Vous êtes sur la page 1sur 6

Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San

Francisco, USA

Embedded Controller Based Smart Card Access


Vivek Kumar Sehgal*1, Nitin2 , Durg Singh Chauhan3 , 1,2,3Member, IEEE and ACM
Abstract The most common devices used to control access to private areas where sensitive work is being carried out or where data is held, are keys, badges and magnetic cards. These all have the same basic disadvantages: they can easily be duplicated and when stolen or passed on, they can allow entry by an unauthorized person. This paper proposed a low cost embedded controller based smart card which consists of contact less card and a card reader. This Card reader is ideal for applications such as access control, attendance monitoring etc. Index TermsContactless Smart card, Control Algorithm Embedded Controller, MAX 232. Fig.1. Smart Card Internal Architecture

I. INTRODUCTION A smart card is like an electronic wallet. Imagine the power of a computer, the speed and security of electronic data, and the freedom to carry that information anywhere on earth. Imagine a computer so small it fits inside a plastic card like the credit card you carry in your wallet. Smart card technology has been around for more than 20 years. Since its first introduction into the market, its main application is for the payphone system. As card manufacturing cost decreased, smart card usage has expanded. In May 1996, several companies including Microsoft, Hewlett-Packet and Schlumberger formed a PC/SC workgroup which aimed at integrating the smart card with personal computer (PC). This workgroup mainly concentrates on producing a common smart card and PC interface standards for the smart card and PC software producers. Many of the interface standards and hierarchy have already been established. Some of these prototype products are now available on the market [1]. The security requirements of smart cards in personal communication system are two folds; they are authentication & protection of information. This paper deals with matter pertaining to the application of IC cards (or smart cards) in the security of personal communication system. Security advantages achieved by the use of smart cards in security system are discussed. Smart card is required to perform three fundamental functions 1) To communicate with a host device 2) To store data 3) And to process data received by and stored in the card

In general smart cards conform to a standard architecture. The key element in proposed architecture is a microcontroller, ROM, RAM, EEPROM & a infra red communication interface as shown in Fig. 1. There are two types of smart cards contact or contact less [2-3]. Smart cards are defined according to the type of chip implanted in the card and its capabilities. There is a wide range of options to choose from while designing a particular system as shown in Fig. 2.

Vivek Kumar Sehgal is with Department of Electronics and Communication Engineering, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, INDIA (E-mail: vivekseh@gmail.com). Nitin, is with Department of Computer Science Engineering and Information Technology, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, INDIA (E-mail: delnitin@ufl.edu, and delnitin@gmail.com). Durg Singh Chauhan is Presently Vice Chancellor and Professor in Department of Computer Science Engineering and Information Technology, Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, INDIA (E-mail: pdschauhan@gmail.com).

Fig.2. Types of Smart Cards

The organization of the paper is as follows: In section 2, we discuss the proposed design that also presents the block diagram for our proposed system. Detailed circuit description

ISBN: 978-988-98671-0-2

WCECS 2008

Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
is provided for each block used in this section. In section 3, we present the software implementation along with flow diagram. In section 4, PCB designing, actual circuit implementation on PCB and simulated schematic are shown. Finally, some conclusions are offered in section 5 II. PROPOSED WORK This system has two parts- one is contact less card and another is card reader. Card reader is ideal for applications such as access control, attendance monitoring etc. There are predefined codes for every card. Codes are stored in the micro controllers memory. Micro controller has inbuilt EEPROM so it uses inbuilt EEPROM to store the code for a user. EEPROM technology features low voltage capability, an EEPROM endurance of 100,000 write/erase cycles, a ten year EEPROM data retention and over 5000V of ESD protection, thereby ensuring safe storage of the card data throughout the lifetime of the card. Each micro controller is programmed for a specific predefined code thus each user will have a unique code. Whenever a user attempt card &press the switch present on card, in front of card reader at 6 inches of distance, code stored in the memory is transmitted serially from the micro controller to power amplifier. And power amplifier makes it capable to be fed to the IR transmitting LED. Fig. 3. Shows the block diagram of card

Fig.4. Block Diagram of Card Reader

A. MAX 232 (Communication Interface) RS-232 (Fig. 5.) was created for one purpose, to interface between Data Terminal Equipment (DTE) and Data Communications Equipment (DCE) employing serial binary data interchange. So as stated the DTE is the terminal or computer and the DCE is the modem or other communications device. RS 232 is the most widely used serial I/O interfacing standard. In RS 232, a 1 is represented by -3 to -25 v. while a 0 bit is +3 to + 25 v, making -3 to +3 undefined. For this reason, to connect any RS 232 to a microcontroller system we must use voltage converters such as MAX 232 to convert the TTL logic levels to the RS 232 voltage level, and vice versa. This chip is used when interfacing micro controller with PC to check the Baud rate and changes the voltage level because micro controller is TTL compatible whereas PC is CMOS compatible.

