fpga in outer world

Upload: varun-chauhan

Post on 07-Jul-2018

222 views

Category:

Documents


1 download

TRANSCRIPT

  • 8/18/2019 fpga in outer world

    1/31

     

    synopsis onrf id based access control system

      group member - ankita yadav(0935731005),  yoti sa!ani(0935731015),  mausamkumari(0935731017)"

    Submitted to: Under the guidance of:HOD (miss. Payal tondon) Ankita sriastaa!lectronics " #ommunication !lectronics"communication

     

  • 8/18/2019 fpga in outer world

    2/31

      #$%&'*+**&.

      $e %ish to e&'ress our sincere thanks to the 'eo'le %ho e&tended their hel'during the course of our 'roect.

      $e are greatly 'rofound to our honour able chairman r. Anurag kumar singh sir for facilitating us %ith this o''ortunity. $e also record our sincere thanks to our honourable #.ed mam rs. *akhi +hararnda for her kind su''ort to take u' this 'roect.

      $e are thankful and e&tremly greatful to our honour able head of de'artment missPayal ,ondon- electronics " communication for her moral su''ort. $e %ould like to thank allfaculty members and staff of the De'artment of !lectronics and #ommunication !ngineeringfor their generous hel'- encouragement- insightful comments- aluable guidance andinformation in arious %ays for the com'letion of this 'roect.

      $e %ould like to e&tend our sincere thanks to our guide r. Piyush u'ta for hisconstant technical su''ort" stu'endous encouragement %hich enables us to com'lete our  'roect.

    /urther the ackno%ledgment %ould be incom'lete if %e %ould not mention a %ord of thanks to

    our most beloed Parents %hose continuous su''ort encouragement all the %ay though thecourse has led us to 'ursue the degree and confidently com'lete the 'roect.

     .#/* ' $'&.*&.

    0

  • 8/18/2019 fpga in outer world

    3/31

    1"  A1 2222222222222222222222.. 3

    2"  A4S,*A#,22222222222222222222 5

    3"  16,*ODU#,1O62222222222222222227

    "  !818,16 ,!#H6O9O A6D 6!!D /O* */1D222...;

    5"  */1D ,!#H6O9O2222222222222222.<

    4" $O*+16 O/ */1D2222222222222222=>

    7"  */1D ,AS22222222222222222222==

    "  PA#+A162222222222222222222=?

    9"  HO$ ,AS #OU61#A,!222222222222=@

    10" */1D A##!SS #O6,*O922222222222...=5

    11" A##!SS #O6,*O9 SS,! #OPO6!6,S222=7

    12" A##!SS #O6,*O9 P*O#!SS222222222...=7

    13" ,P!S O/ *!AD!*22222222222222.0=

    1" #OPO6!6,S *!U1*!D 2222222.2220;

    15" ADBA6,A!S222222222222222.0<

    14" APP91#A,1O6S222222222222222.?>

    ?

  • 8/18/2019 fpga in outer world

    4/31

    17" #O6#9US1O62222222222222222?=

    1" *!/!*!6#!S2222222222222222?0

    #6

    ,he most basic role of an access control system is to kee' out anyone %ho is not su''osed to

     enter an area. ,his can be the front door- a 'arking garage- a serer room- a 'ersonnel records

    @

  • 8/18/2019 fpga in outer world

    5/31

     room- or any other sensitie area. ou may also %ant to use an access control system to track

    %hen em'loyees come and go. Another 'oint to consider: ho% secure do you need the system

    to beC A basic system usually features a key'ad or s%i'e card. Higher security a''lications

    may reuire multi'le means of authentication (a card and thumb'rint- for e&am'le) and include

    more redundancy. /inally- consider %hat other systems need to connect to your access control

    system.

    As %e are ste''ing to%ards the 0=st century- man is becoming ery careful about security- %ith

    no e&ce'tion for industries. Barious industries are becoming ery careful about manufacturing

     and distribution of their 'roducts.

     6e% technology addresses these reuirements- 'roiding the foundation to allo% coo'eratie

    interaction to be deelo'ed. ,hus the */1D 4AS!D A##!SS #O6,*O9 SS,! is ust

    e&am'le of ne% technology %hich %ill be 'roiding the base for security of 'roduct

    distribution and data kee'ing using electronic control.

    #/.8#$.

      ,he ongoing gro%th of technology has necessitated the use of more sim'ler and effectie

    as a re'lacement of e&isting ones.

    3

  • 8/18/2019 fpga in outer world

    6/31

      Our 'roect is based on automating the access control and security o'eration inoled in

    an organisation. !arlier there %as the s%i'ing system using bar codes readers. 6o% it can be

    carried using nonEcontact deices %ith the hel' of *adio /reuency 1dentification(*/1D).

    */1D cards are 'roided to em'loyees -these cards carring their o%n of identification number 

      in coded format- %hich can be retried by the reader only .4y means of this the authentication

      of the em'loyee can be arified. ,hen is the access control at arious 'oint inside the

    organisation.

     1n order to aoid the tress 'assing and in case of theft of card- %e hae added a key'ad

    for entering a 'ass%ord. ,hereby it achiees a t%o leel security.

    16,*ODU#,1O6

    ,he conce't of access control is brought about using a card- a corres'onding card reader and a

    control 'anel interfaced %ith the serer. ,he card is a 'ro&imity card %ith a uniue

    identification number integrated in it.

     ,he reader reads the data and sends it to the control 'anel- %hich is the micro controller. ,his

    controller checks the alidity of the data %ith the serer- %hich bears the database. ,he serer

    5

  • 8/18/2019 fpga in outer world

    7/31

    is loaded %ith the details about the em'loyee for that number- such as the name- designastion -

     his access location in the organiFation and other necessary detail.

