Smart Card Based Door Security System ABSTRACT It is a system which can be used where accessing of door or any other electrical device, can be open using a smart card on inserting the card users data is being read by the microcontroller which will process the data the card is an EPROM IC where we can store the data in that here where quick updating, quick record database generator for the person using for zand where few organization can’t work efficiently like post, telegraph, telephone. Manual handling required for telephone. The smart card is one of the latest additions to the world of information technology. Similar in size to today's payment card, the smart card has a microprocessor memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different applications. As an access-control device, smart cards make personal and business data available only to the appropriate users. Another application provides users with ability to make a purchase or exchange value. Smart cards provide data portability, security and convenience plastic Page 1 Smart Card Based Door Security System 1. INTRODUCTION It is a system which can be used where accessing of door or any other electrical device, can be open using a smart card on inserting the card users data is being read by the micro controller which will process the data the card is an EPROM IC where we can store the data in that there where quick updating, quick record database generator for the person using for and where few organization cant work efficiently like post, telegraph, telephone. Manual handling required for telephone. The smart card is one of the latest additions to the world of information technology. Similar in size to today's plastic payment card, the smart card has a microprocessor or memory chip embedded in it that, when coupled with a reader, has the processing power to serve many different applications. As an access-control device, smart cards make personal and business data available only to the appropriate users. Another application provides users with the ability to make a purchase or exchange value. Smart cards provide data portability, security and convenience. We use a system that is called smart card connectivity which has the following features Analysis, computation, decision making is easier & faster: Space constraints sensitive to environmental condition computer literates are required to operate. We have developed a system, which can use for remote sites or area. The EEPROM (memory) on the smart card is there for security. The host computer and card reader actually "talk" to the EEPROM. The EEPROM enforces access to the data on the card. If the host computer read and wrote the smart card's random access memory (RAM), it would be no different than a diskette. Smarts cards may have up to 512 kilobytes of EEPROM. The smart card uses a serial interface and receives its power from external sources like a card reader. Smart cards can be used with a smart-card reader attachment to a personal computer to authenticate a user. Web browsers also can use smart card technology to supplement Secure Sockets Layer (SSL) for improved security of Internet transactions. Smart-card readers can also be found in mobile phones and vending machines. Page 2 Smart Card Based Door Security System 2. HISTORY The ancestor of data storage cards is most probably the calling card. The first plasticbased card was issued by Diners Club in 1950. By the end of the fifties two other firms joined the initiation: American Express and Carte Blanche. The first credit card was issued by the Bank of America and that card was VISA. Interbank launched another system called Master card. However, these early cards were only capable of ’storing’ embossed identification items (names, numbers, codes etc). The first cards with magnetic strip were developed by the International Air Transportation Association (IATA) in the 1970’s. On this type of card the magnetic stripe stored 210 bit/inch of information, which means about 80 alphanumeric (7-bit) characters. A much higher amount of data can be stored on optical cards. In this case, both reading and writing (and positioning of course as well) are done optically, enabling a higher level of precision and thus higher information density. Also, typically the whole surface of the card is used for holding data. This way, capacity of some megabytes can be achieved. On the other