Fig.3. Block Diagram of Card

Card reader, from the card at baud rate of 9600bps receives codes. Infrared receiver works in positive logic i.e. when the IR light falls on it, its output goes high and when the IR light doesnt fall on it, its output goes low. Receiver passes these codes to the PC. MAX 232 will make it compatible with PC. The software will check and compare the code received. If the code is present in the database then it will switch on the electromagnetic relay circuitry using parallel port. Otherwise it will give a message on screen or make a sound buzzer on. If the code matches as there in database, then it will open the door using stepper motor. Make the power supply on for a particular cabin. And make the attendance record on the basis of time [4]. Fig.4. Shows the block diagram of card reader Basic components used for designing of IR Based Secure Electronic Access System Using Microcontroller are: 1) Power supply source 2) Microcontroller (8051) 3) Max 232 4) Infrared emitting diode 5) Infrared photodiode 6) Optocoupler (MCT-2E) 7) Electromagnetic relay (SPDT

Fig.5. Operating Circuit of MAX 232

B. Optocoupler (MCT-2E) The MCT2XXX series optoisolators consist of a gallium arsenide infrared emitting diode driving a silicon phototransistor in a 6-pin dual in-line package. There is no electrical connection between the two, just a beam of light. The light emitter is nearly always an LED. The light sensitive device may be a photodiode, phototransistor, or more esoteric

ISBN: 978-988-98671-0-2

WCECS 2008

Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
devices such as thyristors, triacs etc. To carry a signal across the isolation barrier, optocouplers are operated in linear mode. Fig.6. Shows the six-pin IC package for an optocoupler and the electronic diagram of its pin outline

Fig.6. MCT-2E Pin Diagram

C. Electromagnetic Relay The electromagnetic relay consists of a multi-turn coil, wound on an iron core, to form an electromagnet as shown in Fig.7. When the coil is energized, by passing current through it, the core becomes temporarily magnetized. The magnetized core attracts the iron armature. The armature is pivoted which causes it to operate one or more sets of contacts. When the coil is de-energized the armature and contacts are released.

Fig.9. System Flow Chart Fig.7. Electromagnetic Relay

III. SOFTWARE IMPLEMENTATION To evaluate the software for correct operation the file was programmed into the microcontroller on the relevant development board. Programming of the microcontroller was achieved using MP5 software. EZ31 is an EEPROM programmer that interfaces directly with the computer serial port. This permits hexadecimal files to be loaded into the microcontroller. Initially the micro controller was programmed by removing it from the socket on the board and inserting it into the multi-pin socket on the programmer. The software burned in the embedded processor is described by the following flow charts (Fig. 8-11).

Fig.8. Flow Chart for Serial Transmission & Card

Fig.10. Flow Chart for Privilege Level

ISBN: 978-988-98671-0-2

WCECS 2008

Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
which is a significant issue for radio-based communication systems. This signal confinement makes it easy to secure transmissions against casual eavesdropping, and it prevents interference between links operating in different rooms. Infrared is favored for short-range applications in which per-link bit rate and aggregate system capacity must be maximized, cost must be minimized, light weight, moderate data rates ,international compatibility is required, or receiver signal-processing complexity must be minimized [5].

Infrared

Other Wireless Technology

Typical range

Short range wireless point-n-shoot exchange network access data and

Long wireless exchange

range data and

network access Other RF devices, building material, equipment

Interference

None

Security
Fig.11. Flow Chart for Device Control

Very secure due to short range and line of sight.

Less secure

IV. HARDWARE IMPLEMENTATION AND SCHEMATIC DESCRIPTION The implemented work is shown in Fig.12

Power consumption Real-time network access application Range Line of sight Component cost Ckt design

Low

High

Requires

user

to

User does not have to be near an access point. 10 meter,1oo meter No High

walk up to an access point. 1 meter Yes Low

Simple portable

Complicated No

Fig.12. Complete Application

Portability

Wireless infrared communication systems enjoy significant advantages over radio systems in certain environments. First, there is abundance unregulated optical spectrum available. This advantage is shrinking somewhat as the spectrum available for licensed and unlicensed radio systems increase due to modernization of spectrum allocation policies. Radio systems must make great efforts to overcome or avoid the effects of multipath fading, typically through the use of diversity. Infrared systems do not suffer from time-varying fades due to the inherent diversity in the receiver. This simplifies design and increases operational reliability. Infrared system provides a natural resistance to eavesdropping, as the signals are confined within the walls of the room. This also reduces the potential for neighboring wireless communication systems to interfere with each other,

Table 1. Comparison of Wireless Technologies

2 5 4 +

T1

D1

220 V

C1 CAPACITOR 1

8 TRANSFORMER 3 RS407L

U9 VIN VOUT 2

VCC 1

LM7805/TO

Fig.13. Schematic Diagram of Power Supply

ISBN: 978-988-98671-0-2

WCECS 2008

Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
J7 CON9 1 2 3 4 5 6 7 8 9 J9 1 2 MG1 JUMPER 1 2 3

MOTOR STEPPER

LS1 5 3 4 1 2 RELAY SPDT 1 2 3

LS2 5 3 4 1 2 RELAY SPDT

LS3 5 3 4 1 2 RELAY SPDT

LS4 5 4

RELAY SPDT

VCC 2

Q8

Q9

Q10

Q11

Q5 Q4

Q6 Q7

VCC 1
R3 RESISTOR 6 5 6 5 6 5 4 U7 MCT2E U8 MCT2E 1 1 1 1 2 1 1 2 2 2 R4 RESISTOR R5 RESISTOR 6 5 6 5 4 U6 MCT2E R6 RESISTOR 4 R7 RESISTOR

