRUCTURE OF FINGERPRINT TEMPLATE DATA:

Template Data(496Bytes) + Check Sum(2Bytes) = 498Bytes

Page 39: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

RADIO FREQUENCY IDENTIFICATION (RFID)

Radio frequency identification (RFID) in a variety of ways including automatic

identification and data capture (AIDC) solutions. We pride ourselves in providing

customers with inexpensive RFID solutions that integrate well with other systems.

RFID Reader Module, are also called as interrogators. They convert radio waves

returned from the RFID tag into a form that can be passed on to Controllers, which can

make use of it. RFID tags and readers have to be tuned to the same frequency in order to

communicate. RFID systems use many different frequencies, but the most common and

widely used & supported by our Reader is 125 KHz.

The reader has been designed as a Plug & Play Module and can be plugged

on a Standard 300 MIL-28 Pin IC socket form factor.

FUNCTIONS:

Page 40: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

1. Supports reading of 64 Bit Manchester Encoded cards

2. Pins for External Antenna connection

3. Serial Interface (TTL)

4. Wigand Interface also available

5. Customer application on request

TECHNICAL DATA:

Frequency : 125 kHz

Read Range : up to 8 cm

Power supply : 5V DC ( ± 5 %)

Current consumption max. : 60 mA

Operating temperature : -20 ... +65° C

Storing temperature : -40 ... +75° C

Interface : RS232 ( TTL),Wiegand and others (on Demand)

Dimensions (l x w x h) : 36 x 18 x 10 mm

Serial Interface Format : 9600Baud, No Parity, 8 Data bits,1 Stop bit

Note: The TTL RS-232 Interface can not be connected directly to a PC COM port.

Therefore the signal must be converted to RS 232 level for PC connection.

This Firmware has the following Functions:

Read Tag-ID

Send Tag-ID in ASCII Format through the Serial/ Wiegand Interface.

Sequence starts with Tag ID follows from Carriage-Return/Line-Feed (0Dh 0Ah),

Example: '041201938C<CR><LF>'

RFID 125 Reader Module PIN Diagram:

Page 41: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

PIN NO. SIGNAL DESCRIPTION

6  TxD Transmit data (TTL level) output from

module to serial interface

4 Wiegand DATA HIGH

( available in Wiegand ) It will give DATA HIGH signal.

8  RxD Receive data (TTL level) input to the

module from serial interface

14

 LED ( active low)

(available in RS 232 )

 Wiegand DATA LOW

( available in Wiegand )

 LED will glow for 280 ms when tag is

detected

 It will give DATA LOW signal.

12  Buzzer (active low) Buzzer will buzz for 280 ms when tag is

detected

Note:

Reader module has to be mounted on non-metallic surface, else it may affect the

operation of reader.

1. Buzzer & LED are Active low signals.

Page 42: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

2. For Buzzer & LED current limiting Resister has to be mounted. MAX current is

20mA. (470 or 510 ohms for LED and 240 or 270 Ohms for Buzzer)

3. LED’s Anode and Buzzer’s Positive marked pin to be connected to Vcc.

4. Wiegand out put format is also available in select readers.

APPLICATIONS:

RFID readers can be used for Access control, Time & Attendance, Vending

machines, industrial and other applications where Reading the data from the Card only is

required.

Page 43: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

4X4 KEYPAD

A keypad is a set of buttons arranged in a block or "pad" which usually bear

digits and other symbols and usually a complete set of alphabetical letters. If it mostly

contains numbers then it can also be called a numeric keypad. Keypads are found on

many alphanumeric keyboards and on other devices such as calculators, push-button

telephones, combination locks, and digital door locks, which require mainly numeric

input.

There are many methods depending on how you connect your keypad with your

controller, but the basic logic is same. We make the coloums as I/p and we drive the rows

making them o/p, this whole procedure of reading the keyboard is called scanning.

In order to detect which key is pressed from the matrix, we make row lines

low one by one and read the coloums. Let’s say we first make Row1 low, and then read

the columns. If any one of the key in row1 is pressed it will make the corresponding

column as low i.e. if second key is pressed in Row1, then the column2 will be low. So we

come to know that key 2 of Row1 is pressed. This is how scanning is done.

INTERFACING THE KEYBOARD TO THE MICROCONTROLLER:

At the lowest level, keyboards are organized in a matrix of rows and columns.

The CPU accesses both rows and columns through ports; therefore, with two 8-bit ports,

an 8x8 matrix of keys can be connected to a microprocessor. When a key is pressed, a

row and a column make a contact; otherwise, there is no connection between rows and

columns. In IBM PC keyboards, a single microcontroller (consisting of a microprocessor,

RAM and EPROM, and several PORTS all on a single chip) takes care of hardware and

Page 44: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

software interfacing of the keyboard, in such systems, it is the function of programs

stored in the EPROM of the microcontroller to scan the keys continuously, identify which

one has been activated, and present it to the motherboard. In this section we look at the

mechanism by which the microcontroller scans and identifies the key.

