0% found this document useful (0 votes)
18 views24 pages

Door Access Using Smart Card

The document describes a project that uses smart cards to access an electronically locked door. It aims to create a database log of visits by card users for tracking purposes. The project uses Microsoft Access for the databases and interface, and ZeitControl Professional IDE for the smart cards. The program was designed to be used by both card customers and administrators.

Uploaded by

dumpppampe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views24 pages

Door Access Using Smart Card

The document describes a project that uses smart cards to access an electronically locked door. It aims to create a database log of visits by card users for tracking purposes. The project uses Microsoft Access for the databases and interface, and ZeitControl Professional IDE for the smart cards. The program was designed to be used by both card customers and administrators.

Uploaded by

dumpppampe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

DOOR ACCESS USING SMART CARD

FOOTZEYAW

This project is submitted in partial fulfilment of


the requirements for the degree of Bachelor of Engineering with Honours
(Electronics and Telecommunication Engineering)

Faculty of Engineering
UNIVERSITI MALAYSIA SARAWAK
2004
To my Beloved Family and Friends

1
ACKNOWLEDGEMENT

First, I would like to thank God for His grace and mercy upon the thesis

project and for blessing me with a supportive supervisor, family members and friends.

It is my pleasure to acknowledge the very considerable assistance given to me

in the preparation of this thesis. I would like to extend my sincere gratitude to Mr.

Martin Anyi, for his many constructive guidance and suggestions.

I would also like to thank my family members especially my father, mother

and sisters who continually supported me throughout the thesis project; also not

forgetting all my friends for their unceasing support and encouragement.

I would also like to acknowledge my appreciation to my seniors by their

projects concerning smart card applications. If it were not by them I could not have

gone on with my project well.

Last but not least, to those who have helped and supported me in completing

the thesis project, thank you very much.

11
ABSTRACT

Smart Card has become the necessity in modern lifestyle. The main objective

of this project is to access an electronically locked door, at the same time to create a

log inside the database about the visitations done by the card users, for tracking

purposes. The software used to run the project are Microsoft Access for the databases

and the interface, and ZeitControl Professional IDE for the smart card. The program

was designed in such a way it is available to both card customers and administrators.

ill
ABSTRAK

Kad Pintar telah menjadi satu keperluan dalam kehidupan modem. Objektif

utama projek ini ialah untuk membuka kunci pintu elektronik, pada masa yang sarna

