Preview

Rfid Door Lock Description

Better Essays
Open Document
Open Document
3994 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Rfid Door Lock Description
PR25
RFID Door Lock

Version 1.0
October 2009
Cytron Technologies Sdn. Bhd.
Information contained in this publication regarding device applications and the like is intended through suggestion only and may be superseded by updates. It is your responsibility to ensure that your application meets with your specifications. No representation or warranty is given and no liability is assumed by Cytron Technologies Incorporated with respect to the accuracy or use of such information or infringement of patents or other intellectual property rights arising from such use or otherwise. Use of Cytron Technologies’s products as critical components in life support systems is not authorized except with express written approval by Cytron Technologies. No licenses are conveyed, implicitly or otherwise, under any intellectual property rights.

OVERVIEW
This document describes the development of Cytron Technologies DIY (Do It Yourself) Project PR25. This project revises PR8: Read and Display and PR9: Password Door Security. However, this project improves the previous PR, where it can learn new RFID ID tag and read ID tag in two different communication ways, Wiegand and UART. Connection for UART and Wiegand RFID tag reader are provided on PCB to be extended. Schematic and source code is also provided.

FEATURES
PIC16F876A - 8-bit microcontroller with 22 I/O - Operate with 5V supply - Operating speed 20MHz WIEGAND RFID TAG READER - RFID tag reader with specification reader-tocard and binary reader-to-controller interface - Standard 26-bit binary card data format - Operate with 5V supply

Created by Cytron Technologies Sdn. Bhd. – All Rights Reserved

1

ROBOT . HEAD to TOE PR25 – RFID: Read and Display

SYSTEM OVERVIEW

Push Button

Relay

PIC16F876A
RFID Tag Reader LCD Door Lock

RFID Tag

GENERAL DESCRIPTION
PR25 is an open source microcontroller Do It Yourself kit. This PIC microcontroller based project is designed to develop a low cost RFID door

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 1 Assignment 1

    • 7711 Words
    • 31 Pages

    The system stores all the necessary information about the user. A new user is first registered to the system and the corresponding information is burned in the RFID tag. This RFID tag will then be accessible through the system. When a registered user comes to the entry point and puts his/her tag into the reader, the system checks whether he/she is a registered user or an imposter. If the user is registered, then the tab information is matched with the user information stored in system. The door is opened after the successful authentication and is closed automatically after a specific time interval. The check-in information is also stored in the database with the corresponding date and time. A log is also generated by the system according to the check-in information. Finally, this check-in information is stored in a central server along with the basic information of the…

    • 7711 Words
    • 31 Pages
    Better Essays
  • Better Essays

    This forecast, completed for the implementation of both an RFID and MRP system. There are a number of salary costs for this type of project, including a project manager salary for one month ($3,333), an install technician for two months ($6,600). A trainer for 20 days ($1,640), salaries for 10 technical support agents to be trained over 10 days ($11,000), and salaries for 100 staff agents trained over 10 days. However, the largest cost for this project will be the technology itself. To install an RFID system the following will need purchasing; active tags at the price of $10 each for 100 in total, five $500 readers, and the middleware that coasts $100,000. The MRP software will bring the biggest price of $300,000. The total costs of implementing the project will be…

    • 2021 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Dexit is a new electronic payment system that designs for low-value transactions. Based on Radio Frequency Identification (RFID) technology, customers can use a small electronic tag to pay for goods and services without entering password on a specialized reader at the retail stores, which is obviously faster than any other payment methods, such as cash, debit cards and credit cards. With this high reliable and convenient payment system, customers can save much time on waiting queues and eliminate the troubles for carrying loose coins and exact change for small-money purchases. In addition, merchants will also benefit a lot from Dexit to increase their revenues by improving cashier efficiency, decreasing the cash-handing costs, reducing cash counting and depositing charges, as well as avoiding the bothers on checking for counterfeit money.…

    • 3130 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    RFID cloners, cryptography and Bayesian Math, is something Cory Doctorow knows well. The author this book is a , speaker, teacher, writer of novels and short stories and editor of a…

    • 484 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cited: Atlas RFID Solutions website. (n.d.). Retrieved July 7, 2011, from Altas RFID Solutions: http://www.atlasrfidsolutions.com/Technology/RFIDvsBarcode.aspx…

    • 1119 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Project Sneaky Analysis