hand, manufacturing costs of such cards are quite high. Optical cards are used mainly in the medical sector where storage of the patient’s medical records and perhaps even of X-ray photographs is needed. The next step in the evolution of cards was the appearance of chipcards i. e. cards based on the application of microelectronic circuits. The first attempts toward chipcard technology are marked by the establishment of Innovatron in 1974. Bull produced its first card possessing a microprocessor in 1979. On this card, the processor was in a separate chip, which proved to be an insecure solution. However, it was only in the 1980’s that the improvement of the technology made it possible to integrate all circuits on a single chip. In French for instance, chipcards are used since 1986 in public payphones. The first chipcards were memory cards. They contained only memory modules which were controlled by the contacts. Generic cards were chipcards too. They received instructions from the outside which were processed by the card’s operating system. Nowadays chipcards possess more and more memory and computation power. This makes it possible that the cards not only execute commands from the outside but also be able to run separate programs. These are programmable smart cards. After this short introduction to the history of smart cards it is time to review the currently most important aspects of smart card technology. Since smart cards Page 3 Smart Card Based Door Security System are traditionally used to store sensitive data, security is one of the most important factors to consider. Security in this case not only assumes the physical tamper-resistance of the card but also the logical integrity and authenticity of the data stored on it. The latter is achieved by the SCOS guaranteeing that the data can be accessed through predefined gates (operations) only. This resembles the object oriented paradigm in software engineering. Another approach is the introduction of files and file-systems. This way, data can be organised into files and directories. Access can be restricted to these files by assigning permissions to them.For each file an access control list (ACL) can be provided defining the rights of the parties (e. g. users, applications) concerning that file. This concept requires user management. In this case, a user can authenticate itself toward the card with the help of a personal identification number (PIN) or some other authentication scheme. Presently people carry 4-5 cards (magnetic and chip cards) in their wallet: ID card, credit card, phone card etc. As the memory of smart cards increases it becomes possible to integrate all these functions on a single card. Smart cards are not only data storage devices. They can be blessed with the ability of decision making and thus can be used to protect the rights of not only the system but those of the users too. They make mutual authentication possible. When a credit card user inserts his card into an ATM, and supplies his PIN code, he has to trust the machine. If the machine is a false ATM, it may swallow the card (or just keep the card number) and remember the PIN code, and the attackers may drain the credit card user’s bank account. It would be preferable, if the card would identify the ATM (or the reader) and check if it possesses the appropriate keys. If the reader fails to identify itself, the program running on the card should send a message to the user to warn him not to supply his PIN code. However, sending warning to the user is only possible through the reader’s user interface. The card itself runs using the power supplied by the reader too. This makes the situation a bit complicated, but an algorithm for this problem does exist. Security was the main purpose of smart cards from the early days. In case of the ideal smart card tamper-resistance has utmost priority. The card manufacturer provides the card’s physical and the OS’s logical security. The ideal card has an own power supply and a timer. The ideal smart card runs multiple applications. These may change dynamically so that new applications can be downloaded to the card and deleted when they are not used. Page 4 Smart Card Based Door Security System 3. BLOCK DIAGRAM Fig. Block diagram of smart card based door access system Page 5 Smart Card Based Door Security System 3.1 Prototype smart card : The general block diagram of the system