    ,he control 'anel checks %hether heGshe is allo%ed to enter the 'articular door or not. 1f the

    em'loyee is authentic- then heGshe is allo%ed access in the 'articular entrance. ,he em'loyees

    can be 'ermitted in a gien entrance as 'er hisGher designation. ,he access control is em'loyed

    at this 'oint. $hen a 'erson of a 'articular designation is not su''osed to be allo%ed in a gien

    entrance- heGshe is not een reuested for a 'ass%ord.

    !&isting technology and need for */1DE

    $e hae seen the security 'ersonnel checking of em'loyees identification card at the entrancesto aoid the illegal entry.,he em'loyee sign a register at the entrance before getting in. ,his isstill being 'racticed in most of the com'anies.

    Ho%eer- the disadantage are that- %heneer there is a necessity of 'roiding control at manylocations inside the com'any- a 'erson at each 'oint %ill not be an economical %ay toim'lementing it.

    ,hen came %ere the 'unch cards. !m'loyee 'osses cards- %hich are 'unched %hen they enter

    into the building. 4ut it has disadantages. $orkers started to 'ractice buddy 'unching- fortheir coE%orkers.

    #oncerns about the buddyE'unching - the 'ractice %here em'loyees fraudulently clock theircoE%orkers in or out to gie them credit for time that %asnt actually %orkedEled #ontinentalAirlines to im'lement a finger'rint 1D system to augment their automated em'loyee time andattendance recording system. ,he com'any e&'anded the system from #ontrol odule after itsaed an estimated I=>>->>> in the first year. ,his led to the bar code readers.

    7

  • 8/18/2019 fpga in outer world

    8/31

    1t is a much common sight to see a bar code reader in the com'anies. ,hese are used to check%ith the em'loyees identification. ,he em'loyees s%i'e the card to the allotted slot. ,hen theaccess is gien after checking the authenticity of the card. ,his %as a substitute of the securityand emerged as a ne% techniue in access control. ,his acted as a starting of the automation of

    the access control. 4ut the bar code readers are the contact readers %here- the card are 'roidedto touch the reader.

    $ith the gro%th of technology and giant lea' in the field of radio freuency transmission- areuirement for the same a''lication using */ is desired.

    A further im'roement is the */ 1D card technology- %hich uses contact less card readers.4ringing the card nearer to the reader suffices for the reader to read the contents of card. ,hissim'lifies the usage of the em'loyees. ,his technology is cra%ling into the com'anies and hasthe 'otential to substitute the 'receding technologies.

    */1D ,!#H6O9O

    */ 1D technology is used in many different a''lications such as teleision- radio- cellular 'hones- radar- automatic identification system. ,he term */1D(radio freuency identification)describes the use of radio freuency signal to 'roide automatic identification of items.

    *adio freuency (*/) refers to electromagnetic %aes that hae a %aelength suited for use inradio communication. *adio %aes are classified by their freuencies- %hich are e&'ressed in

    kilohertF- megahertF- or gigahertF. *adio freuencies range from ery lo% freuency (B9/)-%hich has a range of => to ?> kHF- to e&tremely high freuency (!H/)- %hich has a range of?> to ?>> HF.

    */1D is a fle&ible technology that is conenient- easy to use- and %ell suited for automatico'eration. 1t combines adantages not aailable %ith other identification technologies. */1Dcan be su''lied as readEonly or read G %rite- does not reuire contact or lineEofEsight to o'erate-can function under a ariety of enironmental conditions- and 'roides a high leel of data

    ;

  • 8/18/2019 fpga in outer world

    9/31

    integrity. 1n addition- because the technology is difficult to counterfeit- */1D 'roides a highleel of security.

    */1D is similar in conce't to bar coding. 4ar code systems use a reader and coded labels thatare attached to an item- %hereas */1D uses a reader and s'ecial */1D deices that are attached

    to an item. 4ar code uses o'tical signals to transfer information from the label to the readerJ*/1D uses */ signals to transfer information from the */1D deice to the reader.

    *adio %aes transfer data bet%een an item to %hich an */1D deice is attached and an */1Dreader. ,he deice can contain data about the item- such as %hat the item is- %hat time thedeice traeled through a certain Fone- 'erha's een a 'arameter such as tem'erature. */1Ddeices- such as a tag or label- can be attached to irtually anything K from a ehicle to a 'alletof merchandise.

    */1D technology uses freuencies %ithin the range of 3> kHF to 0.3 HF. An */1D systemty'ically includes the follo%ing com'onents:

    L An */1D deice (trans'onder or tag) that contains data about an item

    L An antenna used to transmit the */ signals bet%een the reader and the */1D deice

    L An */ transceier that generates the */ signals

    L A reader that receies */ transmissions from an */1D deice and 'asses the data to a hostsystem for 'rocessing.

    /ig: a ty'ical */1D system

    1n addition to this basic */1D eui'ment- an */1D system includes a''licationEs'ecificsoft%are.

  • 8/18/2019 fpga in outer world

    10/31

    $O*+16 O/ */1D

    A *adioE/reuency 1dentification system has three 'arts:

    • A scanning antenna

    • A transceier %ith a decoder to inter'ret the data

    • A trans'onder E the */1D tag E that has been 'rogrammed %ith information.

    ,he scanning antenna 'uts out radioEfreuency signals in a relatiely short range. ,he */radiation does t%o things:

    • 1t 'roides a means of communicating %ith the trans'onder (the */1D tag) A6D

    • 1t 'roides the */1D tag %ith the energy to communicate (in the case of 'assie */1D

    tags).

    ,his is an absolutely key 'art of the technologyJ */1D tags do not need to contain batteries-and can therefore remain usable for ery long 'eriods of time (maybe decades).

    ,he scanning antennas can be 'ermanently affi&ed to a surfaceJ handheld antennas are alsoaailable. ,hey can take %hateer sha'e you needJ for e&am'le- you could build them into adoor frame to acce't data from 'ersons or obects 'assing through.