SCANNING AND IDENTIFYING THE KEY:

Fig shows a 4x4 matrix connected to two ports. The rows are connected to an

output port and the columns are connected to an input port. If no key has been pressed,

reading the input port will yield 1s for all columns since they are all connected to high

(Vcc). If all the rows are grounded and a key is pressed, one of the columns will have 0

since the pressed provides the path to ground. It is the function of the microcontroller to

scan the keyboard continuously to detect and identify the key pressed. How it is done is

explained next.

GROUNDING ROWS AND READING THE COLUMNS:

To detect a pressed key, the microcontroller grounds all rows by providing 0 to

the output latch, and then it reads the columns. If the data read from the columns is D3-

D0=1111, no key has been pressed and the process continues until a key press is detected.

Page 45: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

However, if one of the column bits has a 0, this means that a key press has occurred. For

Example, if D3-D0=1101, this means that a key in the D1 column has been pressed. After

a key press is detected the microcontroller will go through the process of identifying the

key. Starting with the top row, the microcontroller grounds it by providing a low to row

D0 only; then it reads the columns. If the data reads is all 1s, no key in that row is

activated and the process is moved to the next row. It grounds the next row, reads the

columns, and checks for any 0. This process continues until the row is identified. After

identification of the row in which the key has been pressed, the next task is to find out

which column the pressed key belongs to. This should be easy since the microcontroller

knows at any time which row and column are being accessed.

THE PROCESS OF SCANNING A KEY GOES THROUGH THE

FOLLOWING 4 STEPS:

1. To make sense that the preceding key has been released, 0’s are output to all rows at

once and the columns are read and checked repeatedly until all the columns are high.

When all columns are found to be high, the program waits for a short amount of time

before it goes to the next stage of waiting for a key to be pressed.

2. To see if any key is pressed, the columns scanned over and over in an infinite loop

until one of them has a zero (0) on it. Remember that the output latches connected to

rows still have their initial zero’s making them grounded. After the key press detection it

waits 20ms for bounce and then scans the columns again. This serves two functions

It ensures that the first key detection was not an erroneous one due to a spike

noise and

The 20ms delay prevents the same key press from being interpreted as a multiple

key press .If after 20 ms delay the key is still pressed, it goes to the next stage to

detect which row it belongs to ;otherwise it goes back in to the loop to detect a

read key press.

3. To detect which row the key press belongs to, it grounds one row at a time reading the

column search time .If it finds that all columns are high this means that the key press does

not belongs to the row, therefore it grounds the next row and continues until it finds the

Page 46: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

row key press belongs to, it sets up the starting address for the look up table holding the

scan codes for that row and goes to The next stage to identify the key.

4. To identify the key press, it rotates the column bits one bit at a time in to the carry flag

and check to see if it is low. Upon finding the zero, it pulls out the (ASCII code)

character for that key from the look up table. Otherwise it increments the pointer to point

to the next element of the look up table.

Page 47: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

MAX232

FEATURES:

Operates From a Single 5-V Power Supply With 1.0-_F Charge-Pump Capacitors

Operates Up To 120 kbit/s

Two Drivers and Two Receivers

±30-V Input Levels

Low Supply Current . . . 8 mA Typical

ESD Protection Exceeds JESD 22

– 2000-V Human-Body Model (A114-A)

Upgrade With Improved ESD (15-kV HBM) and 0.1-_F Charge-Pump Capacitors

is Available With the MAX202

Applications

– TIA/EIA-232-F, Battery-Powered Systems, Terminals, Modems, and

Computers

PIN CONFIGURATION

DESCRIPTION:

The MAX232 is a dual driver/receiver that includes a capacitive voltage generator

to supply TIA/EIA-232-F voltage levels from a single 5-V supply. Each receiver converts

Page 48: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

TIA/EIA-232-F inputs to 5-V TTL/CMOS levels. These receivers have a typical

threshold of 1.3 V, a typical hysteresis of 0.5 V, and can accept +/-30-V inputs. Each

driver converts TTL/CMOS input levels into TIA/EIA-232-F levels.

LOGIC DIAGRAM (POSITIVE LOGIC)

MAX232:

The MAX232 is an integrated circuit that converts signals from an RS-232 serial

port to signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a

dual driver/receiver and typically converts the RX, TX, CTS and RTS signals.

The drivers provide RS-232 voltage level outputs (approx. ± 7.5 V) from a

single + 5 V supply via on-chip charge pumps and external capacitors. This makes it

useful for implementing RS-232 in devices that otherwise do not need any voltages

outside the 0 V to + 5 V range, as power supply design does not need to be made more

complicated just for driving the RS-232 in this case.

The receivers reduce RS-232 inputs (which may be as high as

± 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of 1.3 V,

and a typical hysteresis of 0.5 V.

The later MAX232A is backwards compatible with the original

MAX232 but may operate at higher baud rates and can use smaller external capacitors –

0.1 μF in place of the 1.0 μF capacitors used with the original device.

RS232:

In telecommunications, RS-232 (Recommended Standard 232) is a standard for

serial binary data signals connecting between a DTE (Data Terminal Equipment) and a

Page 49: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

DCE (Data Circuit-terminating Equipment). It is commonly used in computer serial

ports.