consist of the card which provides a predefined code every card has some unique code stored in its EEPROM also known as firmware, is an integrated circuit programmed with specific data when it is manufactured. Working with ROM’s and EPROM’s can be a wasteful business. Even though they are inexpensive per chip, the cost can add up over time. Erasable programmable read-only memory(EPROM) addresses this issue. EPROM chips can be rewritten many times. Erasing an EPROM requires a special tool that emits a certain frequency of ultraviolet (UV) light. EPROM’s are configured using an EPROM programmer that provides voltage at specified levels depending on the type of EPROM used. In the smart card we used a two-wire serial EEPROM AT24C04 is used in the circuit to store the user code, as the memory ensures reading of the latest saved settings by the micro controller. This 12C bus-compatible- 2048-bit (2-kbit) EEPROM is organized as 256x8 bits. It can retain data for more than ten years. Using just two lines (SCL and SDA) of the memory, the micro controller can read the data when user can be connect with the reader. 3.2 MICROCONTROLLER : PIC16F72 is an 8-bit CMOS micro controller. Its internal circuitry reducing the need for external components, thus reducing the cost and power consumption and enhancing the system reliability.PIC16F72 is an 8-bit, low-cost, high-performance flash micro controller. Its key features are 4kwords of flash program memory, 192 bytes of data RAM, eleven interrupts, three I/O ports, 8-bitADC and only 35 powerful single- cycle instructions (each 14-bit wide).The PIC16F72 micro controller is a 28-pin IC with three input/output ports: port A (RAO throughRA5), port B (RBO through RB7) and port C (RCO through RC7). Page 6 Smart Card Based Door Security System Fig. MICROCONTROLLER All 22 bi-directional I/O pins are used for smart card (serial EEPROM), LCD Interface, Buzzer and relay interfacing. Port RC4is pulled up via 4K7 resistor and used as enter key and mode selection (read & write).The user code is store in the smart card (serial EPROM (AT24C04) memory. The memory can be read by the micro controller, which activates an output when the correct access code has been read in the smart card. All Read Data send to the PC Serial Port via RS232 Interface. A buzzer has been added to provide input feedback; the number of beep indicates weather the input has been entered correctly or not. 3.3 Smart card interface: Pins RC3 and RC2 of the microcontroller are used as serial data (SDA) and serial clock (SCL)lines for the I2C bus for communicating with the smart card(EEPROM_AT24C04). These two lines are connected to pull-up resistors, which are required for I2C bus devices. AT24C04 is ani2C bus compatible 4k-bit EEPROM organized as 256x8-bit that can retain data for more than ten years. Various user codes can be stored in it. Using SCL and SDA lines, the microcontroller can read and write data for all the parameters For more details on I2C bus and memory interface, please refer to the AT24C04 datasheet. Page 7 Smart Card Based Door Security System 3.4 Liquid crystal display : The dot-matrix liquid crystal display controller and driver LSI displays alphanumeric, characters, and symbols. It can be configured to drive a dot-matrix liquid crystal display under the control of a 4 or 8-bit microprocessor. Since all the functions such as display RAM, character generator, and liquid crystal driver, required for driving a dot-matrix liquid crystal display are internally provided on one chip, a minimal system can be interfaced with this controller/driver. A single HD44780U can display up to two 8-character lines (16x 2).A 16 x 2 Line LCD module to display user information. Micro controllers send the data signals through Pin 11 through 18 (RC0 – RC3) and control signal through 4, 6 and 7 of the microcontroller. Pin no 3 of the LCD is used to control the contrast by using preset PR1A buzzer connected to port RB1 of the micro controller through a driver transistor. The buzzer requires 12 volts at a current of around 50ma, which can not provided by the micro controller. So the driver transistor is added. The buzzer is used to audible indication for valid user and error situation and Alarm mode. As soon as pin of the micro controller goes high, the buzzer operates. 