R8 RESISTOR 4 2

6 5

U1 MCT2E

U2 MCT2E

6 5

U3 MCT2E

U4 MCT2E

R1 RESISTOR 6 5

R2 RESISTOR

U5 MCT2E

0 0

J8 CON25

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

Title <Title> Size B Date: Document Number <Doc> Friday , August 08, 2008 Sheet 1 of 1 Rev <Rev Code>

Fig.14. Schematic Diagram of Device Control and Door Opening


LCD

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16

U1 39 38 37 36 35 34 33 32 1 2 3 4 5 6 7 8 19 18 P0.0/AD0 P0.1/AD1 P0.2/AD2 P0.3/AD3 P0.4/AD4 P0.5/AD5 P0.6/AD6 P0.7/AD7 P1.0 P1.1 P1.2 P1.3 P1.4 P1.5 P1.6 P1.7 X1 X2 EA RST VCC 8051 P2.0/A8 P2.1/A9 P2.2/A10 P2.3/A11 P2.4/A12 P2.5/A13 P2.6/A14 P2.7/A15 P3.0/RXD P3.1/TXD P3.2/INT0 P3.3/INT1 P3.4/T0 P3.5/T1 P3.6/WR P3.7/RD ALE PSEN 21 22 23 24 25 26 27 28 10 11 12 13 14 15 16 17 30 29 Q1 BC547

LED R1 VCC 1B 470

D1

VCC C1 1n Y1 CRYSTAL

C2 1n VCC

31 9 40

VCC C3

0
1n J5 R2 1 2 470 JUMPER1 1B 1 2 1 VIN VOUT 2 J1 U2

JUMPER1

LM7805/TO

Fig.15. Schematic Diagram of IR Smart Card

ISBN: 978-988-98671-0-2

WCECS 2008

Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA
VCC

D1 IR DIODE

R4 10k 1B

R3 1k 1B 13 8 11 10

U3 R1IN R2IN T1IN T2IN C1+ C1C2+ C2V+ VMAX232/SO R1OUT R2OUT T1OUT T2OUT 12 9 14 7 1 J2 J3 2 1 2 3 4 5 6 7 8 9 CON9

Q2 BC547

Q3 BC547 C5 C6

R5 10k 1B

1 3 4 5 2 6 C4

JUMPER1

0
VCC

T1

D2

220 V

5 4 + 1 C7 CAPACITOR RS407L 1 U4 VIN VOUT 2

8 TRANSFORMER

VCC

LM7805/TO

Fig.16. Schematic Diagram of IR Reader Circuit

V. CONCLUSION AND FUTURE SCOPES In this microcontroller based secure access system used core is ATMELS 89C51 program executed by the card's microcontroller is written in EEPROM at the mask-producing stage and can be modified in any way. This guarantees that the code is strictly controlled by the manufacturer. For storing user-specific data, individual to each card, the first generation of non-volatile memories used EPROMs which required an extra "high" voltage power supply (typically from 15 V to 25 V). This access system only contain EEPROM which requires a single 5 V power supply (frequently that of the microcontroller) and can be written and erased thousands of times (cycles). Finally, a communication port (serial via an asynchronous link) for exchanging data and control information between the card and the external world is available. A common bit rate is 9600 bit/s a first rule of security is to gather all these elements into a single chip. Contact less technology brings many benefits to secure ID systems when factors such as high throughput and usage, harsh environments, and reader maintenance and reliability are important. Because the contact less card chip and the reader communicate using infrared waves, there is no need to physically make an electrical connection. Maintenance of reader is minimized while reliability is improved since there are no worn contacts to be replaced or openings to be unblocked. Cards also last longer because removing them from their regular carrying place is not necessary for use.

The key benefits of using contact less smart card technology for physical access are summarized below. 1) High speed of access and high throughput 2) Useable in harsh or dirty environments 3) User friendly a) Less intrusive b) Does not require insertion of the card into the reader c) No issues with orientation of the card d) May be kept in wallet or purse for personal security during use This is just the beginning; soon it will influence the way we shop, see the doctor, and even enjoy leisure. Contact and contactless technologies can be implemented on one card in future. REFERENCES
[1] Dr. Marc Lassus, smart cards: accost effective solution against electronic fraude, no.437, IEE 1997. [2] C.A.Pinto, A.C.Borim, J.M.Fernandes, A.R. Ferreira Wireless implementation for access control to restricted areas, IEEE Transaction vol.1-5, no.7803, pp.1078-1081, 1999. [3] F.Y, Yang and J.K.Jan A provable secure access control using smart cards, IEEE Transaction vol, 13, no.3, July 10, 2003. [4] IBM Redbook Smart Card Case Study [5] W.Rankl & W.Effing Smart Card Hand Book.

ISBN: 978-988-98671-0-2

WCECS 2008

Vous aimerez peut-être aussi