A charge pump is a kind of DC to DC converter that uses capacitors as

energy storage elements to create either a higher or lower voltage power source. Charge

pump circuits are capable of high efficiencies, sometimes as high as 90-95% while being

electrically simple circuits.

Charge pumps use some form of switching device(s) to control the connection of

voltages to the capacitor. For instance, to generate a higher voltage, the first stage

involves the capacitor being connected across a voltage and charged up. In the second

stage, the capacitor is disconnected from the original charging voltage and reconnected

with its negative terminal to the original positive charging voltage. Because the capacitor

retains the voltage across it (ignoring leakage effects) the positive terminal voltage is

added to the original, effectively doubling the voltage. The pulsing nature of the higher

voltage output is typically smoothed by the use of an output capacitor.

This is the charge pumping action, which typically operates at tens of

kilohertz up to several megahertz to minimize the amount of capacitance required. The

capacitor used as the charge pump is typically known as the "flying capacitor".

Another way to explain the operation of a charge pump is to consider it as

the combination of a DC to AC converter (the switches) followed by a voltage multiplier.

The voltage is load-dependent; higher loads result in lower average

voltages. Charge pumps can double voltages, triple voltages, halve voltages, invert

voltages, fractionally multiply or scale voltages such as x3/2, x4/3, x2/3, etc. and generate

arbitrary voltages, depending on the controller and circuit topology.

The term 'charge pump' is also used in phase-locked loop (PLL)

circuits. This is a completely different application. In a PLL the phase difference between

the reference signal (often from a crystal oscillator) and the output signal is translated

into two signals - UP and DN. The two signals control switches to steer current into or

out of a capacitor, causing the voltage across the capacitor to increase or decrease. In

each cycle, the time during which the switch is turned on is proportional to the phase

difference, hence the charge delivered is dependent on the phase difference also. The

capacitor acts to smooth out abrupt changes on the voltage and to ensure the PLL's

Page 50: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

closed-loop stability. The voltage on the capacitor is used to tune a voltage-controlled

oscillator (VCO), generating the desired output signal frequency. The charge pump in a

PLL design is constructed in integrated-circuit (IC) technology, consisting of pull-up,

pull-down transistors and on-chip capacitors and resistors.

Page 51: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

AT24C08

FEATURES:

Low-voltage and Standard-voltage Operation

– 2.7 (VCC = 2.7V to 5.5V)

– 1.8 (VCC = 1.8V to 5.5V)

Internally Organized 128 x 8 (1K), 256 x 8 (2K), 512 x 8 (4K), 1024 x 8 (8K) or

2048 x 8 (16K)

2-wire Serial Interface

Schmitt Trigger, Filtered Inputs for Noise Suppression

Bi-directional Data Transfer Protocol

100 kHz (1.8V, 2.5V, 2.7V) and 400 kHz (5V) Compatibility

Write Protect Pin for Hardware Data Protection

8-byte Page (1K, 2K), 16-byte Page (4K, 8K, 16K) Write Modes

Partial Page Writes are Allowed

Self-timed Write Cycle (10 ms max)

High-reliability

– Endurance: 1 Million Write Cycles

– Data Retention: 100 Years

Automotive Grade and Extended Temperature Devices Available

8-lead PDIP, 8-lead JEDEC SOIC, 8-lead MAP and 8-lead TSSOP Packages.

DESCRIPTION:

The AT24C01A/02/04/08/16 provides 1024/2048/4096/8192/16384 bits of serial

electrically erasable and programmable read-only memory (EEPROM) organized as

128/256/512/1024/2048 words of 8 bits each. The device is optimized for use in many

industrial and commercial applications where low-power and low-voltage operation are

essential. The AT24C01A/02/04/08/16 is available in space-saving 8-pin PDIP, 8-lead

JEDEC SOIC, 8-lead MAP and 8-lead TSSOP packages and is accessed via a 2-wire

serial interface. In addition, the entire family is available in 2.7V (2.7V to 5.5V) and 1.8V

(1.8V to 5.5V) versions.

Page 52: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

PIN CONFIGURATION

PIN DESCRIPTION:

SERIAL CLOCK (SCL):

The SCL input is used to positive edge clock data into each EEPROM device and

negative edge clock data out of each device.

SERIAL DATA (SDA):

The SDA pin is bi-directional for serial data transfer. This pin is open-drain

driven and may be wire-ORed with any number of other open-drain or open collector

devices.

DEVICE/PAGE ADDRESSES (A2, A1 and A0):

The A2, A1 and A0 pins are device address inputs that are hard wired for

the AT24C01A and the AT24C02. As many as eight 1K/2K devices may be addressed on

a single bus system. The AT24C04 uses the A2 and A1 inputs for hard wire addressing

and a total of four 4K devices may be addressed on a single bus system. The A0 pin is a

no connect. The AT24C08 only uses the A2 input for hardwire addressing and a total of

two 8K devices may be addressed on a single bus system. The A0 and A1 pins are no

connects. The AT24C16 does not use the device address pins, which limits the number of

devices on a single bus to one. The A0, A1 and A2 pins are no connects.

WRITE PROTECT (WP):

The AT24C01A/02/04/16 has a Write Protect pin that provides hardware data

protection. The Write Protect pin allows normal read/write operations when connected to

ground (GND).