3.5 RELAY INTERFACE A single pole dabble throw (SPDT) relay is connected to port RB0 of the micro controller through a driver transistor. The relay requires 12 volts at a current of around 100 ma, which can not provided by the micro controller. So the driver transistor is added. The relay is used to operate the external solenoid forming part of a locking device or for operating any other electrical device. Normally the relay remains off. As soon as pin of the micro controller goes high, the relay operates. When the relay operates and releases. Diode D2 is the standard diode on a mechanical relay to prevent back EMF from damaging Q3 when the relay releases. Page 8 Smart Card Based Door Security System 3.6 POWER SUPPLY Fig. Circuit diagram of regulated power supply Two supply voltages are required for the circuit. A DC or AC 12 V mains adaptor is connected to bridge rectifier (D2, 3, 4, 5) via CN1 Connector. U3 and U4 are supplied with a regulated 5 V from a 7805 (U2)fixed voltage Regulator. The unregulated voltage of approximately 12 V is required for relay and buzzer driving circuit. 3.7 LED: A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps in many devices, and are increasingly used for lighting. Introduced as a practical electronic component in 1962, early LEDs emitted low-intensity red light, but modern versions are available across the visible, ultraviolet and infrared wavelengths, with very high brightness. The internal structure and parts of a led are shown in figures 3.4.1 and 3.4.2 respectively. Page 9 Smart Card Based Door Security System Fig. Inside a LED Fig. Parts of a LED LED lights have a variety of advantages over other light sources: High-levels of brightness and intensity High-efficiency Low-voltage and current requirements Low radiated heat High reliability (resistant to shock and vibration) No UV Rays Long source life Can be easily controlled and programmed Page 10 Smart Card Based Door Security System 3.8 D.C. Motor : Fig. DC Motor A DC motor uses electrical energy to produce mechanical energy, very typically through the interaction of magnetic fields and current-carrying conductors. The reverse process, producing electrical energy from mechanical energy, is accomplished by an alternator, generator or dynamo. Many types of electric motors can be run as generators, and vice versa. The input of a DC motor is current/voltage and its output is torque (speed). The DC motor has two basic parts: the rotating part that is called the armature and the stationary part that includes coils of wire called the field coils. The stationary part is also called the stator. Figure shows a picture of a typical DC motor, Figure shows a picture of a DC armature, and Fig shows a picture of a typical stator. From the picture you can see the armature is made of coils of wire wrapped around the core, and the core has an extended shaft that rotates on bearings. You should also notice that the ends of each coil of wire on the armature are terminated at one end of the armature. The termination points are called the commutator, and this is where the brushes make electrical contact to bring electrical current from the stationary part to the rotating part of the machine. Page 11 Smart Card Based Door Security System 4. REQUIRMENTS 1. Resistors and diodes 2. IC sockets 3. Ceramic capacitors 4. A 4 pin zippy tact switch (SW1, 2, and 3) 5. LM7805 regulators. 6. LED’s, and crystal . 7. Electrolytic capacitors. Make sure you insert them the correct way around 8. RF Transmitter, Receiver Module, relay and buzzer 9. Microcontroller PIC16F72 Page 12 Smart Card Based Door Security System 5. CIRCUIT DIAGRAM Page 13 Smart Card Based Door Security System Fig. Circuit diagram of smart card based door access system 5.1 Prototype smart card: The general block diagram of the system consist of the card which provides a predefined code (STORED IN THE EEPROM OF the card IC) every card has some unique code stored in its EEPROM also known as firmware, is an integrated circuit programmed with specific data when it is manufactured. Working with ROM’s and EPROM’s can be a wasteful business. Even though they are inexpensive per chip, the cost can add up over time. Erasable programmable read-only memory (EPROM) addresses this issue. EPROM chips can be rewritten many times. Erasing an EPROM requires a special tool that emits a certain frequency of ultraviolet (UV) light. EPROM’s are configured using an EPROM programmer that provides voltage at specified levels depending on the type of EPROM used. In the smart card we used a two-wire serial EEPROM AT24C04 is used in the circuit to store the user code, as the memory ensures reading of the latest saved settings by the micro controller. This 12C bus-compatible- 2048-bit (2-kbit) EEPROM is Page 14 Smart Card Based Door Security System organized as 256x8 bits. It can retain data for more than ten years. Using just two lines (SCL and SDA) of the memory, the micro controller can read the data when user can be connect with the reader. 