menghasilkan log ke dalam pangkalan data mengenai lawatan-Iawatan ke pintu yang

dibuat oleh penguna kad, agar dapat disemak balik. Perisian yang digunakan untuk

menjalankan projek ini ialah Microsoft Access untuk menghasilkan pangkalan data

dan antara muka, serta ZeitControl Professional IDE untuk kad pintar. Program

tersebut direkabentuk sebegitu supaya dapat digunakan oleh kedua-dua pihak yakni

pengguna dan pentadbir

IV
Table of Contents

Dedication

ACKNOWLEDGEMENT 11

ABSTRACT iii

ABSTRAK IV

Table of Contents V

List of Figures Xl

List of Tables XlV

CHAPTER 1 INTRODUCTION 1

1.1 Background 1

1.2 The Need for Security 1

1.3 Objectives/ Purposes of Project 1

1.4 Project Overview 2

CHAPTER 2 THE SMART CARD AND READER 5

2.1 Overview of Smart Card 5

2.2 Brief History of Smart Card 5

2.3 Types of Smart Card 6

2.3.1 Classification 1: Internal Chip 6

2.3.1.1 Memory card 6

2.3.1.2 Microprocessor Card 7

2.3.2 Classification 2: Physical Characteristics 8

v
2.3.2.1 Contact Smart Card 9

2.3.2.2 Contactless Smart Card 9

2.3.2.3 Combi Smart Card 10

2.4 Card Operating System (COS) 11

2.5 Smart Card Reader 12

2.5.1 The Interaction 12

2.5.2 EIA-232 Interface 14

2.5.3 Software 17

2.5.3.1 Host software 18

2.5.3.2 Card Software 18

2.6 Smart Card Standards 19

2.7 Application 21

2.8 Conclusion 23

CHAPTER 3 MICROSOFT ACCESS: THE DATABASE SYSTEM 24

3.1 Overview of Database System 24

3.2 The Database Management System 24

3.2.1 Why Microsoft Access? 25

3.3 Designing the Database 28

3.4 Choices of Data Types 29

3.5 Primary Key 30

3.6 Relationships 32

3.6.1 One-to-many Relationship (1 - ex::» 35

3.6.2 Many-to-many Relationship (ex::> - ex::>, or 1 - ex::> [table] ex::> - 1) 36

VI
3.6.3 One-to-one Relationship (1-1) 37

3.7 Conclusion 37

CHAPTER 4 PROJECT PLANNING 40

4.1 Configuration and Connection 40

4.2 The Process 41

4.3 Designing the Database of Door Access Application 43

4.4 The Tables and Fields Planned to be used in Database for Door Access 45

4.5 Creating Relationships 46

4.6 Miscellaneous 48

4.7 Conclusion 49

CHAPTER 5 DEVELOPMENT OF APPLICA nON 50

5.1 Introduction 50

5.2 Requirements specification 50

5.2.1 Card Software 52

5.2.2 Host Software 53

5.3 Design 56

5.3.1 Description of Layers 56

5.3.1.1 Application Layer 56

5.3.1.2 Security Layer 57

5.3.1.3 Smart Card Accessing Layer 57

5.3.1.4 Card Reader Accessing Layer 57

5.4 Algorithm 58

Vll
5.5 Implementation 64

5.5.1 Card Software 69

5.5.2 Host Software 71

5.5.2.1 Card Reader Accessing Layer 72

5.5.2.2 Smart Card Accessing Layer 73

5.5.2.3 Security Layer 73

5.5.2.4 Application Layer 75

5.5.2.5 Error Handling Layer 77

5.6 Conclusion 78

CHAPTER 6 TEST STAGE AND PROBLEMS ENCOUNTERED 79

6.1 Introduction 79

6.2 Problems Encountered and Solution 79

6.2.1 Version Incompatibility 79

6.2.2 Conditional statements 80

6.3 Conclusion 81

CHAPTER 7 RECOMMENDATION AND CONCLUSION 82

7.1 Introduction 82

7.2 Recommendations 82

7.2.1 Multiple readers with remote database link 83

7.2.2 Multi-Applications 83

7.3 Conclusion 83

Vlli
APPENDIX A 85

DoorCard.bas 86

DoorCard.def 94

Commands.def 95

Dealer.key 97

Issuer.key 97

APPENDIXB 98

frmChgMasterPIN form 99

frmChgPIN form 100

frmDealer form 101

frmDoorSelect form 108

frmIssuer form 109

frmStartUp form 123

frmTrace form 124

frm VerifyMasterPIN form 126

frm VerifyPIN form 127

mdlCustom standard module 128

mdlLPTI standard module 128

mdlZeitControl standard module 129

DoorCtrl class module 130

UserFunctions class module 130

IX
APPENDIXC 146

Parallel Port Connector Pin Assignment 146

REFERENCES 147

Chapter 2 147

Chapter 3 148

Chapter 4 149

BIBLIOGRAPHY 150

Chapter 1 150

Chapter 2 150

Chapter 4 150

INDEX 151

x
List of Figures

Figure 1.1 Outline of the Door Access using Smart Card System 2

Figure 1.2 The reader inputs card's data to Pc. The process stops there
and does not proceed further if the card is found fake. 3

Figure 1.3 If the card is valid, then the PC sends signal to unlock the
~~ 3

Figure 2.1 Typical architecture of a memory card with security logic [2­
4] 7

Figure 2.2 Typical architecture of microprocessor card [2-5] 8

Figure 2.3 Contact Smart Card and its Micro-module contact points [2-6]
9

Figure 2.4 Contactless Smart Card. The crescents indicate the direction
of signal radiation. [2-7] 10

