Vous êtes sur la page 1sur 4

MICROCONTROLLER BASED CODED CARD SECURITY SYSTEM

[Using PIC Micro-controller]

1. INTRODUCTION

The Coded Card Security System using PIC Micro-controller is a novel approach to modern automated
security management. This system helps in the field of Security Automation, by monitoring and
managing the security of an industry, financial institution, commercial complex, hospitals, banks,
storage rooms, military base, etc.

The Coded Card Security System consists of a number of coded cards, PIC Micro-controller as brain,
door driving mechanism and a number of sensors and an alarm circuit. The special feature of this novel
system is that each authorised person is given a card which generates electric signals once it is
powered on. The PIC Micro-controller is able to detect the signals generated by the card and will
compare the signal with the valid signals stored in its memory. Any card other than those provided to
the authorised persons will be rejected by the system. For the right card, the system will activate the
door so that the person can enter the security zone.

Here with the help of coded cards, the person who is authorised to enter the protected zone is also
achieved. To enter the protected area, the person must insert his privileged coded card inside the card
holder. If the data entered by his coded card does not match with the data stored in the PIC Micro-
controllers memory, the door will not be activated and hence the person trying to get inside illegally is
not allowed to do so. In case, an unauthorised person enters the secured premises by some other
means i.e. other than the door, then an alarm is sounded to alert the security persons. The alarm
section makes use of Burglar Alarm to detect the entering of unauthorised person.

MAIN FEATURES OF THE PROJECT :


1. Economical in nature, simple in design & operation.
2. Highly flexible in nature. The system can be used as a stand-alone unit.
3. Due to the PIC Micro-controller Interface facility, the system is highly accurate & automatic
in nature.
4. Since this system is associated with a PIC Micro-controller, it is very easy to re-
programming changed security norms and criteria.
BLOCK DIAGRAM DESCRIPTION

PIC INTERFA TO
MICRO- CING ELECTR DO
CONTR CARD O- OR
OLLER MECHANI
CAL
CAR DRIVER
D STAGE
HOL
DER
CARR TRANSM
IER ITTER
GENE
RATO
R

POW
ER
I II SUPP
LY
III MULTI
CHANNE
SIR
L
EN
ALARM
Fig 2.1 Block Diagram of CODED CARD
NETWOR
SECURITY SYSTEM
K

The Coded Card Security System using PIC Micro-controller is built up using several
blocks and inter-related with each other as shown in Fig 2.1. The over all explanation of
Block Diagram goes like this:

As soon as the card is placed in its socket, Card Holder, coded card will start generating electrical
signals, which are sent to the Card Reader. If the valid card is inserted then the signal generated
by the card will match one of the signal patterns stored in the PIC Micro-controller based Card
Reader and as a result it will activate the electromechanical driver stage which will open the door.
While coming out of the protected zone the same procedure has to be repeated.

It may happen that an unauthorised person tries to enter the protected zone from some other entry
i.e. other than the door, then to avoid such an attempt a multi-channel alarm system is fixed. The
alarm system makes use of Burglar Alarm, which detects moving objects and upon detection
activates the siren.

2
PIC Micro-controller will take care of checking the validation of inserted coded card. And when
Burglar Alarm detects unauthorised entry in protected zone, PIC alerts the related authority by
beeping the buzzer.The Block Diagram is divided into three parts: PIC Micro-controller based Card
Reader; Interface Card; & Burglar Alarm. PIC MICRO-CONTROLLER BASED CARD READER:
When person his coded card inside the card holder PIC Micro-controller based Card Reader
verifies the entered data and found correct allows him to enter the protected zone. This privilege to
enter the protected zone is set for three levels: Administrator Level; Manager Level; Employee
Level.Here the PIC Micro-controller based Card Reader is smart enough to distinguish between
these three levels by reading the inserted cards code. The Employee Level privilege allows the
employee to enter the single door, which he supposed to enter. In this level employees are allowed
to enter their working departments. The Manager Level privilege allows the employee to enter the
single door. In this level Department Heads are allowed to enter their departments restricted
areas. The Store Manager is allowed to enter the store room where all extra tools, materials are
stored. The Account Department Head is allowed to enter the Confidential Record Room to access
some data or file. The third & high privileged level is Administrator Level. Here the Administrator or
owner of the Employee can enter either zone without any barrier. Because he is boss and needs
to visit any department suddenly and take random inspection.

In this Card Reader user inserts his card, which is detected and found valid then PIC Micro-
controller looks for the privilege level it bears. Depend on the privilege level this section actuates
the corresponding relay. There are three relays which makes smart switching stage with other
three relays of Interface Card.
INTERFACE CARD: This Interfacing card provides the interfacing of all signals from various
circuits to PIC Micro-controller. This card also actuates three relays, Relay A, Relay B, & Relay C.
These three relays N/O [Normally Open] and N/C [Normally Closed] pins are used smartly, with
other three relays from Card Reader Stage, to open two Doors automatically.
BURGLAR ALARM: This Burglar Alarm stage detects the unauthorised persons presence in the
protected zone and immediately alerts the by-passers & responsible authority.
POWER SUPPLY: This specially designed power supply provides +12 V for Relay & Driver Stage
and +5V for rest of the circuit.

3
APPLICATIONS:

High-end companies or service providers can make use of this project as their one hand security
tool. Such as CID [Crime Investigation Department], Defence Offices, Top Security Offices,
Defences Manufacturing Companies, Nuclear Development centres etc., where tight-security is
needed. Even private companies can take benefit of this project. Even this project can be used in
Libraries, Big shopping Malls, medical shops or big storage places to restrict some zones for
common come-go passers from illegal accessing.
As this project provides different level of privileges, depending upon the rank or position he holds
in his company or institute or centre, is implemented very effectively. All the zones or departments
are restricted for certain people and one cannot get-in without prior authority. This feature stops
the irresponsible employee from saying that I did not know who opened that door, during my
absence. The company can hold the related employee for any theft or loss done in that allotted
zone.
And the Burglar Alarms security loops take care of the unauthorised entry inside the protected
zone. This feature not only attracts the authoritys attention by alarm sound, but also sends the
Warning message to the remote computer in top-level authorities home. Thus taking quick action
against any trespassing or security steps is done very quickly.

Vous aimerez peut-être aussi