RFID LOCKING SYSTEM
“Oh! Such a big line RFID LOCKING SYSTEM. Is there any type of solution to deliver the goods faster with security” Have you ever wished it? The answer would be “Yes!”
So! Here is RFID Technology – Radio Frequency Identification Technology. As the name defines it identifies radio frequencies. Let me tell you
What it is? What does it do? Can we do it? If yes how! Applications! Why this? And all regarding.
RFID locking system
It is a wireless communication system, where an object, animal or person is identified. It means using electromagnetic or electrostatic coupling the objects are identified but only in the radio frequency portion. Basing on this technology locking system is developed.
First, let us discuss this choice:
1. These do not require a direct line of sight to read.
2. We usually store data in a tag to identify the objects. In barcodes i.e. which are presently used for scanning in identification, data is read-only whereas in RFID tags we can update that data in real-time.
3.RFID tags require a power source. In contrast barcodes, themselves require the technology for reading the barcode to have a power source.
How does RFID work?
This is the block diagram of the working. The generator in the Reader or Interrogator generates the waves. And if the tag or transponder (tag is attached to the object which is to be detected) is in the area of generated waves then the receiver in the tag receives the waves and controls the machine and send the feedback, there is also a part for memory in this tag which stores the data for identification. The Antenna is used to transfer the information.
The locking system is one of the applications of RFID. Here locking and unlocking of doors are done using the RFID technology.
Before people in hotels and companies used magnetic strip locks but then because of the advantages of RFID lock systems the popularity of this has increased.
When you have your card and you are a certain distance from the lock, it is at this point that the key card, the lock, and the computer system will exchange the required data, and you will be given access, provided the data is matching.
How to do?
Sounds interesting right! Why don’t you try to do it? let’s see how.
Materials required
- Arduino UNO board
- RFID combo -1
- Jumpers (Male to Male & Male to Female) – 1
- 9V battery(with adapter)– 1
- Servo – 1
Procedure
Step1:
Dump the code into the Arduino. Before dumping the code check the UID of the tag and go on. To check the UID open the serial monitor and put the tag on the reader the UID of the tag will be displayed, paste that UID in the program and then dump the code.
NOTE: Check whether the access is denied if we put a different tag in front of the reader.
#include <SPI.h>
#include <MFRC522.h>
#include <Servo.h>
#define SS_PIN 10
#define RST_PIN 9
#define SERVO_PIN 3
Servo myservo;
#define ACCESS_DELAY 2000
#define DENIED_DELAY 1000
MFRC522 mfrc522(SS_PIN, RST_PIN); // Create MFRC522 instance.
void setup()
{
Serial.begin(9600); // Initiate a serial communication
SPI.begin(); // Initiate SPI bus
mfrc522.PCD_Init(); // Initiate MFRC522
myservo.attach(SERVO_PIN);
myservo.write( 70 );
delay(7500);
myservo.write( 0 );
Serial.println(“Put your card to the reader…”);
Serial.println();
}
void loop()
{
// Look for new cards
if ( ! mfrc522.PICC_IsNewCardPresent())
{
return;
}
// Select one of the cards
if ( ! mfrc522.PICC_ReadCardSerial())
{
return;
}
//Show UID on serial monitor
Serial.print(“UID tag :”);
String content= “”;
byte letter;
for (byte i = 0; i < mfrc522.uid.size; i++)
{
Serial.print(mfrc522.uid.uidByte[i] < 0x10 ? ” 0″ : ” “);
Serial.print(mfrc522.uid.uidByte[i], HEX);
content.concat(String(mfrc522.uid.uidByte[i] < 0x10 ? ” 0″ : ” “));
content.concat(String(mfrc522.uid.uidByte[i], HEX));
}
Serial.println();
Serial.print(“Message : “);
content.toUpperCase();
if (content.substring(1) == “___________”) //change here the UID of the card
{
Serial.println(“Authorized access”);
Serial.println();
myservo.write( 70 );
delay(7500);
myservo.write( 0 );
}
else
{
Serial.println(” Access denied”);
delay(DENIED_DELAY);
}
}