Figure 2.5 the interaction between CAD connected to the terminal and
the smart card. The reader accepts commands from the
computer, carries out the specified function at the smart card
and returns the requested data or status information. 13

Figure 2.6 Normal connection of EIA-232 (DTEs connected through


DCEs) 14

Figure 2.7 Null modem connection of EIA-232 (DTEs connected


directly) 15

Figure 2.8 Null modem pin configuration ofEIA-232 interface 16

Figure 2.9 Electrical Specification for sending data in EIA-232 [2-11] 16

Figure 2.10 Electrical specification for control signals in EIA-232 [2-12] 17

Figure 2.11 Common data frame (data unit) for smart card data transfer 17

Figure 2.12 Example of data streams that will be stored inside the flash
memory of the card 22

Figure 3.1 Typical components of a database system [3-3] 24

Figure 3.2 The two standard query languages used in Microsoft Access:
(a) QBE and (b) SQL. Note that both languages shown here

Xl
refer to the same query table, which will display the names
of contacts that does not have telephone number stored in
the database. The circled numbers in QBE indicate the
matching parts between the QBE and the command line
numbers in SQL. 27

Figure 3.3 Design view of the table "Visitor" in the database for Door
Access system. The primary key field (Card ID) is indicated
with a symbol of a key. 31

Figure 3.4 The location of "Relationships" button (shown in the light


colored arrow) 32

Figure 3.5 Adding tables into the "Relationships" window 32

Figure 3.6 "Edit relationship" dialog box 33

Figure 3.7 One-to-many relationship between table Supplier and table


Product [3-12] 34

Figure 3.8 Many-to-many relationship between table Orders and table


Products, with a junction table Order Details [3-13] 35

Figure 3.9 One-to-one relationship between table Employees and table


Soccer [3-14] 36

Figure 3.10 The typical relationships between tables m Contact-book


Database 38

Figure 4.1 Basic peripheral configuration of the door access system. The
block arrows show the allowed direction of throughput. 39

Figure 4.2 The reader reads the card ID from the card and sends it to PC
via PS/2-COM 1 connection. The PC loads records from
database to fmd a match for the card ID code. The process
stops and does not proceed further if no match is found. 41

Figure 4.3 If a match is found, the PC sends signal to drive relay to


unlock the door. At the same time it also writes a new record
about visitation of the card user inside the database. 42

Figure 4.4 Relationship between tables in database for Door Access


Application. The tables "Door" and "Visitor" are the primary
tables while the table "Visitation" is the junction table. 46

Figure 4.5 The junction table (secondary table) "Visitation" 46

Figure 4.6 Trace of "Visitation" from primary table "Visitor" 47

Figure 4.7 Trace of "Visitation" from primary table "Door" 47

XI1
''''ii:

Figure 5.1 Structure of the software in Door Access system 51

Figure 5.2 The sequence of events in the door access system (Dealer
program) 53

Figure 5.3 The sequence of events in the door access system (Issuer
program) 54

Figure 5.4 Four Layers of the Software 55

Figure 5.5 Flow chart of Issuer Program 59

Figure 5.6 Flow chart ofthe (a) personalization program and (b) unlock
card program 60

Figure 5.7 Flow chart of the Dealer Program 62

Figure 5.8 Flow chart of the (a) Door Accessing Program; (b) change
PIN program 63

Figure 5.9 The files involved in the compilation of card software. One
should open the project file (with the file extension ZCP) in
order to view the source files included in the project. 64

Figure 5.10 ZeitControl Professional IDE, the card software developer


and compiler 65

Figure 5.11 The button to open the code builder window in Microsoft
Access. A form or module must be selected in order to enable
this button. 66

Figure 5.12 The code builder window. In order to include the components
for the programs, select the menu: Tools ~ References. 67