5.2 MICROCONTROLLER INTERFACE : Fig. PIN DIAGRAM OF PIC 16F72 MICROCONTROLLER PIC16F72 is an 8-bit CMOS micro controller. Its internal circuitry reducing the need for external components, thus reducing the cost and power consumption and enhancing the system reliability. PIC16F72 is an 8-bit, low-cost, high-performance flash micro controller. Its key features are 4k words of flash program memory, 192 bytes of data RAM, eleven interrupts, three I/O ports, 8-bit ADC and only 35 powerful single- cycle instructions (each 14-bit wide). Page 15 Smart Card Based Door Security System The PIC16F72 micro controller is a 28-pin IC with three input/output ports: port A (RAO through RA5), port B (RBO through RB7) and port C (RCO through RC7). All 22 bi-directional I/O pins are used for smart card (serial EEPROM), LCD Interface, Buzzer and relay interfacing. Port RC4 is pulled up via 4K7 resistor and used as enter key and mode selection (read & write). The user code is store in the smart card (serial EPROM (AT24C04) memory. The memory can be read by the micro controller, which activates an output when the correct access code has been read in the smart card. All Read Data send to the PC Serial Port via RS232 Interface. A buzzer has been added to provide input feedback; the number of beep indicates weather the input has been entered correctly or not. 5.3 Smart card interface Pins RC3 and RC2 of the microcontroller are used as serial data (SDA) and serial clock (SCL) lines for the I2C bus for communicating with the smart card (EEPROM_AT24C04). These two lines are connected to pull-up resistors, which are required for I2C bus devices. AT24C04 is an i2C bus compatible 4k-bit EEPROM organized as 256x8-bit that can retain data for more than ten years. Various user codes can be stored in it. Using SCL and SDA lines, the microcontroller can read and write data for all the parameters. 5.4 LCD INTERFACE: The dot-matrix liquid crystal display controller and driver LSI displays alphanumeric, characters, and symbols. It can be configured to drive a dot-matrix liquid crystal display under the control of a 4 or 8-bit microprocessor. Since all the functions such as display RAM, character generator, and liquid crystal driver, required for driving a dot-matrix liquid crystal display are internally provided on one chip, a minimal system can be interface with this controller/driver. A single HD44780U can display up to two 8-character lines (16x 2).A 16 x 2 Line LCD module to display user information. Micro controllers send the data signals through Pin 11 through 18 (RC0 Page 16 Smart Card Based Door Security System – RC3) and control signal through 4, 6 and 7 of the microcontroller. Pin no 3 of the LCD is used to control the contrast by using preset PR1r to the AT24C04 data Fig. LCD Display 5.5 BUZZER : Fig. Buzzer Page 17 Smart Card Based Door Security System A buzzer connected to port RB1 of the micro controller through a driver transistor. The buzzer requires 12 volts at a current of around 50ma, which can not provided by the micro controller. So the driver transistor is added. The buzzer is used to audible indication for valid user and error situation and Alarm mode. As soon as pin of the micro controller goes high, the buzzer operates sheet. 5.6 RELAY INTERFACE A single pole dabble throw (SPDT) relay is connected to port RB0 of the micro controller through a driver transistor. The relay requires 12 volts at a current of around 100 ma, which cannot provided by the micro controller. So the driver transistor is added. The relay is used to operate the external solenoid forming part of a locking device or for operating any other electrical device. Normally the relay remains off. As soon as pin of the micro controller goes high, the relay operates. When the relay operates and releases. 