Page 53: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

DEVICE OPERATION CLOCK AND DATA TRANSITIONS:

The SDA pin is normally pulled high with an external device. Data on the SDA

pin may change only during SCL low time. Data changes during SCL high periods will

indicate a start or stop condition as defined below.

START CONDITION:

A high-to-low transition of SDA with SCL high is a start condition which must

precede any other command.

STOP CONDITION:

A low-to-high transition of SDA with SCL high is a stop condition. After a read

sequence, the stop command will place the EEPROM in a standby power mode.

ACKNOWLEDGE:

All addresses and data words are serially transmitted to and from the EEPROM in

8-bit words. The EEPROM sends a zero to acknowledge that it has received each word.

This happens during the ninth clock cycle.

STANDBY MODE:

The AT24C01A/02/04/08/16 features a low-power standby mode which is

enabled:

(a) upon power-up

(b) after the receipt of the STOP bit and the completion of any internal operations.

MEMORY RESET:

After an interruption in protocol, power loss or system reset, any 2-wire part can

be reset by following these steps:

1. Clock up to 9 cycles.

2. Look for SDA high in each cycle while SCL is high.

3. Create a start condition.

WRITE OPERATIONS:

BYTE WRITE:

A write operation requires an 8-bit data word address following the device

address word and acknowledgment. Upon receipt of this address, the EEPROM will

Page 54: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

again respond with a zero and then clock in the first 8-bit data word. Following receipt of

the 8-bit data word, the EEPROM will output a zero and the addressing device, such as a

microcontroller, must terminate the write sequence with a stop condition. At this time the

EEPROM enters an internally timed write cycle, tWR, to the nonvolatile memory. All

inputs are disabled during this write cycle and the EEPROM will not respond until the

write is complete.

PAGE WRITE:

The 1K/2K EEPROM is capable of an 8-byte page write, and the 4K, 8K and 16K

devices are capable of 16-byte page writes. A page write is initiated the same as a byte

write, but the microcontroller does not send a stop condition after the first data word is

clocked in. Instead, after the EEPROM acknowledges receipt of the first data word, the

microcontroller can transmit up to seven (1K/2K) or fifteen (4K, 8K, 16K) more data

words. The EEPROM will respond with a zero after each data word received. The

microcontroller must terminate the page write sequence with a stop condition. The data

word address lower three (1K/2K) or four (4K, 8K, 16K) bits are internally incremented

following the receipt of each data word. The higher data word address bits are not

incremented, retaining the memory page row location. When the word address, internally

generated, reaches the page boundary, the following byte is placed at the beginning of the

same page. If more than eight (1K/2K) or sixteen (4K, 8K, 16K) data words are

transmitted to the EEPROM, the data word address will “roll over” and previous data will

Page 55: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

be overwritten.

ACKNOWLEDGE POLLING:

Once the internally timed write cycle has started and the EEPROM inputs

are disabled, acknowledge polling can be initiated. This involves sending a start condition

followed by the device address word. The read/write bit is representative of the operation

desired. Only if the internal write cycle has completed will the EEPROM respond with a

zero allowing the read or write sequence to continue.

READ OPERATIONS:

Read operations are initiated the same way as write operations with the exception

that the read/write select bit in the device address word is set to one. There are three read

operations: current address read, random address read and sequential read.

CURRENT ADDRESS READ:

The internal data word address counter maintains the last address accessed during

the last read or write operation, incremented by one. This address stays valid between

operations as long as the chip power is maintained. The address “roll over” during read is

from the last byte of the last memory page to the first byte of the first page. The address

“roll over” during write is from the last byte of the current page to the first byte of the

same page. Once the device address with the read/write select bit set to one is clocked in

and acknowledged by the EEPROM, the current address data word is serially clocked

out. The microcontroller does not respond with an input zero but does generate a

following stop condition.

Page 56: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

RANDOM READ:

A random read requires a “dummy” byte write sequence to load in the data word

address. Once the device address word and data word address are clocked in and

acknowledged by the EEPROM, the microcontroller must generate another start

condition. The microcontroller now initiates a current address read by sending a device

address with the read/write select bit high. The EEPROM acknowledges the device

address and serially clocks out the data word. The microcontroller does not respond with

a zero but does generate a following stop condition.

SEQUENTIAL READ:

Sequential reads are initiated by either a current address read or a random

Address read. After the microcontroller receives a data word, it responds with an

acknowledge. As long as the EEPROM receives an acknowledge, it will continue to

increment the data word address and serially clock out sequential data words. When the

memory address limit is reached, the data word address will “roll over” and the

sequential read will continue. The sequential read operation is terminated when the

Page 57: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

microcontroller does not respond with a zero but does generate a following stop

condition.

Page 58: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

TRANSISTOR AS A SWITCH

Transistor's collector current is proportionally limited by its base current, it can be

used as a sort of current-controlled switch. A relatively small flow of electrons sent

through the base of the transistor has the ability to exert control over a much larger flow

of electrons through the collector.