Figure 5.13 The references included in the terminal program (host


software) code builder. 68

Figure 5.14 Interface for Issuer Terminal 74

Figure 5.15 Interface of the Dealer Program 75

Xlll
List of Tables

Table 2.1 ISO 7816-X Specifications [2-14] 20

Table 2.2 Features ofZC33 Enhanced Basic Card [2-15] 21

Table 3.1 Data types for Access Database [3-9] 29

Table 4.1 The tables and their fields with description in the database for
door access application. PK Primary Key; FK Foreign
Key 44

Table 5.1 Requirement specification of the door access system. 50

Table 5.2 Description of EEPROM variables in the card program. Note


that the Card Identification Number (CardID) should not be
mistaken as the Personal Identification Number (PIN) or
MasterPIN. 69

Table 53 Description of commands in card program. These commands


will be used together with the terminal program. 70

Table 6.1 Some examples of the difference in syntax between Visual


Basic 6.0 and Visual Basic for Microsoft Access to operate
the same function 79

XlV
CHAPTER 1

INTRODUCTION

1.1 Background

Smart Cards are known to be useful in providing data transfer and carrying

business in a convenient way, but with security features. As a credit-card sized

plastic card with an advance internal electronic circuits, smart cards fmd their use in

variety of applications ranging from access and security to retailing.

The author's project is a smart card system used for door accessing. In order

to unlock the door, the smart card user must insert the smart card for the reader to

verify its identity (lD) code.

1.2 The Need for Security

Unauthorized access to a premise, room or information is happening everyday.

Because of this, the demand for security to protect the concerned property is

increasingly high. One way to meet the needs of security and to solve the problem of

unauthorized access is using smart card door access system.

1.3 Objectives/ Purposes of Project

The main objective of the project is to develop a smart card door access

system, to meet the basic demand for security today.

To do this, the author is to achieve the following requirements, which are

derived as micro objectives of this project:

1
• Study and compare the smart card projects done by his senior students.

• Improve/modify the necessary part of the program of card reader that reads

the information code from the smart card.

• Apply the implemented card reader program to a simulated door lock / apply

the door access feature to the program to realize the project.

1.4 Project Overview

Smart Card Send the


Card card data PC
Reader
:> Smart Card
Program

Door 1< Send the unlock


I
command

Figure 1.1 Outline ofthe Door Access using Smart Card System

Figure 1.1 shows the Outline of the Door Access using Smart Card System.

The personal computer (PC) acts as a controller of the whole system, having smart

card program running inside. It has the input port from the smart card reader, and

output port to control the door lock.

When a card is inserted into the card reader, the PC will check the card to see

if the card is a valid door access smart card. If it is not, the door remains locked.

2
P AS

Smart Card Send the


Card card data PC
Reader
Smart Card
Program

Door 1< Send the unlock


I
command

Figure 1.2 The reader inputs card's data to Pc. The process stops there and does
not proceed further if the card is found fake.

But if the card is found true, PC will send a signal to the output port to unlock

the door (Figure 1.3). The user then will be able to open the door.

Smart Card Send the


Card card data PC
Reader
:> Smart Card
Program

Door
Send the unlock
command

Figure 1.3 If the card is valid, then the PC sends signal to unlock the door.

After certain duration, The PC will output again a signal to relock the door, so

that other unauthorized person could not open the door.

3
In the next few chapters, the author reviews on what he has learnt from

literature about the components involved in the system, and intends to apply what he

knows about the components to make the system work.

4
CHAPTER 2

THE SMART CARD AND READER

2.1 Overview of Smart Card

The term Smart Card is not new anymore to Malaysians than to other people

from developed countries since the introduction of Government Multi-purpose Card

(GMPC) in the Project of Multimedia Super Corridor (MSC). People has learnt of the

use of this particular application of smart card as the integrated functions of

traditional identity card (IC), phone card, credit card, bank card, and others.

