Door lock using RFID
technology
Member: Ho Dac Vu
Nguyen Mai Truong
Nguyen Huu Thanh
Tran Hoang Loc
Group: 10
Presentation Outline
1. Introduction
2. Background
3. Proposals from partner companies
4. Method
5. Results
6. Conclusion
7. Recommendation
8. References
1. Introduction
 Evaluating proposals from Bosch, Renesas,
eSilicon.
 Introducing our method of evaluation to
select the suitable product.
 Representing the most feasible solution for
our company.
2. Background
 Vietcombank
building in Danang.
 Present situation:
obsolete and unsafe
office doors.
 Implementation of
secure and reliable
door locks. Figure 1. Vietcombank Building in Danang
3. Proposals from partner
companies.
 Bosch: Fingerprint door lock
 Renesas: RFID door lock with passive tag.
 eSilicon: RFID door lock with active tag.
3.1 Basic explaination of RFID
technology.
 Radio Frequency Identification.
 A micro-chip in a label used to transmit
data when the label is exposed to radio
wave.
Figure 2. RFID Micro-chip
3.2 Main components of RFID
system
RFID Tag
RFID Reader
Host computer
Figure 3. Main components.
3.3 Main components
RFID Tag  Transponder
 Located on the object
RFID Reader  Transceiver
 Can read and write
data to Tag
Host Computer  Translate and
process radio wave
 Send text messages
Table 1. RFID Micro-chip
3.4 How it works
Figure 4. RFID working.
3.5 New features
 Connect to your
smartphone
immediately as
illegally intervened
Figure 5. Warning light and message.
 Warning light
4. Method
 Bought sample equipments from each
candidate.
 Tested samples in 3 rooms in our
building.
 Assessed performance of sample
products based on 4 criteria:
 Cost
 Maintenance
 Security
 Efficiency
4. Method (cont’d)
 Evaluating criteria:
 Comparison in cost between 3 samples
 Comparison in time periods of
maintenance between 3 samples.
 Comparison in security between 3
samples.
 Comparison in efficiency (reaction ability
to external impacts) between 3 samples.
5. Result
Ranking Cost aspect Maintenance Security aspect Efficiency
1 Passive RFID Active RFID Active RFID Active RFID
2 Active RFID Passive RFID Fingerprint Fingerprint
3 Fingerprint Fingerprint Passive RFID Passive
RFID
Table 2. Ranking the door locks according to the
four criteria
5.1 Comparison between posible
candidates (cost)
Fingerprint
door lock
Active tag RFID
Passive tag
RFID
Purchase Cost
per unit.
35$ 30$ 27$
Life-cycle cost 14$ 12$ 10$
Total 49$ 42$ 37$
Table 3. Comparison in cost of the three door
locks
5.1 Comparison between posible
candidates (cost)
0 5 10 15 20 25 30 35 40 45 50 55
Fingerprint lock
Active tag RFID lock
Pasive tag RFID lock
USD
Figure 6. Comparison in cost between 3 samples
5.2 Comparison between posible
candidates (remained criteria)
(cont’d)
0
1
2
3
4
5
Maintenance Security Efficiency
Active RFID
Passive RFID
Fingerprint
Figure 7. Comparison in maintenance, security and
efficiency
6. Conclusions
Unacceptable product: Fingerprint.
 Unaffordable
 Extensive maintaince
 Inefficient
Acceptable products: Active RFID and Passive
RFID.
 Affordable
 Toll-free installation
 Popular spare parts.
6. Conclusions
 Regarding acceptable the two models:
Active RFID and Passive RFID
 Active RFID technology meet superior
criteria:
 Higher levels of security and efficiency.
 Meeting cost criterion.
 Ease of use.
7. Recommendation
 Recommending purchasing Active RFID door
locks.
 Ensuring the safety of our properties and
employees.
 Investing in Active RFID door locks within our
budget (needing $4050 out of $5000)
 Being total responsible for our judgement and
selection.
8. References
Avonie.net. (2013). RFID and Privacy Lounge. US: Brian Nutter.
Juho Partanen, Co-founder of Voyantic Ltd. (2015, 2). History of
RFID.
LibBest. (2015, 3 16). System Architecture. Retrieved from
http://www.rfid-library.com/flip/rfid_u500e/index.html
RFID journal. (2012, 3 16). Retrieved from
http://www.rfidjournal.com/articles
techit.net. (2015, 12 26). RFIDJournal.com. Retrieved from
http://www.rfidjournal.com/articles/view?1338
TX-co. (2009, 2 12). Arduino-RFID-Door-Lock. Retrieved 5 12, 2016,
from http://www.instructables.com/id/RFID-8/
Wang, Y. (2013). RFID privacy and Security. US: RSA Laboratoris.
Door lock-using-rfid-technology

Door lock-using-rfid-technology

  • 1.
