RFID based AccessRFID based Access
ControlControl
S.PradheepS.Pradheep
S.Vivek SwaminathanS.Vivek Swaminathan
T.Balaji SrinivasanT.Balaji Srinivasan
TCE, Madurai.TCE, Madurai.
What is RFID?What is RFID?
 Radio Frequency IdentificationRadio Frequency Identification
 Radio Frequency IdentificationRadio Frequency Identification ((RFIDRFID) is an) is an
automatic identification method, relying on storing andautomatic identification method, relying on storing and
remotely retrieving data using devices called RFID tagsremotely retrieving data using devices called RFID tags
or transponders. An RFID tag is an object that can beor transponders. An RFID tag is an object that can be
attached to or incorporated into a product, animal, orattached to or incorporated into a product, animal, or
person for the purpose of identification using radioperson for the purpose of identification using radio
waves. Chip-based RFID tags contain silicon chips andwaves. Chip-based RFID tags contain silicon chips and
antennas. Passive tags require no internal power source,antennas. Passive tags require no internal power source,
whereas active tags require a power source.whereas active tags require a power source.
Types of RFID tagsTypes of RFID tags
 RFID cards are also known as "proximity",RFID cards are also known as "proximity",
"proxy" or "contactless cards" and come in three"proxy" or "contactless cards" and come in three
general varieties:general varieties:
 passivepassive,, semi-passivesemi-passive (also known as(also known as semi-activesemi-active), or), or
activeactive
Our RFID readerOur RFID reader
 RFID Reader Module, are also
called as interrogators. They convert
radio waves returned from the RFID
tag into a form that can be passed on
to Controllers, which can make use
of it.
 RFID tags and readers have to be
tuned to the same frequency in order
to communicate. RFID systems use
many different frequencies, but the
most common and widely used &
supported by our Reader is 125 KHz.
ApplicationsApplications
 Some other areas where passive RFID has been applied in recent past are:Some other areas where passive RFID has been applied in recent past are:
 Person IdentificationPerson Identification
 Food Production ControlFood Production Control
 Vehicle Parking MonitoringVehicle Parking Monitoring
 Toxic Waste MonitoringToxic Waste Monitoring
 Valuable Objects Insurance IdentificationValuable Objects Insurance Identification
 Asset ManagementAsset Management
 Access ControlAccess Control
Short range or proximity applications are typically access control applications.Short range or proximity applications are typically access control applications.
Some main areas are:Some main areas are:
 Access controlAccess control
 Mass transit ticketingMass transit ticketing
Our SystemOur System
AdvantagesAdvantages
 Extremely affordableExtremely affordable
 Simple and compact systemSimple and compact system
 PortablePortable
 Doesn’t require any additional softwareDoesn’t require any additional software
 No need for a dedicated PCNo need for a dedicated PC
Future WorksFuture Works
 Uploading the RFID accumulated data directlyUploading the RFID accumulated data directly
to the internet using an Ethernet moduleto the internet using an Ethernet module
(without a PC).(without a PC).
 THANK YOUTHANK YOU
 THANK YOUTHANK YOU

RFID based access control ppt

  • 1.
    RFID based AccessRFIDbased Access ControlControl S.PradheepS.Pradheep S.Vivek SwaminathanS.Vivek Swaminathan T.Balaji SrinivasanT.Balaji Srinivasan TCE, Madurai.TCE, Madurai.
  • 2.
    What is RFID?Whatis RFID?  Radio Frequency IdentificationRadio Frequency Identification  Radio Frequency IdentificationRadio Frequency Identification ((RFIDRFID) is an) is an automatic identification method, relying on storing andautomatic identification method, relying on storing and remotely retrieving data using devices called RFID tagsremotely retrieving data using devices called RFID tags or transponders. An RFID tag is an object that can beor transponders. An RFID tag is an object that can be attached to or incorporated into a product, animal, orattached to or incorporated into a product, animal, or person for the purpose of identification using radioperson for the purpose of identification using radio waves. Chip-based RFID tags contain silicon chips andwaves. Chip-based RFID tags contain silicon chips and antennas. Passive tags require no internal power source,antennas. Passive tags require no internal power source, whereas active tags require a power source.whereas active tags require a power source.
  • 3.
    Types of RFIDtagsTypes of RFID tags  RFID cards are also known as "proximity",RFID cards are also known as "proximity", "proxy" or "contactless cards" and come in three"proxy" or "contactless cards" and come in three general varieties:general varieties:  passivepassive,, semi-passivesemi-passive (also known as(also known as semi-activesemi-active), or), or activeactive
  • 4.
    Our RFID readerOurRFID reader  RFID Reader Module, are also called as interrogators. They convert radio waves returned from the RFID tag into a form that can be passed on to Controllers, which can make use of it.  RFID tags and readers have to be tuned to the same frequency in order to communicate. RFID systems use many different frequencies, but the most common and widely used & supported by our Reader is 125 KHz.
  • 5.
    ApplicationsApplications  Some otherareas where passive RFID has been applied in recent past are:Some other areas where passive RFID has been applied in recent past are:  Person IdentificationPerson Identification  Food Production ControlFood Production Control  Vehicle Parking MonitoringVehicle Parking Monitoring  Toxic Waste MonitoringToxic Waste Monitoring  Valuable Objects Insurance IdentificationValuable Objects Insurance Identification  Asset ManagementAsset Management  Access ControlAccess Control Short range or proximity applications are typically access control applications.Short range or proximity applications are typically access control applications. Some main areas are:Some main areas are:  Access controlAccess control  Mass transit ticketingMass transit ticketing
  • 6.
  • 7.
    AdvantagesAdvantages  Extremely affordableExtremelyaffordable  Simple and compact systemSimple and compact system  PortablePortable  Doesn’t require any additional softwareDoesn’t require any additional software  No need for a dedicated PCNo need for a dedicated PC
  • 8.
    Future WorksFuture Works Uploading the RFID accumulated data directlyUploading the RFID accumulated data directly to the internet using an Ethernet moduleto the internet using an Ethernet module (without a PC).(without a PC).
  • 9.
  • 10.