When used as an AC signal amplifier, the transistors Base biasing

voltage is applied so that it operates within its "Active" region and the linear part of the

output characteristics curves are used. However, both the NPN & PNP type bipolar

transistors can be made to operate as an "ON/OFF" type solid state switch for controlling

high power devices such as motors, solenoids or lamps. If the circuit uses the Transistor

as a Switch, then the biasing is arranged to operate in the output characteristics curves

seen previously in the areas known as the "Saturation" and "Cut-off" regions as shown

below.

TRANSISTOR CURVES:

The shaded area at the bottom represents the "Cut-off" region. Here the operating

conditions of the transistor are zero input base current (Ib), zero output collector current

(Ic) and maximum collector voltage (Vce) which results in a large depletion layer and no

current flows through the device. The transistor is switched "Fully-OFF". The lighter blue

area to the left represents the "Saturation" region. Here the transistor will be biased so

that the maximum amount of base current is applied, resulting in maximum collector

current flow and minimum collector emitter voltage which results in the depletion layer

Page 59: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

being as small as possible and maximum current flows through the device. The transistor

is switched "Fully-ON". Then we can summarize this as:

Cut-off Region: Both junctions are Reverse-biased, Base current is zero or very

small resulting in zero Collector current flowing, the device is switched fully

"OFF".

Saturation Region: Both junctions are Forward-biased, Base current is high

enough to give a Collector-Emitter voltage of 0v resulting in maximum

Collector current flowing, the device is switched fully "ON".

TRANSISTOR SWITCHING CIRCUIT:

An NPN Transistor as a switch being used to operate a relay is given above. With

inductive loads such as relays or solenoids a flywheel diode is placed across the load to

dissipate the back EMF generated by the inductive load when the transistor switches

"OFF" and so protect the transistor from damage. If the load is of a very high current or

voltage nature, such as motors, heaters etc, then the load current can be controlled via a

suitable relay as shown.

The circuit resembles that of the Common Emitter circuit we looked at in

the previous tutorials. The difference this time is that to operate the transistor as a switch

the transistor needs to be turned either fully "OFF" (Cut-off) or fully "ON" (Saturated).

An ideal transistor switch would have an infinite resistance when turned "OFF" resulting

in zero current flow and zero resistance when turned "ON", resulting in maximum current

Page 60: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

flow. In practice when turned "OFF", small leakage currents flow through the transistor

and when fully "ON" the device has a low resistance value causing a small saturation

voltage (Vce) across it. In both the Cut-off and Saturation regions the power dissipated

by the transistor is at its minimum.

To make the Base current flow, the Base input terminal must be made

more positive than the Emitter by increasing it above the 0.7 volts needed for a silicon

device. By varying the Base-Emitter voltage Vbe, the Base current is altered and which in

turn controls the amount of Collector current flowing through the transistor as previously

discussed. When maximum Collector current flows the transistor is said to be saturated.

The value of the Base resistor determines how much input voltage is required and

corresponding Base current to switch the transistor fully "ON".

Transistor switches are used for a wide variety of applications such as

interfacing large current or high voltage devices like motors, relays or lamps to low

voltage digital logic IC's or gates like AND Gates or OR Gates.

Page 61: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

ISP PROGRAMMER

In-System Programming (abbreviated ISP) is the ability of some programmable

logic devices, microcontrollers, and other programmable electronic chips to be

programmed while installed in a complete system, rather than requiring the chip to be

programmed prior to installing it into the system.

The primary advantage of this feature is that it allows manufacturers of

electronic devices to integrate programming and testing into a single production phase,

rather than requiring a separate programming stage prior to assembling the system. ISP

(In System Programming) will provide a simple and affordable home made solution to

program and debug your microcontroller based project.

ISP is performed using only 4 lines, and literally, data is

transferred through 2 lines only, as in a I2C interface, where data is shifted in bit by bit

though MOSI line, with a clock cycle between each bit and the next (on the SCK line).

MISO line is used for reading and for code verification; it is only used to output the code

from the FLASH memory of the microcontroller. The RST pin is also used to enable the

3 pins (MOSI, MISO and SCK) to be used for ISP simply by setting RST to HIGH

(5V), otherwise if RST is low (0V), program start running and those three pins, are used

normally as P1.5, P1.6 and P1.7.

Either an external system clock can be supplied at pin XTAL1 or a

crystal needs to be connected across pins XTAL1 and XTAL2. The maximum serial

clock (SCK) frequency should be less than 1/16 of the crystal frequency. With a 33 MHz

oscillator clock, the maximum SCK frequency is 2 MHz.

Page 62: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

DB-25 Male pin description:

Pin no Name Direction Pin Description

1

2

GND

TXD

Shield Ground

Transmit Data

3 RXD Receive Data

4 RTS Request to Send

5 CTS Clear to Send

6 DSR Data Set Ready

7 GND System Ground

8 CD Carrier Detect

9 --- Reserved

10 --- Reserved

11 STF Select Transmit Channel

12 S.CD Secondary Carrier Detect

13 S.CTS Secondary Clear to Send

14 S.TXD Secondary Transmit Data

15 TCK Transmission Signal Element

Timing

16 S.RXD Secondary Receive Data

17 RCK Receiver Signal Element Timing

18 LL Local Loop Control

19 S.RTS Secondary Request to Send

Page 63: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

20 DTR Data terminal Ready

21 RL Remote Loop Control

22 RI Ring Indicator

23 DSR Data Signal Rate Selector

24 XCK Transmit Signal Element Timing

25 TI Test Indicator

74LS244:

The 74LS244 is used to work between PRINT ports to the chips AT89S52. We

cannot observe 74LS244 on the PCB which is AT89S52 located. It hid in the joint

between PC and 6 transmission lines. The 74LS244 pin configuration, logic diagram,

connection and function table is on the below.