    Door lock usingRFID technology Member: Ho Dac Vu Nguyen Mai Truong Nguyen Huu Thanh Tran Hoang Loc Group: 10
  • 2.
    Presentation Outline 1. Introduction 2.Background 3. Proposals from partner companies 4. Method 5. Results 6. Conclusion 7. Recommendation 8. References
  • 3.
    1. Introduction  Evaluatingproposals from Bosch, Renesas, eSilicon.  Introducing our method of evaluation to select the suitable product.  Representing the most feasible solution for our company.
  • 4.
    2. Background  Vietcombank buildingin Danang.  Present situation: obsolete and unsafe office doors.  Implementation of secure and reliable door locks. Figure 1. Vietcombank Building in Danang
  • 5.
    3. Proposals frompartner companies.  Bosch: Fingerprint door lock  Renesas: RFID door lock with passive tag.  eSilicon: RFID door lock with active tag.
  • 6.
    3.1 Basic explainationof RFID technology.  Radio Frequency Identification.  A micro-chip in a label used to transmit data when the label is exposed to radio wave. Figure 2. RFID Micro-chip
  • 7.
    3.2 Main componentsof RFID system RFID Tag RFID Reader Host computer Figure 3. Main components.
  • 8.
    3.3 Main components RFIDTag  Transponder  Located on the object RFID Reader  Transceiver  Can read and write data to Tag Host Computer  Translate and process radio wave  Send text messages Table 1. RFID Micro-chip
  • 9.
    3.4 How itworks Figure 4. RFID working.
  • 10.
    3.5 New features Connect to your smartphone immediately as illegally intervened Figure 5. Warning light and message.  Warning light
  • 11.
    4. Method  Boughtsample equipments from each candidate.  Tested samples in 3 rooms in our building.  Assessed performance of sample products based on 4 criteria:  Cost  Maintenance  Security  Efficiency
  • 12.
    4. Method (cont’d) Evaluating criteria:  Comparison in cost between 3 samples  Comparison in time periods of maintenance between 3 samples.  Comparison in security between 3 samples.  Comparison in efficiency (reaction ability to external impacts) between 3 samples.
  • 13.
    5. Result Ranking Costaspect Maintenance Security aspect Efficiency 1 Passive RFID Active RFID Active RFID Active RFID 2 Active RFID Passive RFID Fingerprint Fingerprint 3 Fingerprint Fingerprint Passive RFID Passive RFID Table 2. Ranking the door locks according to the four criteria
  • 14.
    5.1 Comparison betweenposible candidates (cost) Fingerprint door lock Active tag RFID Passive tag RFID Purchase Cost per unit. 35$ 30$ 27$ Life-cycle cost 14$ 12$ 10$ Total 49$ 42$ 37$ Table 3. Comparison in cost of the three door locks
  • 15.
    5.1 Comparison betweenposible candidates (cost) 0 5 10 15 20 25 30 35 40 45 50 55 Fingerprint lock Active tag RFID lock Pasive tag RFID lock USD Figure 6. Comparison in cost between 3 samples
  • 16.
    5.2 Comparison betweenposible candidates (remained criteria) (cont’d) 0 1 2 3 4 5 Maintenance Security Efficiency Active RFID Passive RFID Fingerprint Figure 7. Comparison in maintenance, security and efficiency
  • 17.
    6. Conclusions Unacceptable product:Fingerprint.  Unaffordable  Extensive maintaince  Inefficient Acceptable products: Active RFID and Passive RFID.  Affordable  Toll-free installation  Popular spare parts.
  • 18.
    6. Conclusions  Regardingacceptable the two models: Active RFID and Passive RFID  Active RFID technology meet superior criteria:  Higher levels of security and efficiency.  Meeting cost criterion.  Ease of use.
  • 19.
    7. Recommendation  Recommendingpurchasing Active RFID door locks.  Ensuring the safety of our properties and employees.  Investing in Active RFID door locks within our budget (needing $4050 out of $5000)  Being total responsible for our judgement and selection.
  • 20.
    8. References Avonie.net. (2013).RFID and Privacy Lounge. US: Brian Nutter. Juho Partanen, Co-founder of Voyantic Ltd. (2015, 2). History of RFID. LibBest. (2015, 3 16). System Architecture. Retrieved from http://www.rfid-library.com/flip/rfid_u500e/index.html RFID journal. (2012, 3 16). Retrieved from http://www.rfidjournal.com/articles techit.net. (2015, 12 26). RFIDJournal.com. Retrieved from http://www.rfidjournal.com/articles/view?1338 TX-co. (2009, 2 12). Arduino-RFID-Door-Lock. Retrieved 5 12, 2016, from http://www.instructables.com/id/RFID-8/ Wang, Y. (2013). RFID privacy and Security. US: RSA Laboratoris.