    $hen an */1D tag 'asses through the field of the scanning antenna- it detects the actiationsignal from the antenna. ,hat M%akes u'M the */1D chi'- and it transmits the information on itsmicrochi' to be 'icked u' by the scanning antenna.

    1n addition- the */1D tag may be of one of t%o ty'es. Actie */1D tags hae their o%n 'o%ersourceJ the adantage of these tags is that the reader can be much farther a%ay and still get thesignal. !en though some of these deices are built to hae u' to a => year life s'an- they haelimited life s'ans. Passie */1D tags- ho%eer- do not reuire batteries- and can be muchsmaller and hae a irtually unlimited life s'an.

    */1D tags can be read in a %ide ariety of circumstances- %here barcodes or other o'ticallyread technologies are useless.

    • ,he tag need not be on the surface of the obect (and is therefore not subect to %ear)

    • ,he read time is ty'ically less than =>> milliseconds

    • 9arge numbers of tags can be read at once rather than item by item.

    */1D ,AS

    =>

    http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=21http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=21http://www.technovelgy.com/ct/Technology-Article.asp?ArtNum=47

  • 8/18/2019 fpga in outer world

    11/31

    ,he */1D tag is used as an identity for a 'articular user. 1f the identity (serial number of thetag) of the user is matched %ith the one already stored in this system- he gets immediate accessthrough it. ,his */1D based secured access system also has many additional features. /or e&am'le- a ne% user can register himself %ith the system. A registered user can also %ithdra%his entry from the system. ,hese features can be accessed by 'ressing a tactile s%itch

    connected to the microcontroller.

     

    1n beginning- the user is 'rom'ted to scan his tag or 1D. ,he serial code of the tag is identified by the reader module and is sent to A,;

  • 8/18/2019 fpga in outer world

    12/31

    Active RFID tags: ,hey embed a radio signal transceier and thereby a battery to 'o%er it.,hanks to the integrated 'o%er su''ly- actie */1D tags can actiate themseles regardless of the 'resence of a readerGinterrogator in 'ro&imity and 'roide- at the same time- longer readranges in com'arison to 'assie */1D tags that hae no battery and integrated transceier.4ecause of these characteristics- actie */1D tags are commonly used %hen *eal ,ime

    9ocation Systems (*,9S) need to be de'loyed.Often- actie */1D tags feature e&tra sensors such as those for the measurement of humidity-tem'erature and 'ressure.Usually- actie */1D tags are more e&'ensie than 'assie */1D tags and hae enironmentallimitations due to the 'resence of the battery.

    Passive RFID tags: ,hey do not hae an embedded transceier and battery. $hen 'assie*/1D tags enter the field generated by a reader- they %ake u' and res'ond to it by reflectingQmodulated its signalJ this techniue is called backscatterQ. ,hen the reader receies anddecodes the res'onse.Passie */1D tags are the most %ides'read in the market because of their lo% 'rices that make

    them suitable for a %ide range of a''lications. oreoer- 'assie tags can %ithstandchallenging enironmental conditions that can restrict the use of */1D tags %ith integrated batteries.Passie */1D tags usually 'roide shorter read ranges in com'arison to actie */1D tags and4atteryEAssisted Passie */1D tags.ien that 'assie */1D tags communicate %ith a reader only %hen they enter its action field-they are rarely used for *,9S a''lications.

    Battery-Assisted Passive (BAP) RFID tags: ,hese are essentially 'assie */1D tags and use backscatter to %ork but- unlike 'assie */1D tags- 4AP */1D tags hae an integrated batterythat kee's the integrated chi' in a standEby status. Passie */1D tags read ranges are often

    limited by the need of 'roiding their 1#s %ith the minimum 'o%er threshold to %ake u'Q%hen distance makes the signal from the reader too %eak. 4AP */1D tags hae a battery tohel' %ith the %ake u'Q 'roblem increasing significantly the read distances. $hen the batteryis discharged- 4AP */1D tags continue %orking as common 'assie */1D tags.4AP tags are usually more e&'ensie then com'arableQ 'assie tags and chea'er than actietags.As for actie */1D tags- battery can be a limiting factor for usage in e&treme enironmentalconditions.

    .

    PA#+A16

    ,ags are manufactured in a %ide ariety of 'ackaging formats designed for differenta''lications and enironment. ,he basic assembly 'rocess consists of first a substrate

    =0

  • 8/18/2019 fpga in outer world

    13/31

    material(Pa'er- PB#- P!,-2)J u'on %hich an antenna made from one of many differentconductie materials including siler ink- aluminum- co''er is de'osited. 6e&t the tag chi'itself is connected to the antennaJ using techniue such as %ire bonding or fli' chi'. /inally a 'rotectie oerlay made from materials such as PB# lamination- !'o&y resin- Adhesie 'a'eris o'tionally added to allo% the tag to su''ort some of 'hysical conditions found in many

    a''lication such as abrasion- im'act- corrosion etc.

    HO$ ,AS #OU61#A,!

    Near field communication  : NFC is a set of standards for smart 'hones and similar deices toestablish radio communication %ith each other by touching them together or bringing them intoclose 'ro&imity- usually no more than a fe% centimeters.. Present and antici'ated a''licationsinclude contact less transactions- data e&change- and sim'lified setu' of more com'le&communications such as $i /i. #ommunication is also 'ossible bet%een an 6/# deice andan unE'o%ered 6/# chi'- called a MtagM.

     6/# standards coer communications 'rotocols and data e&change formats- and are based one&isting radioEfreuency identification (*/1D) standards including 1SOG1!# =@@@? and /eli #a.,he standards include 1SOG1!# =;>>@ by 6okia- Phili's and Sony- and no% has more than =5> members. ,he /orumalso 'romotes 6/# and certifies deice com'liance.