5.7 POWER SUPPLY Two supply voltages are required for the circuit. A DC or AC 12 V mains adaptor is connected to bridge rectifier (D2, 3, 4, 5) via CN1 Connector. U3 and U4 are supplied with a regulated 5 V from a 7805 (U2) fixed voltage Regulator. The unregulated voltage of approximately 12 V is required for relay and buzzer driving circuit. damaging Q3 when the relay releases. LED L1 indicates relay on. Page 18 Smart Card Based Door Security System 6. PROGRAMMING // #Define __LCD_RSPORT PORTC // #Define __LCD_ENPORT PORTC // #Define CARD PORTB,7 // #Define SCL PORTB,5 // #Define SDA PORTB,6 // #Define SW1 PORTB,2 // #Define SW2 PORTB,3 // #Define SW3 PORTB,4 // #Define RLY PORTC,6 // #Define BUZ PORTC,7 Movwf W_VAL Bcf PORTC,6 Bcf PORTC,7 Clrf TEMP Bsf PORTB,2 Bsf PORTB,3 Page 19 Smart Card Based Door Security System Bsf PORTB,4 Movlw 3 Movwf PP1H Movlw 232 Call dly@w Btfsc PORTB,2 Goto bc@LL2 Goto PROG_CARD Goto bc@LL3 Goto MAIN Call Lcd@Cls Movlw 128 Movwf BPFH Movlw 128 Call LCD@crs Movlw 87 Call Print Movlw 69 Call Print Movlw 76 Page 20 Smart Card Based Door Security System Call Print Movlw 67 Call Print Movlw 79 Call Print Movlw 77 Call Print Movlw 69 Call Print Movlw 32 Call Print Movlw 84 Call Print Movlw 79 Call Print Movlw 32 Call Print Movlw 83 Call Print Movlw 77 Call Print Page 21 Smart Card Based Door Security System Movlw 65 Call Print Movlw 82 Call Print Movlw 84 Call Print Movlw 128 Movwf BPFH Movlw 192 Call LCD@crs Movlw 67 Call Print Movlw 65 Call Print Movlw 82 Call Print Movlw 68 Call Print Movlw 32 Call Print Movlw 65 Page 22 Smart Card Based Door Security System Call Print Movlw 67 Call Print Call Print Movlw 69 Call Print Movlw 83 Call Print Call Print Call Print Movlw 32 Call Print Movlw 83 Call Print Movlw 89 Call Print Movlw 83 Call Print Movlw 11 Movwf PP1H Movlw 184 Page 23 Smart Card Based Door Security System Call dly@w MAIN Bcf PORTC,6 Bcf PORTC,7 Clrf TEMP Call Lcd@Cls Movlw 128 Movwf BPFH Movlw 128 Call LCD@crs Movlw 67 Call Print Movlw 65 Call Print Movlw 82 Call Print Movlw 68 Call Print Movlw 32 Page 24 Smart Card Based Door Security System Call Print Movlw 65 Call Print Movlw 67 Call Print Call Print Movlw 69 Call Print Movlw 83 Call Print Call Print Call Print Movlw 32 Call Print Movlw 83 Call Print Movlw 89 Call Print Movlw 83 Call Print Movlw 128 Page 25 Smart Card Based Door Security System Movwf BPFH Movlw 192 Call LCD@crs Movlw 69 Call Print Movlw 78 Call Print Movlw 84 Call Print Movlw 69 Call Print Movlw 82 Call Print Movlw 32 Call Print Movlw 85 Call Print Movlw 82 Call Print Movlw 32 Call Print Page 26 Smart Card Based Door Security System Movlw 67 Call Print Movlw 65 Call Print Movlw 82 Call Print Movlw 68 Call Print Movlw 32 Call Print Movlw 62 Call Print Call Print Movlw 1 Movwf PP1H Movlw 244 Call dly@w Movlw 1 Btfsc PORTB,7 Clrw Movwf SP#P9 Page 27 Smart Card Based Door Security System Movlw 1 Btfsc PORTB,2 Clrw Andwf SP#P9,W Btfsc STATUS,2 Goto bc@LL5 Goto READ_DATA Goto bc@LL6 CHECK Movlw 101 Subwf TEMP,W Btfss STATUS,2 Goto bc@LL8 Call Lcd@Cls Movlw 128 Movwf BPFH Movlw 128 Call LCD@crs Movlw 67 Page 28 Smart Card Based Door Security System Call Print Movlw 65 Call Print Movlw 82 Call Print Movlw 68 Call Print Movlw 32 Call Print Movlw 65 Call Print Movlw 67 Call Print Call Print Movlw 69 Call Print Movlw 83 Call Print Call Print Call Print Movlw 32 Page 29 Smart Card Based Door Security System Call Print Movlw 83 Call Print Movlw 89 Call Print Movlw 83 Call Print Movlw 128 Movwf BPFH Movlw 192 Call LCD@crs Movlw 86 Call Print Movlw 65 Call Print Movlw 76 Call Print Movlw 73 Call Print Movlw 68 Call Print Page 30 Smart Card Based Door Security System Movlw 32 Call Print Movlw 85 Call Print Movlw 83 Call Print Movlw 69 Call Print Movlw 82 Call Print Movlw 32 Call Print Movlw 49 Call Print Movlw 100 Call dl@ms Bsf PORTC,6 Bsf PORTC,7 Movlw 1 Movwf PP1H Page 31 Smart Card Based Door Security System Movlw 244 Call dly@w USER_1 Bcf PORTC,7 Movlw 15 Movwf PP1H Movlw 160 Call dly@w Btfsc PORTB,7 Goto bc@LL11 Goto USER_1 bc@LL11 Goto bc@LL7 bc@LL8 Movlw 102 Subwf TEMP,W Btfss STATUS,2 Goto bc@LL13 Call Lcd@Cls Movlw 128 Page 32 Smart Card Based Door Security System Movwf BPFH Movlw 128 Call LCD@crs Movlw 67 Call Print Movlw 65 Call Print Movlw 82 Call Print Movlw 68 Call Print Movlw 32 Call Print Movlw 65 Call Print Movlw 67 Call Print Call Print Movlw 69 Call Print Movlw 83 Page 33 Smart Card Based Door Security System Call Print Call Print Call Print Movlw 