AT89S8252 microcontroller features an SPI port, through which on-chip Flash

memory and EEPROM may be programmed. To program the microcontroller, RST is

held high while commands, addresses and data are applied to the SPI port.

ATMEL ISP FLASH PROGRAMMER:

This is the software that will take the HEX file generated by whatever compiler

Page 64: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

you are using, and send it - with respect to the very specific ISP transfer protocol - to the

microcontroller.

This programmer was designed in view of to be flexible, economical and easy to

built, the programmer hardware uses the standard TTL series parts and no special

components are used. The programmer is interfaced with the PC parallel port and there is

no special requirement for the PC parallel port, so the older computers can also be used

with this programmer.

SUPPORTED DEVICES:

The programmer software presently supports the following devices

 

AT89C51 AT89S51 AT89C1051 UD87C51 AT89C52 AT89S52

AT89C2051 D87C52 AT89C55 AT89S53 AT89C4051 AT89C55WD

AT89S8252 AT89C51RC

Note:  For 20 pin devices a simple interface adapter is required.

The ISP-3v0.zip file contains the main program and the I/O port driver for

Windows 2000 & XP. Place all files in the same folder, for win-95/98 use the "ISP-

Pgm3v0.exe"File, for win-2000 & XP use the "ISP-XP.bat" file. The main screen view of

the program is shown in fig below.

Page 65: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Following are the main features of this software:

Read and write the Intel Hex file

Read signature, lock and fuse bits

Clear and Fill memory buffer

Verify with memory buffer

Reload current Hex file

Display buffer checksum

Program selected lock bits & fuses

Auto detection of hardware

The memory buffer contains both the code data and the EEPROM data for the

devices which have EEPROM memory. The EEPROM memory address in buffer is

started after the code memory, so it is necessary the hex file should contains the

EEPROM start address after the end of code memory last address.

i.e., for 90S2313 the start address for EEPROM memory is 0 x 800.

The software does not provide the erase command because this function is

performed automatically during device programming. If you are required to erase the

controller, first use the clear buffer command then program the controller, this will erase

the controller and also set the device→ to default setting.

Page 66: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

CHAPTER 4

IMPLEMENTATION

4.1. FLOW CHART:

Page 67: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

4.2.SCHEMATIC:

P A 7

R E S E T

2 P B 6

D 5 (L C D )

R 3 (K E Y P A D )

POW ER S U PPL Y(5 VD C )

TRANSFORMER

G N D

1 23 45 67 89 1 0

1 0 0 0 u f / 3 5 V

S

V C C

R 2 O U T(M A X 2 3 2 )

F R O M I S P (4 )

GND

R 1 (K E Y P A D )

TR I M P O T

5 K

B U Z Z E R & R E D L E D

ATMEGA 1 6 2 C R YSTAL

1 0 4 p f

G N D

V C C

P

2 2 p f

P A 6

S D A (2 4 C 0 8 )TX(F P )

P B 5

V C C

F R O M I S P (2 )

F R O M I S P (6 )& R E S E T

P A 3

GND

G N D

P A 1

V C C

4 . 7 K

GND

C 1 (K E Y P A D )

7805 REGULA TOR1 3

V I N V O U T

3 3 p f

G R E E N L E D

G N D

D 4 (L C D )

V C C

P B 7

S C L (2 4 C 0 8 )

L C D

1 0 4 p f

RESET

XTA L 1

G N D

- +B R I D G E R E C TI F I E R

1

4

3

2

R S (L C D )

R8 R7 R6 R5 R4 R1R2R3 C

1 0 K P U L L U P

123456789

2 2 K

E N (L C D )

V C C

P A 4

2 2 p f

GND

R 2 (K E Y P A D )

T2 I N (M A X2 3 2 )

V C C

8 . 0 0 M H z

XTA L 1

C 3 (K E Y P A D )

2 2 0 o h mGND

R8 R7 R6 R5 R4 R3 R2 R1C

1 0 K P U L L U P

9 8 7 6 5 4 3 2 1

XTA L 2

XTA L 2

P A 5

C 0 (K E Y P A D )

SWITCH

V C C

D 7 (L C D )

2 3 0 V , A . C

12

R X(F P )

R 0 (K E Y P A D )

F R O M I S P (1 0 )

R8R7R6R5R4R1 R2 R3

C

1 0 K P U L L U P

1 2 3 4 5 6 7 8 9

D 6 (L C D )

R E S E T

ATMEGA 1 6 2 ISP

(9V,1 AMP)

V C C

A TM E GA 162

9

1 81 9

2 93 03 1

3 2

1 01 11 21 31 41 51 61 7

4 03 93 83 73 63 53 43 3

2 82 72 62 52 42 32 22 1

12345678

2 0

R E S E T

XTA L 2XTA L 1

P E 2 (O C 1 B )P E 1 (A L E )