    =?

    http://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Radio-frequency_identificationhttp://en.wikipedia.org/wiki/ISO/IEC_14443http://en.wikipedia.org/wiki/FeliCahttp://en.wikipedia.org/wiki/Nokiahttp://en.wikipedia.org/wiki/Philipshttp://en.wikipedia.org/wiki/Sonyhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Radiohttp://en.wikipedia.org/wiki/Wi-Fihttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Radio-frequency_identificationhttp://en.wikipedia.org/wiki/ISO/IEC_14443http://en.wikipedia.org/wiki/FeliCahttp://en.wikipedia.org/wiki/Nokiahttp://en.wikipedia.org/wiki/Philipshttp://en.wikipedia.org/wiki/Sony

  • 8/18/2019 fpga in outer world

    14/31

     

    /1: 6!A* /1!9D #OU61#A,1O6

    /ar field communication (//#): */1D tags based on farEfield emissions ca'ture !%aes 'ro'agating from a di'ole antenna attached to the reader. A smaller di'ole antenna in thetag receies this energy as an alternating 'otential difference that a''ears across the arms ofthe di'ole. A diode can rectify this 'otential and link it to a ca'acitor- %hich %ill result in anaccumulation of energy in order to 'o%er its electronics. ,he techniue designers use forcommercial farEfield */1D tags is back scattering . 1f they design an antenna %ith 'recise

    dimensions- it can be tuned to a 'articular freuency and absorb most of the energy thatreaches it at that freuency. Ho%eer- if an im'edance mismatch occurs at this freuency- theantenna %ill reflect back some of the energy (as tiny %aes) to%ard the reader- %hich can thendetect the energy using a sensitie radio receier. 4y changing the antennas im'edance oertime- the tag can reflect back more or less of the incoming signal in a 'attern that encodes thetags 1D. 1n 'ractice- you can detune a tags antenna for this 'ur'ose by 'lacing a transistoracross its di'ole and then turning it 'artially on and off. As a rough design guide- tags that usefar field 'rinci'les o'erate at greater than =>> HF ty'ically in the ultra highEfreuency (UH/) band (such as 0.@3 HF)J belo% this freuency is the domain of */1D based on nearEfieldcou'ling.

    =@

  • 8/18/2019 fpga in outer world

    15/31

     

    /1: /A* /1!9D #OU61#A,1O6

    */1D A##!SS #O6,*O9

    *adio freuency identification (*/1D) access control systems hae been in use for seeralyears and are becoming increasingly 'o'ular in the 'ost

  • 8/18/2019 fpga in outer world

    16/31

    • Deter theft

    • ,rack 'ersonnel and isitors

    • 9imit access to restricted areas based on role

    • #om'ly %ith goernmentEregulated security 'rotocols

    #om'ared to traditional access control solutions that rely on magnetic stri'es- barcodes- and 'ro&imity readers- */1D access control offers these adantages:

    • 1ncreased reading distance

    • Ability to u'date badge holder data %ithout issuing a ne% 1D

    • Ability to read multi'le 1Ds at once

    • Ability to trigger a sureillance camera u'on entering the cameraRs icinity

    ,he ty'ical */1DEbased controlled access solution consists of =) tags that contain uniueidentification data ca'able of granting or denying access to restricted areas- and 0) amechanism for reading the */1D tags at the access control 'oints. */1D tags can be 'laced on

    obects- or they may be embedded into 'a'er or 'lastic 1D cards. ,hey can een be embeddedunder human skin- but this is highly controersial. $hen the tags are read at the access control 'oints- their data are alidated against a database in a centrally controlled security system- andaccess is either granted or denied.

     6ot only is the central security system ca'able of using identifying information to controlaccess- it can be integrated %ith other a''lications as 'art of a com'rehensie security solution./or e&am'le- the */1D security system can be configured to automatically log the number ofaccess attem'ts 'er 1D and trigger security cameras after a threshold has been reached. 1f a 'erson tries to access an area to %hich he or she does not hae 'ermission- the system detectsthis and can both initiate ideo sureillance and send alerts to security or other authoritatie

     'ersonnel. !en %hen an indiidual does hae 'ermission to access the area- ideo recordingscan still be initiated to monitor the 'ersonRs actiities %hile inside of the restricted area.

    A##!SS #O6,*O9 SS,! #OPO6!6,S

    ,he system is made u' of follo%ing com'onents:

    =. 1D credential

    =5

  • 8/18/2019 fpga in outer world

    17/31

    0. Door reader 

    ?. Door lock 

    @. #ontrol 'anel

    3. Access control serer 

    5. Database

    7. Soft%are

     

    A##!SS #O6,*O9 P*O#!SS

    Access control refers to e&erting control oer %ho can interact %ith a resource. Often but notal%ays- this inoles an authority- %ho does the controlling. ,he resource can be a gien building- grou' of buildings- or com'uterEbased information system.

    Access control is- in reality- an eeryday 'henomenon. A lock on a car door is essentially a

    form of access control. A P16 on an A, system at a bank is another means of access control.,he 'ossession of access control is of 'rime im'ortance %hen 'ersons seek to secureim'ortant- confidential- or sensitie information and eui'ment.

    1tem control or electronic key management is an area %ithin (and 'ossibly integrated %ith) anaccess control system %hich concerns the managing of 'ossession and location of small assetsor 'hysical (mechanical) keys.

    Physical security

    Physical access by a 'erson may be allo%ed de'ending on 'ayment- authoriFation- etc. Alsothere may be oneE%ay traffic of 'eo'le. ,hese can be enforced by 'ersonnel such as a borderguard- a doorman- a ticket checker- etc.- or %ith a deice such as a turnstile. ,here may befences to aoid circumenting this access control. An alternatie of access control in the strictsense ('hysically controlling access itself) is a system of checking authoriFed 'resence- see e.g.