Though smart card's existence has changed the way we live as much as any

data communication networks [2-1], only few people got to know what a smart card

is really defmed as. In general, a smart card is in fact a plastic card, with the size

same as of a credit card, but also with an embedded computer chip. The chip is either

a microprocessor with internal memory or just a memory chip with non­

programmable logic. The chip connection is either via direct physical contact or via

contactless radio link (RF) [2-2]

2.2 Brief History of Smart Card

Smart Cards started off by their structure layout just patented in the seventies

by Germany, Japan and France. The immaturity of semiconductor technology, as

well as other minor factors caused the work on smart cards being confined at the

research and development level at that time [2-3]. The beginning of eighties, in

which semiconductor technology was becoming more advanced, allowed the smart

5
,..'

cards to be tested and verified to be high in performance and useful especially in

applications like banking transactions and telephone prepaid business. Since then

until now, massive production and intense improvement of smart cards have been

carried on over the years.

2.3 Types of Smart Card

There are several ways to classify the types of smart card, depending on the

particulars or the aspects to distinguish between them.

2.3.1 Classification 1: Internal Chip

Basing on the internal chip classification, Smart Cards can be divided into

two types: memory cards and microprocessor cards.

2.3.1.1 Memory card

Memory card is basically an information storing card, which only store data

and has no or little data processing capabilities [2-4]. The storage can be Erasable

Programmable Read-Only Memory (EPROM), Electronically Erasable

Programmable Read-Only Memory (EEPROM), or Flash memory (A faster read­

write version of EEPROM).

6
Access Logic

Identification data
Address and
Security Logic

D+-........ va
Flash Memory
D +-..-. Clk
D+-........ Control Channel
D +-..-. Vee
D ~-+-. GND

Data storage

Figure 2.1 Typical architecture ofa memory card with security logic [2-4]

Access to memory is controlled by security logic VIa the synchronous

transmission protocol, a simple protocol consisting of only write or erase protection

for the memory. The data is transmitted to and from the card via the I/O port. With

low manufacturing cost, memory card finds its useful application in pre-paid phone

service, health insurance and electronic payment, where the card will cease its

function if all the internal memory units are used up, and can be reloaded by resetting

the data with security code.

2.3.1.2 Microprocessor Card

Unlike memory card, which uses address and security logic to do nothing

more than accessing data, a microprocessor card has a processor inside it to process

data as well as manage data storage. It has also other functional blocks like Flash

memory, 110 port, mask-ROM and RAM.

7
p

Processor

Operating
System
Working
memory I
Application D 110
Flash D elk
Memory D Reset
D Vee
D GND

Data storage

Figure 2. 2 Typical architecture ofmicroprocessor card {2-5]

Beside data processing and storage management, the Central Processing Unit

(CPU), or processor, makes decisions by the needs of card issuer's specific

applications. With the ability to add, delete and otherwise manipulate information in

its memory, microprocessor cards can be added with new applications or reinstall

certain applications to increase its functionality, provided that the processing capacity

(RAM) and storage capacity (Flash memory) is large enough. Because of these,

microprocessor card is more flexible in use and high in security, but with the expanse

of its cost. Today's uses of microprocessor card include bank card with advance

security feature, multi-purpose card, and smart antenna card.

2.3.2 Classification 2: Physical Characteristics

Smart card can also be classified into three distinctive groups according to its

physical characteristics: contact, contactiess, and combination ofboth.

8
2.3.2.1 Contact Smart Card

Contact smart card requires insertion into a smart card reader in order to

make a direct physical connection to a conductive micro-module on the surface of the

card, which is typically gold platted. After the connection between the contacts of the

card and the reader is made, data transfer to and from the chip is able to take place.

Vee GND
RST
VO

RFU

Legend
Vee - Power Supply Voltage
RST - Reset the Microprocessor
CLK - Clock Signal
GND-Ground
Vpp - Programming Voltage
VO - Serial Input/Output Line
RFU - Reserved for Future Use

Figure 2.3 Contact Smart Card and its Micro-module contact points [2-6J

2.3.2.2 Contactless Smart Card

Instead of making direct physical connection with card reader, the contactless

smart card communicates with the reader via radio link. Therefore a contactless

smart card requires an antenna connected to its chip, sandwiched by top and bottom

layers of the card. To be read by the reader, the card must be placed in close

You might also like