P E 0 (I C P / I N T2 )

P A 7 / A D 7

(R XD 0 ) P D 0(TD X0 ) P D 1(I N T0 ) P D 2(I N T1 ) P D 3(O C 3 A ) P D 4(O C 1 A ) P D 5(W R ) P D 6(R D ) P D 7

V C CP A 0 / A D 0P A 1 / A D 1P A 2 / A D 2P A 3 / A D 3P A 4 / A D 4P A 5 / A D 5P A 6 / A D 6

P C 7 (A 1 5 )P C 6 (A 1 4 )P C 5 (A 1 3 )P C 4 (A 1 2 )

P C 3 (A 1 1 )P C 2 (A 1 0 )

P C 1 (A 9 )P C 0 (A 8 )

(O C 0 / T0 ) P B 0(T1 ) P B 1(R XD 1 ) P B 2(TXD 1 ) P B 3(S S ) P B 4(M O S I ) P B 5(M I S O ) P B 6(S C K ) P B 7

G N D

L E D

C 2 (K E Y P A D )

GNDVCCVEERSRWEND0

D3D2

D4D5D6D7

D1

LED+LED-

123456789

1 01 11 21 31 41 51 6

I

Page 68: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

+

AT2 4 C 0 8

1

2

3

5

6

7

8

4

A 0

A 1

A 2

S D A

S C L

W P

V C C

G N D

S W 7

C1+

VS+

C1-

C2+

C2-

VS–

T2OUT

R2IN R2OUT

T2IN

T1IN

R1OUT

R1IN

T1OUT

GND

VCC

MAX 2 3 2

1

2

3

4

5

6

7

8 9

1 0

1 4

1 6

1 5

1 3

1 2

1 1

S W 5

POW ER SU PPL Y (3 .3 V D C )

GND

GND

1

L M 1 1 1 7 T R E G U L A TO R3 2

V I N V O U T

PD7

S W 1 1

S W 1 3

3 . 3 V

1 0 K

PD6

1K

S W 1 6

S W 8

TXD 1V C C

R 2 (PC 6 )

C 0 (PC 0 )

P D 0 (R XD 0 )

V C C

BC 109

R 1 (PC 5 )

S W 1 0

GND

R 3 (PC 7 )S W 1 4

R E D L E D

F I N G E R P R I N T M O D U L E

1234

GND

S W 1 5

S W 3

V C C

1 0 u f / 6 3 v

2 2 0 o h m

C 1 (PC 1 )

S W 2

G N D

123

GND

-

2 2 0 o h m

L S ?

B U Z Z E R

12

S W 1 2

RF ID

P B 0

R XD 1

1 0 u f / 6 3 v

R 0 (PC 4 )

V C C

1K

V I N = 5 V

S W 9

1 0 K

V C C

S W 6

G R E E N L E D

P D 1 (TXD 0 )

GND

V C C

S W 4

KEYPAD

BC 109

RX

1 0 u f / 6 3 v

RX

1 0 u f / 6 3 v

C 2 (PC 2 )

V C C

P B 1

TX

S W 1

C 3 (PC 3 )

TX

GND

Page 69: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

4.3 TOOLS

CODEVISION AVR

Assembly code is used for one or more of three reasons: speed, compactness or

because some functions are easier to do in assembler than in a higher level language. It is

well known that using a high level language always results in the faster program

development but there are times when, for the reasons stated above, one wants to use

assembly language.

The Code Vision AVR C Compiler, like other compilers meant for

microcontroller development, has an easy interface to assembly language. Assembler

code may be imbedded anywhere in a C program.

FEATURES:

Installing and Configuring Code Vision AVR to work with the Atmel STK500

starter kit and AVR Studio debugger.

Creating a New Project using the Code Wizard AVR Automatic Program

Generator

Editing and Compiling the C code

Loading the executable code into the target microcontroller on the STK500 starter

kit.

INTRODUCTION:

This is an introduction to the user through the preparation of an example C

program using the Code Vision AVR C compiler. The example, which is the subject of

this application note, is a simple program for the Atmel AT90S8515 microcontroller on

the STK500 starter kit.

PREPARATION:

Install the Code Vision AVR C Compiler by executing the file setup.exe. It is

assumed that the program was installed in the default directory: C:\cvavr. Install the

Atmel AVR Studio debugger by executing the file setup.exe. It is assumed that AVR

Page 70: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

Studio was installed in the default directory: C:\Program Files\Atmel\AVR Studio. Setup

the starter kit (STK500) according to the instructions in the STK500 User Guide. Make

sure the power is off and insert the AT90S8515 chip into the appropriate socket marked

SCKT3000D3. Set the XTAL1 jumper. Also set the OSCSEL jumper between pins 1 and

2. Connect one 10 pin ribbon cable between the PORTB and LEDS headers. This will

allow displaying the state of AT90S8515’s PORTB outputs. Connect one 6 pin ribbon

cable between the ISP6PIN and SPROG3 headers. This will allow Code Vision AVR to

automatically program the AVR chip after a successful compilation. In order to use this

feature, one supplementary setting must be done: Open the Code Vision AVR IDE and

select the Settings | Programmer menu option. Make sure to select the Atmel STK500

AVR Chip Programmer Type and the corresponding Communication Port which is used

with the STK500 starter kit. Then press the STK500.EXE Directory button in order to

specify the location of the stk500.exe command line utility supplied with AVR Studio.