    =7

    http://en.wikipedia.org/wiki/Phenomenonhttp://en.wikipedia.org/wiki/Personal_identification_numberhttp://en.wikipedia.org/wiki/Automatic_Teller_Machinehttp://en.wikipedia.org/wiki/Admission_to_an_event_or_establishmenthttp://en.wikipedia.org/wiki/One-way_traffic#One-way_traffic_of_peoplehttp://en.wikipedia.org/wiki/Border_guardhttp://en.wikipedia.org/wiki/Border_guardhttp://en.wikipedia.org/wiki/Bouncer_(doorman)http://en.wikipedia.org/wiki/Ticket_(admission)http://en.wikipedia.org/wiki/Turnstilehttp://en.wikipedia.org/wiki/Fencehttp://en.wikipedia.org/wiki/Phenomenonhttp://en.wikipedia.org/wiki/Personal_identification_numberhttp://en.wikipedia.org/wiki/Automatic_Teller_Machinehttp://en.wikipedia.org/wiki/Admission_to_an_event_or_establishmenthttp://en.wikipedia.org/wiki/One-way_traffic#One-way_traffic_of_peoplehttp://en.wikipedia.org/wiki/Border_guardhttp://en.wikipedia.org/wiki/Border_guardhttp://en.wikipedia.org/wiki/Bouncer_(doorman)http://en.wikipedia.org/wiki/Ticket_(admission)http://en.wikipedia.org/wiki/Turnstilehttp://en.wikipedia.org/wiki/Fence

  • 8/18/2019 fpga in outer world

    18/31

    ,icket controller (trans'ortation). A ariant is e&it control- e.g. of a sho' (checkout) or acountry.citation needed T

    1n pysical security- the term access control refers to the 'ractice of restricting entrance to a 'ro'erty- a building- or a room to authoriFed 'ersons. Physical access control can be achieed

     by a human (a guard- bouncer- or rece'tionist)- through mechanical means such as locks andkeys- or through technological means such as access control systems like the mantra'. $ithinthese enironments- 'hysical key management may also be em'loyed as a means of furthermanaging and monitoring access to mechanically keyed areas or access to certain small assets.Physical access control is a matter of %ho- %here- and %hen. An access control systemdetermines %ho is allo%ed to enter or e&it- %here they are allo%ed to e&it or enter- and %henthey are allo%ed to enter or e&it. Historically this %as 'artially accom'lished through keys andlocks. $hen a door is locked only someone %ith a key can enter through the door de'endingon ho% the lock is configured. echanical locks and keys do not allo% restriction of the keyholder to s'ecific times or dates. echanical locks and keys do not 'roide records of the keyused on any s'ecific door and the keys can be easily co'ied or transferred to an unauthoriFed

     'erson. $hen a mechanical key is lost or the key holder is no longer authoriFed to use the 'rotected area- the locks must be reEkeyed.

    !lectronic access control uses com'uters to sole the limitations of mechanical locks and keys.A %ide range of credentials can be used to re'lace mechanical keys. ,he electronic accesscontrol system grants access based on the credential 'resented. $hen access is granted- thedoor is unlocked for a 'redetermined time and the transaction is recorded. $hen access isrefused- the door remains locked and the attem'ted access is recorded. ,he system %ill alsomonitor the door and alarm if the door is forced o'en or held o'en too long after beingunlocked.

    Access control system operation

    $hen a credential is 'resented to a reader- the reader sends the credentials information-usually a number- to a control 'anel- a highly reliable 'rocessor. ,he control 'anel com'aresthe credentialRs number to an access control list- grants or denies the 'resented reuest- andsends a transaction log to a database. $hen access is denied based on the access control list-the door remains locked. 1f there is a match bet%een the credential and the access control list-

    =;

    http://en.wikipedia.org/wiki/Ticket_controller_(transportation)http://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Physical_securityhttp://en.wikipedia.org/wiki/Authorizedhttp://en.wikipedia.org/wiki/Mantraphttp://en.wikipedia.org/w/index.php?title=Physical_key_management&action=edit&redlink=1http://en.wikipedia.org/wiki/Credentialshttp://en.wikipedia.org/wiki/Ticket_controller_(transportation)http://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Physical_securityhttp://en.wikipedia.org/wiki/Authorizedhttp://en.wikipedia.org/wiki/Mantraphttp://en.wikipedia.org/w/index.php?title=Physical_key_management&action=edit&redlink=1http://en.wikipedia.org/wiki/Credentials

  • 8/18/2019 fpga in outer world

    19/31

    the control 'anel o'erates a relay that in turn unlocks the door. ,he control 'anel also ignores adoor o'en signal to 'reent an alarm. Often the reader 'roides feedback- such as a flashingred 9!D for an access denied and a flashing green 9!D for an access granted. ,he aboedescri'tion illustrates a single factor transaction. #redentials can be 'assed around- thussuberting the access control list. /or e&am'le- Alice has access rights to the serer room but

    4ob does not. Alice either gies 4ob her credential or 4ob takes itJ he no% has access to theserer room. ,o 'reent this- t%oEfactor authentication can be used. 1n a t%o factor transaction-the 'resented credential and a second factor are needed for access to be grantedJ another factorcan be a P16- a second credential- o'erator interention- or a biometric in'ut.

    ,here are three ty'es (factors) of authenticating information:=T

    • something the user kno%s- e.g. a 'ass%ord- 'assE'hrase or P16

    • something the user has- such as smart card

    • something the user is- such as finger'rint- erified by biometric measurement

    Pass%ords are a common means of erifying a userRs identity before access is gien toinformation systems. 1n addition- a fourth factor of authentication is no% recogniFed: someoneyou kno%- %here another 'erson %ho kno%s you can 'roide a human element ofauthentication in situations %here systems hae been set u' to allo% for such scenarios. /ore&am'le- a user may hae their 'ass%ord- but hae forgotten their smart card. 1n such ascenario- if the user is kno%n to designated cohorts- the cohorts may 'roide their smart cardand 'ass%ord in combination %ith the e&tant factor of the user in uestion and thus 'roidet%o factors for the user %ith missing credential- and three factors oerall to allo% access.