    • 215 Words
    • 1 Page

    The nature of the opportunity is to spread awareness of existing devices that can steal information causing identify theft, bankruptcy, and many more malicious activities to harm society. Technology can harm society due to the unawareness of the capabilities of new devices being created. New devices are created every day and the vulnerabilities are not yet known until a hacker or a malicious person attempts to test them. Radio-frequency Identification (RFID) scanners are made to make smart chips easier to read and reduce time in process that takes time to go over documents. Project Sneaky takes that life simplicity and shows the vulnerabilities within RFID scanning process throughout the technological world.…

    • 215 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Rfid at Walmart

    • 2895 Words
    • 12 Pages

    Walmart has expanded as the largest retailer since it opened doors over 50 years ago, incorporating various information technology systems into their supply chain and logistical operations. Walmart is known for being the first with new innovation by utilizing new information functions to increase profits. By implementing Radio Frequency Identification Data opens communication to retailers more effectively and efficiently. This gives Walmart and suppliers accurate inventory levels, reduced cost, sales and competitive advantages.…

    • 2895 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    RFID Technology involves software that allows each user to be identified by central database. Because of this, it is possible for hackers to attack the system easily.…

    • 652 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This report covers the present scenario and the growth prospects of the Global RFID Smart Cabinet market for the period 2013-2018. To calculate the market size, the report considers revenue generated from the sales of RFID smart cabinets worldwide. It also presents the vendor landscape and a corresponding detailed analysis of the leading four vendors in the market. In addition, the report discusses the major drivers that influence the growth of the Global RFID Smart Cabinet market. It also outlines the challenges faced by vendors and the market at large, as well as the key trends that are emerging in the market.…

    • 361 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Our Application blends Radio Frequency Identification (RFID) and wireless technologies to provide 'on the spot’ billing in supermarkets. Each product is given a specific RF- Tag. Unlike barcodes, it uniquely identifies the product. In addition, they do not require physical scanning. The RF-Tags are constantly transmitting their presence to the RF Reader positioned on the shopping trolley. When a product is dropped into the trolley, its name and cost are displayed instantly on the LCD fixed to the trolley.…

    • 1648 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Shopping Trolley

    • 504 Words
    • 3 Pages

    customer friendly and the supply chain even more efficient. Hence our dream to stroll through the store of tomorrow is made feasible with RFID- fully automated product recognition.…

    • 504 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Bluetooth Door Lock

    • 2263 Words
    • 10 Pages

    It has been known for some time now that mechanical locks are becoming outdated. Mechanical locks are notoriously easy to lock pick, the quantity of keys limits their use, and they are not convenient to use. The goal of Team Open Sesame is to create a door that is safer and more convenient to use than the conventional mechanical door. Team Open Sesame’s design gives people limited access to a door through their android smartphone’s Bluetooth in the form of a digital key code. The use of a digital key provides more safety than the traditional locking mechanism, as it takes more experience to hack into a password encrypted system than to pick a lock. This design also provides the security of always being locked, until given a quick command to unlock. The goal of almost any piece of technology is to improve on what has been done before. Team Open Sesame’s door is easier to use, is more secure, and has infinite keys.…

    • 2263 Words
    • 10 Pages
    Good Essays
  • Better Essays

    Parity Generator

    • 2128 Words
    • 9 Pages

    “Password Based Door Security System using Microcontroller” is used in the places where we need more security. It can also used to secure lockers and other protective doors. The system comprises a number keypad and the keypads are connected to the 8 bit microcontroller AT89C2051. This is one of the popular Microcontroller. It has only 20 pins and there are 15 input/output lines. The microcontroller has a program memory of 2 Kilobytes. The microcontroller continuously monitor the keypad and if somebody enters the password it will check the entered password with the password which was stored in the memory and if it they are same then…

    • 2128 Words
    • 9 Pages
    Better Essays
  • Powerful Essays

    Msys 111 Test revision

    • 1599 Words
    • 6 Pages

    Key difference is bar codes are the traditional id technology and RDIF tags are the new modern technology…

    • 1599 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Currently,theft has been done in lot of places in our society while considering safety issues this idea is proposed.The objective of this paper is to design the IMAGE based door opening and closing system and also increase the security in banks, collegesand homes based on biometric system. The biometric person authentication technique based on the pattern of the human iris is well suitable for application to any access control system requiring a high level of security. Today, biometric recognition is a common and reliable way to authenticate the identification of a person based on physiological or behavioral characteristics. So in thispaper if iris is matched the door it will be opened otherwise it will not be open. IR sensor used to detect the human in or out.By using this concept,we can avoid the theft in bank&home.It also used in various places in our society to avoid theft.The result of our idea is done in MATLAB & the simulation&Hardware Result are shown in this paper. This idea is very useful in banks, offices, shops etc..…

    • 2104 Words
    • 9 Pages
    Powerful Essays