RFID & Door Lock

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

RFID

Radio Frequency IDentification systems

Definition of RFID
For many of us, using a key to start a car, a card to access a building or
room and validating a bus or underground ticket have become part of our
daily routine. Without always realising it, we use automatic data capture
technology that relies on radio-frequency electromagnetic fields. This
.technology is known as Radio-Frequency IDentification or RFID
RFID (Radio Frequency Identification) can be defined as follows: Automatic
identification technology which uses radio-frequency electromagnetic
.fields to identify objects carrying tags when they come close to a reader
However, RFID cannot be reduced to one technology. RFID uses several
radio frequencies and many types of tag exist with different
.communication methods and power supply sources
RFID tags generally feature an electronic chip with an antenna in order to
pass information onto the interrogator (also known as a base station or
more generally, reader)

?How does RFID Work


:A Radio-Frequency IDentification system has three parts
A scanning antenna- 1
A transceiver with a decoder to interpret the data - 2
A transponder - the RFID tag - that has been -3
.programmed with
information
The scanning antenna puts out radio-frequency signals
in a relatively short range. The RF radiation does two
:things
It provides a means of communicating with the - 1
transponder (the RFID tag)
It provides the RFID tag with the energy to - 2
communicate

This is an absolutely key part of the technology; RFID tags donot need to contain
batteries, and can therefore remain
.usable for very long periods of time (maybe
decades)

The scanning antennas can be permanently affixed to asurface; handheld antennas


are also available. They can
take whatever shape you need; for example, you could
build
them into a door frame to accept data from persons or objects
.passing through

When an RFID tag passes through the field of the scanningantenna, it detects the
activation signal from the
antenna. That "wakes up" the RFID chip, and it transmits the
information on its microchip to be picked up by the scanning
.antenna

In addition, the RFID tag may be of one of two types -

have their own power source; theActive RFID tags


advantage of these
tags is that the reader can be
much farther away and still get the
signal. Even
though some of these devices
are built to have up to a
. 10 year life span, they have limited life spans
however, do not require batteries, and , Passive RFID tags
can be
much smaller and have a virtually
.unlimited life span
RFID tags can be read in a wide variety of circumstances, where
barcodes or other optically read technologies are
.useless
The tag need not be on the surface of the object (and is - 1
therefore not
subject to wear)
The read time is typically less than 100 milliseconds- 2
Large numbers of tags can be read at once rather than - 3
.item by item

Illustration for RFID

Now well discuss RFID 125k


module

: Parameters

Working frequency: 125Khz: 1


Baud rate: 9600: 2
Output interface: TTL, RS232: 3
Working voltage: DC3.3V-5V: 4
Working current: 19mA to: 5
25mA
Distance of reading card: up to : 6
.
70mm
Working temperature: -10 to: 7
+70
Storage temperature: -20 to: 8
+80
Relative temperature: 0%~95%: 9
square coil size:60mm*35mm: 10
Module size:18mm*13mm : 11
Card type: ID: 13

Pins definition

V 5V/3.3V) 1(
G GND) 2(
TX Series port output) 3(
RX With or without card indication ) 4(
WO Wiegand data 0
(7) T1 Antenna 1 ) 5(
W1 Wiegand data 1
(8) T2 Antenna 2 ) 6(

How to interface RFID with


arduino

Red cable: +Vdc


Black cable: GND
Green cable: Signal

How does electromagnetic door lock


?work
When current flows through the electromagnet, it creates a
strong magnetic field, attracting the relatively large surface of
the armature plate on the door. The magnetic field is strong
enough to prevent the door from being forced open, requiring a
user to input a security code or present a badge to deactivate the
.electromagnet and free the door

Most electromagnetic locks are "fail-safe." This means that when


the power fails, the door unlocks. This is so people don't become
trapped inside secure facilities in case of a fire or other powersupply disruptions. In "fail-secure" electromagnetic locks, the
magnet holds back a spring-loaded or weighted locking
mechanism. In this case, the door unlocks only while the power is
on, and if the power fails, the door seals. These are commonly
used in vaults and other high-security areas, to prevent outsiders
.from breaking in by simply cutting the power

Magnetic door lock


operation
This type of door locks offers a number ofadvantages
which are constituent parts of
the overall security and
efficiency of the
lock. First of all, these locks are very
difficult to damage in comparison with the
traditional lock cylinders. Having such a lock
at home you won't
need to constantly
remember where your keys are as
this
system doesn't use any keys. Those locks are
directly connected with an electrical
system of security, so you will be
immediately informed if anyone tries to
.damage your lock

There're four basic operation methods of magnetic door locks. The first method involves a buzzer and has to be
manually operated to open the
door by releasing the
lock. The second involves the use of a keypad
system that opens and closes the door with a numerical
code. The third one presupposes the use of special card
readers and is mainly used for
businesses and
commercial buildings. At last, magnetic locks can be
operated with the use of fingerprint scanners by means of
which only
chosen people can enter and leave the
building. There are also more
complicated systems
that involve scanning different parts of the body for
.instance, the eye and other facial parts

You might also like