    Credential

    A credential is a 'hysicalGtangible obect- a 'iece of kno%ledge- or a facet of a 'ersonRs 'hysical being- that enables an indiidual access to a gien 'hysical facility or com'uterEbasedinformation system. ,y'ically- credentials can be something you kno% (such as number orP16)- something you hae (such as an access badge)- something you are (such as a biometricfeature) or some combination of these items. ,he ty'ical credential is an access card- key fob-or other key. ,here are many card technologies including magnetic stri'e- bar code- $ie gand-=03 kHF 'ro&imity- 05 bit cardEs%i'e- contact smart cards- and contact less smart cards. Alsoaailable are keyEfobs %hich are more com'act than 1D cards and attach to a key ring. ,y'ical biometric technologies include finger'rint- facial recognition- iris recognition- retinal scan-oice- and hand geometry.

    Access control system components

    =

  • 8/18/2019 fpga in outer world

    20/31

    An access control 'oint- %hich can be a door - turnstile- 'arking gate- eleator- or other 'hysical barrier %here granting access can be electronically controlled. ,y'ically the access 'oint is adoor. An electronic access control door can contain seeral elements. At its most basic there isa standEalone electric lock. ,he lock is unlocked by an o'erator %ith a s%itch. ,o automatethis- o'erator interention is re'laced by a reader. ,he reader could be a key'ad %here a code

    is entered- it could be a card reader - or it could be a biometric reader. *eaders do not usuallymake an access decision but send a card number to an access control 'anel that erifies thenumber against an access list. ,o monitor the door 'osition a magnetic door s%itch is used. 1nconce't the door s%itch is not unlike those on refrigerators or car doors. enerally only entry iscontrolled and e&it is uncontrolled. 1n cases %here e&it is also controlled a second reader isused on the o''osite side of the door. 1n cases %here e&it is not controlled- free e&it- a deicecalled a reuestEtoEe&it (*,!) is used. *euestEtoEe&it deices can be a 'ushEbutton or a motiondetector. $hen the button is 'ushed or the motion detector detects motion at the door- the dooralarm is tem'orarily ignored %hile the door is o'ened. !&iting a door %ithout haing toelectrically unlock the door is called mechanical free egress. ,his is an im'ortant safetyfeature. 1n cases %here the lock must be electrically unlocked on e&it- the reuestEtoEe&it

    deice also unlocks the door.

    citation needed T

    Access control topology

    ,y'ical access control door %iring

    0>

    http://en.wikipedia.org/wiki/Doorhttp://en.wikipedia.org/wiki/Card_readerhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/Wikipedia:Citation_neededhttp://en.wikipedia.org/wiki/File:Intelligent_access_control_door_wiring.PNGhttp://en.wikipedia.org/wiki/File:Access_control_door_wiring.pnghttp://en.wikipedia.org/wiki/File:Access_control_door_wiring.pnghttp://en.wikipedia.org/wiki/Doorhttp://en.wikipedia.org/wiki/Card_readerhttp://en.wikipedia.org/wiki/Wikipedia:Citation_needed

  • 8/18/2019 fpga in outer world

    21/31

    Access control door %iring %hen using intelligent readers

    Access control decisions are made by com'aring the credential to an access control list. ,hislooku' can be done by a host or serer- by an access control 'anel- or by a reader. ,he

    deelo'ment of access control systems has seen a steady 'ush of the looku' out from a centralhost to the edge of the system- or the reader. ,he 'redominant to'ology circa 0>>< is hub ands'oke %ith a control 'anel as the hub and the readers as the s'okes. ,he looku' and controlfunctions are by the control 'anel. ,he s'okes communicate through a serial connectionJusually *S@;3. Some manufactures are 'ushing the decision making to the edge by 'lacing acontroller at the door. ,he controllers are 1P enabled and connect to a host and database usingstandard net%orks.

    !ypes of readers

    Access control readers may be classified by functions they are able to 'erform :

    • 4asic (nonEintelligent) readers: sim'ly read card number or P16 and for%ard it to a

    control 'anel. 1n case of biometric identification- such readers out'ut 1D number of auser. ,y'ically $ie gand 'rotocol is used for transmitting data to the control 'anel- butother o'tions such as *SE0?0- *SE@;3 and #lockGData are not uncommon. ,his is themost 'o'ular ty'e of access control readers. !&am'les of such readers are */ ,iny by*/9O1#S- Pro& Point by H1D- and P?>> by /ar 'oint Data.

    • SemiEintelligent readers: hae all in'uts and out'uts necessary to control door hard%are(lock- door contact- e&it button)- but do not make any access decisions. $hen a user 'resents a card or enters P16- the reader sends information to the main controller and%aits for its res'onse. 1f the connection to the main controller is interru'ted- such

    readers sto' %orking or function in a degraded mode. Usually semiEintelligent readersare connected to a control 'anel ia an *SE@;3 bus. !&am'les of such readers are 1nfoPro& 9ite 1P90>> by #! Systems and APE3=> by A'ollo.

    • 1ntelligent readers: hae all in'uts and out'uts necessary to control door hard%are- they

    also hae memory and 'rocessing 'o%er necessary to make access decisionsinde'endently. Same as semiEintelligent readers they are connected to a control 'anelia an *SE@;3 bus. ,he control 'anel sends configuration u'dates and retriees eentsfrom the readers. !&am'les of such readers could be 1nfo Pro& 1PO0>> by #!Systems and APE3>> by A'ollo. ,here is also a ne% generation of intelligent readersreferred to as M1P readersM. Systems %ith 1P readers usually do not hae traditionalcontrol 'anels and readers communicate directly to P# that acts as a host. !&am'les of

    such readers are Po%er 6et 1P *eader by 1so nas Security Systems- 1D>; by Solus hasthe built in %ebserice to make it user friendly- !dge !*@> reader by H1D lobal- 9og9ock and U6i 9O#+ by ASPi SS 9td- 4io !ntry Plus reader by Su'rema 1nc. and @BEStation by 4ioscry't 1nc.