Select the c:\Program Files\Atmel\AVR Studio\STK500 directory and press the OK

button. Then press once again the OK button in order to save the Programmer Settings. In

order to be able to invoke the AVR Studio debugger/simulator from within the Code

Vision AVR IDE one final setting must be done. Select the Settings | Debugger menu

option.

SHORT REFERENCE:

PREPARATIONS:

Install the Code Vision AVR C compiler

Install the Atmel AVR Studio debugger

Install the Atmel STK500 starter kit

Configure the STK500 programmer support in the Code Vision AVR IDE by

selecting: Settings->Programmer-> AVR Chip Programmer Type: STK500->

Specify STK500.EXE Directory: C:\Program Files\Atmel\AVR Studio\STK500->

Communication Port

Configure the AVR Studio support in the Code Vision AVR IDE by selecting:

Settings->Debugger-> Enter: C:\Program Files\Atmel\AVR Studio.

Page 71: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

GETTING STARTED:

Create a new project by selecting: File->New->Select Project

Specify that the Code Wizard AVR will be used for producing the C source and

project files: Use the Code Wizard? ->Yes

In the Code Wizard AVR window specify the chip type and clock frequency:

Chip->Chip: AT90S8515->Clock: 3.86MHz

Configure the I/O ports: Ports->Port B- >Data Direction: all Outputs->Output

Value: all 1’s

Configure Timer 1: Timers->Timer1- >Clock Value: 3.594 kHz->Interrupt on:

Timer1 Overflow->Val: 0xF8FB

Generate the C source, C project and Code Wizard AVR project files by selecting:

File | Generate, Save and Exit-> Create new directory: C:\cvavr\led-> Save: led .c

->Save: led.prj->Save: led.cwp

Edit the C source code

View or Modify the Project Configuration by selecting Project->Configure->

After Make->Program the Chip

Compile the program by selecting: Project->Make

Automatically program the AT90S8515 chip on the STK500 starter kit: Apply

power->Information->Program.

Page 72: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

4.4. SCREEN SCHOOTS

Page 73: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 74: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 75: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 76: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 77: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 78: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 79: The Electronic Passport and the Future of Government-Issued Rfid-based Identification
Page 80: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

CHAPTER -5

RESULTS

The result of the project is that it indicates the accident occurred and it indicates it

on the LCD screen at the receiver. For seeing the output in the hardware kit particular

steps has to be followed. Mainly as we have two sections. The power supply is given to

the kit. When the vehicle i.e. transmitter is running when we press the sensor attached to

it then the vehicle stops and through RF communication the signal are sent to the

receiver. Then LEDs and buzzers indicate that the accident is occurred and then the

information is placed on the LCD screen at the required receiver. Through this project we

can assist the people who suffered with accident.

Page 81: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

CHAPTER 6

CONCLUSION

The project “ACCIDENT ALERTING SYSTEM USING RF” has been

successfully designed and tested. Integrating features of all the hardware components

used are developed it. Presence of every module has been reasoned out and placed

carefully thus contributing to the best working of the unit.

Finally, using highly advanced IC’s and with the help of growing technology the

project has been successfully implemented.

Page 82: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

FUTURE ASPECTS

Wireless is finding a huge development in Communications . In this

project, the PC desktop operation is controlling through RF remote. So that we can

perform the mouse operations and as well as some of the operations of the keyboard. For

further enhancement we can add some of the keys to the RF remote section to perform

the operation of the keyboard in the wireless manner.

This project can further be enhanced with the help GSM, Bluetooth and Zigbee

etc communication technologies.

Page 83: The Electronic Passport and the Future of Government-Issued Rfid-based Identification

BIBLIOGRAPHY

[1] Wireless vehicular Accident Detection and Reporting System, Mechanical and

Electrical Technology (ICMET), 2010 2nd International Conference on Issue

Date: 10-12 Sept. 2010, on page(s): 636 - 640.

[2] An embedded system and RFID solution for transport related issues,This paper

appears in: Computer and Automation Engineering (ICCAE), 2010 The 2nd

International Conference on ,Issue Date: 26-28 Feb. 2010, Volume: 1, On page(s): 298

- 302.

[3] RFID-Technology and Applications (RFID-TA), 2010 IEEE International Conference

on

Date: 17-19 June 2010

[4] RFID Technology and Applications,This paper appears in: Pervasive Computing,

IEEE ,Issue Date: Jan.-March 2006, Volume: 5 Issue: 1 ,On page(s): 22 - 24 

[5] Raj Kamal(2000), The Concepts and Features of Microcontrollers (68HC11, 8051 and

8096) includes Programmable Logic Controllers, New Delhi.

[6] Cady, Fredick M. (1997), Software and Hardware Engineering-Motorola m68hc11,

New York: Oxford University Press.