32 Call Print Movlw 83 Call Print Movlw 89 Call Print Movlw 83 Call Print Movlw 128 Movwf BPFH Movlw 192 Call LCD@crs Movlw 86 Call Print Movlw 65 Call Print Movlw 76 Call Print Page 34 Smart Card Based Door Security System Movlw 73 Call Print Movlw 68 Call Print Movlw 32 Call Print Movlw 85 Call Print Movlw 83 Call Print Movlw 69 Call Print Movlw 82 Call Print Movlw 32 Call Print Movlw 50 Call Print Movlw 100 Call dl@ms Bsf PORTC,6 Page 35 Smart Card Based Door Security System Bsf PORTC,7 Movlw 1 Movwf PP1H Movlw 244 Call dly@w Page 36 Smart Card Based Door Security System 7. ADVNTAGES Low Cost : Smart cards are electronic devices made in the millions; though costs vary, most run between 7 to 15 cents. The smart card itself need not cost significantly more than a standard photo ID, so managers can issue smart cards to as many employees as circumstances require. Most of the cost of an smart card system lies in the electronic readers, locks, computers and related software. Secure Data : The data on an smart card is readable only with special equipment, keeping the data recorded on the chip secure. Also, the data need only be meaningful to your own organization. You can record a unique employee ID code and other data known only to your company. A lost card typically conveys little useful information to someone without detailed knowledge of your organization's security. Flexibility: With the right equipment, you can reprogram an existing smart card with new information. For example, if an employee receives a change in security clearance or transfers to a different department, he can get his card updated to reflect his new status. When the company decides to revamp the security system, the department responsible for the cards can revise the data on the cards without needing to issue new ones. Ease of Use: An smart card is just as useful in your pocket or clipped to your shirt. Because the smart system uses radio waves, the card's proximity to the reader triggers the system. Unlike a magnetic stripe card, an smart card doesn't need to make physical contact with the reader. This adds convenience when you're carrying an armload of boxes and want access to a locked room, for example. Page 37 Smart Card Based Door Security System 8. DISADVANTAGES Easily Lost Like a credit card, smart cards are small, lightweight and can be easily lost if the person is irresponsible. Unlike credit cards, smart cards can have multiple uses and so the loss may be much more inconvenient. If you lose a card that doubles as a debit card, bus pass and key to the office, you could be severely inconvenienced for a number of days. Security A second disadvantage of the using smart cards is their level of security. They are more secure than swipe cards. However, they are not as secure as some in the general public would believe. This creates a false sense of security and someone might not be as diligent as protecting their card and the details it holds. Slow Adoption If used as a payment card, not every store or restaurant will have the hardware necessary to use these cards. One of the reasons for this is since the technology is more secure, it is also more expensive to produce and use. Therefore, some stores may charge a basic minimum fee for using smart cards for payment, rather than cash. Page 38 Smart Card Based Door Security System 9. APPLICATIONS This is smart card based Access system is used in following applications 1. Bank 2. ATM 3. Bank Lockers 4. Schools 5. College 6. Home security application. Page 39 Smart Card Based Door Security System 10. CONCLUSION Integrating features of all the hardware components used have been developed in it. Presence of every module has been reasoned out and placed carefully, thus contributing to the best working of the unit. Secondly, using highly advanced IC’s with the help of growing technology, the project has been successfully implemented. Thus the project has been successfully designed and tested. Page 40 Smart Card Based Door Security System 11. REFERENCES The sites which were used while doing this project: 1. www.wikipedia.com 2. www.allaboutcircuits.com 3. www.microchip.com 4. www.howstuffworks.com Books referred: 1. Raj kamal –Microcontrollers Architecture, Programming, Interfacing and System Design. 2. Mazidi and Mazidi –Embedded Systems. 3. PCB Design Tutorial –David.L.Jones. 4. PIC Microcontroller Manual – Microchip. Page 41