    Some readers may hae additional features such as 9#D and function buttons for datacollection 'ur'oses (i.e. clockEinGclockEout eents for attendance re'orts)-cameraGs'eakerGmicro'hone for intercom- and smart card readG%rite su''ort.

    0=

    http://en.wikipedia.org/wiki/Wiegand_interfacehttp://en.wikipedia.org/wiki/EIA-485http://en.wikipedia.org/wiki/IP_readerhttp://www.isonas.com/http://en.wikipedia.org/wiki/Bioscrypt_Inc.http://en.wikipedia.org/wiki/File:Intelligent_access_control_door_wiring.PNGhttp://en.wikipedia.org/wiki/Wiegand_interfacehttp://en.wikipedia.org/wiki/EIA-485http://en.wikipedia.org/wiki/IP_readerhttp://www.isonas.com/http://en.wikipedia.org/wiki/Bioscrypt_Inc.

  • 8/18/2019 fpga in outer world

    22/31

    Access control readers may also be classified by the ty'e of  identification technology.

    Access control system topologies

    Access control system using serial controllers

    "# $erial controllers# #ontrollers are connected to a host P# ia a serial *SE@;3 communication line (or ia 0>mA current loo' in some older systems). !&ternal*SE0?0G@;3 conerters or internal *SE@;3 cards hae to be installed as standard

    P#s do not hae *SE@;3 communication 'orts. 

    Adantages:

    • *SE@;3 standard allo%s long cable runs- u' to @>>> feet (=0>> m)

    • *elatiely short res'onse time. ,he ma&imum number of deices on an *SE@;3 line is

    limited to ?0- %hich means that the host can freuently reuest status u'dates from eachdeice and dis'lay eents almost in real time.

    • High reliability and security as the communication line is not shared %ith any othersystems.

    Disadantages

    • *SE@;3 does not allo% StarEty'e %iring unless s'litters are used

    • *SE@;3 is not %ell suited for transferring large amounts of data (i.e. configuration and

    users). ,he highest 'ossible through'ut is ==3.0 kbGs- but in most system it isdo%ngraded to 35.0 kbGs or less to increase reliability.

    • *SE@;3 does not allo% host P# to communicate %ith seeral controllers connected to

    the same 'ort simultaneously. ,herefore in large systems transfers of configuration andusers to controllers may take a ery long time and interfere %ith normal o'erations.

    • #ontrollers cannot initiate communication in case of an alarm. ,he host P# acts as a

    master on the *SE@;3 communication line and controllers hae to %ait till they are

     'olled.• S'ecial serial s%itches are reuired in order to build a redundant host P# setu'.

    • Se'arate *SE@;3 lines hae to be installed instead of using an already e&isting net%ork

    infrastructure.• #able that meets *SE@;3 standards is significantly more e&'ensie than the regular

    #ategory 3 U,P net%ork cable.

    00

    http://en.wikipedia.org/wiki/Card_readerhttp://en.wikipedia.org/wiki/EIA-485http://en.wikipedia.org/wiki/Current_loophttp://en.wikipedia.org/wiki/File:Access_control_topologies_serial_controllers.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_serial_controllers.pnghttp://en.wikipedia.org/wiki/Card_readerhttp://en.wikipedia.org/wiki/EIA-485http://en.wikipedia.org/wiki/Current_loop

  • 8/18/2019 fpga in outer world

    23/31

    • O'eration of the system is highly de'endent on the host P#. 1n case the host P# fails-

    eents from controllers are not retrieed and functions that reuired interaction bet%eencontrollers (i.e. antiE'ass back) sto' %orking.

    Access control system using serial main and subEcontrollers

    %# $erial main and su&-controllers# All door hard%are is connected to subEcontrollers (a.k.a. door controllers or door interfaces). SubEcontrollers usuallydo not make access decisions- and for%ard all reuests to the main controllers.ain controllers usually su''ort from =5 to ?0 subEcontrollers.

    Adantage

    • $ork load on the host P# is significantly reduced- because it only needs to

    communicate %ith a fe% main controllers.• ,he oerall cost of the system is lo%er- as subEcontrollers are usually sim'le and

    ine&'ensie deices.• All other adantages listed in the first 'aragra'h a''ly.

    Disadantages

    • O'eration of the system is highly de'endent on main controllers. 1n case one of the

    main controllers fails- eents from its subEcontrollers are not retrieed and functionsthat reuire interaction bet%een sub controllers (i.e. antiE'assback) sto' %orking.

    • Some models of subEcontrollers (usually lo%er cost) hae no memory and 'rocessing

     'o%er to make access decisions inde'endently. 1f the main controller fails- subEcontrollers change to degraded mode in %hich doors are either com'letely locked orunlocked and no eents are recorded. Such subEcontrollers should be aoided or usedonly in areas that do not reuire high security.

    • ain controllers tend to be e&'ensie- therefore such to'ology is not ery %ell suited

    for systems %ith multi'le remote locations that hae only a fe% doors.• All other *SE@;3Erelated disadantages listed in the first 'aragra'h a''ly.

    0?

    http://en.wikipedia.org/wiki/File:Access_control_topologies_main_controller_b.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_main_controller_b.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_main_controller_a.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_main_controller_a.png

  • 8/18/2019 fpga in outer world

    24/31

    Access control system using serial main controller and intelligent readers

    '# $erial main controllers intelligent readers# All door hard%are is connected directly tointelligent or semiEintelligent readers. *eaders usually do not make access decisions- andfor%ard all reuests to the main controller. Only if the connection to the main controller is

    unaailable- the readers use their internal database to make access decisions and record eents.SemiEintelligent reader that hae no database and cannot function %ithout the main controllershould be used only in areas that do not reuire high security. ain controllers usually su''ortfrom =5 to 5@ readers. All adantages and disadantages are the same as the ones listed in thesecond 'aragra'h.

    Access control systems using serial controllers and terminal serers

    # $erial controllers *it terminal servers# 1n s'ite of the ra'id deelo'ment and increasinguse of com'uter net%orks- access control manufacturers remained conseratie and did notrush to introduce net%orkEenabled 'roducts. $hen 'ressed for solutions %ith net%orkconnectiity- many chose the o'tion reuiring less efforts: addition of a terminal serer- adeice that conerts serial data for transmission ia 9A6 or $A6. Adantages

    • Allo%s utiliFing e&isting net%ork infrastructure for connecting se'arate segments of thesystem. A4#

    • Proides conenient solution in cases %hen installation of an *SE@;3 line %ould be

    difficult or im'ossible.

    Disadantages

      1ncreases com'le&ity of the system.

    0@

    http://en.wikipedia.org/wiki/Terminal_serverhttp://en.wikipedia.org/wiki/File:Access_control_topologies_terminal_servers.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_terminal_servers.pnghttp://en.wikipedia.org/wiki/Terminal_server

  • 8/18/2019 fpga in outer world

    25/31

    • #reates additional %ork for installers: usually terminal serers hae to be configured

    inde'endently- not through the interface of the access control soft%are.• Serial communication link bet%een the controller and the terminal serer acts as a

     bottleneck: een though the data bet%een the host P# and the terminal serer traels atthe =>G=>>G=>>>bitGs net%ork s'eed it then slo%s do%n to the serial s'eed of ==0.3

    kbitGs or less. ,here are also additional delays introduced in the 'rocess of conersion bet%een serial and net%ork data.

    All *SE@;3Erelated adantages and disadantages also a''ly.

    Access control system using net%orkEenabled main controllers

    +# Net*or,-ena&led main controllers# ,he to'ology is nearly the same as described in the

    second and third 'aragra'hs. ,he same adantages and disadantages a''ly- but the onEboardnet%ork interface offers a cou'le aluable im'roements. ,ransmission of configuration andusers to the main controllers is faster and may be done in 'arallel. ,his makes the system moreres'onsie and does not interru't normal o'erations. 6o s'ecial hard%are is reuired in orderto achiee redundant host P# setu': in case the 'rimary host P# fails- the secondary host P#may start 'olling net%ork controllers. ,he disadantages introduced by terminal serers (listedin the fourth 'aragra'h) are also eliminated.

    Access control system using 1P controllers

    # IP controllers# #ontrollers are connected to a host P# ia !thernet 9A6 or $A6.

     Adantage

    03

    http://en.wikipedia.org/wiki/IP_access_controllerhttp://en.wikipedia.org/wiki/File:Access_control_topologies_IP_controller.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_IP_controller.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_IP_master.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_IP_master.pnghttp://en.wikipedia.org/wiki/IP_access_controller

  • 8/18/2019 fpga in outer world

    26/31

    • An e&isting net%ork infrastructure is fully utiliFed- there is no need to install ne%

    communication lines.• ,here are no limitations regarding the number of controllers (?0 'er line in case of *SE

    @;3).• S'ecial *SE@;3 installation- termination- grounding and troubleshooting kno%ledge is

    not reuired.• #ommunication %ith controllers may be done at the full net%ork s'eed- %hich is

    im'ortant if transferring a lot of data (databases %ith thousands of users- 'ossiblyincluding biometric records).

    • 1n case of an alarm controllers may initiate connection to the host P#. ,his ability is

    im'ortant in large systems because it allo%s to reduce net%ork traffic caused byunnecessary 'olling.

    • Sim'lifies installation of systems consisting of multi'le sites se'arated by large

    distances. 4asic 1nternet link is sufficient to establish connections to remote locations.• $ide selection of standard net%ork eui'ment is aailable to 'roide connectiity in

    different situations (fiber- %ireless- BP6- dual 'ath- Po !)

    Disadantages:

    • ,he system becomes susce'tible to net%ork related 'roblems- such as delays in case of

    heay traffic and net%ork eui'ment failures.• Access controllers and %orkstations may become accessible to hackers if the net%ork

    of the organiFation is not %ell 'rotected. ,his threat may be eliminated by 'hysicallyse'arating the access control net%ork from the net%ork of the organiFation. Also itshould be noted that most 1P controllers utiliFe either 9inu& 'latform or 'ro'rietaryo'erating systems- %hich makes them more difficult to hack. 1ndustry standard dataencry'tion is also used.

    a&imum distance from a hub or a s%itch to the controller (if using a co''er cable) is=>> meters (??> ft).

    • O'eration of the system is de'endent on the host P#. 1n case the host P# fails- eents

    from controllers are not retrieed and functions that reuire interaction bet%eencontrollers (i.e. antiE'assback) sto' %orking. Some controllers- ho%eer- hae 'eerEtoE 'eer communication o'tion in order to reduce de'endency on the host P#.

    Access control system using 1P readers

    .# IP readers# *eaders are connected to a host P# ia !thernet 9A6 or $A6. Adantage:

    • ost 1P readers are Po! ca'able. ,his feature makes it ery easy to 'roide battery

     backed 'o%er to the entire system- including the locks and arious ty'es of detectors (if used).

    05

    http://en.wikipedia.org/wiki/IP_readerhttp://en.wikipedia.org/wiki/File:Access_control_topologies_IP_reader.pnghttp://en.wikipedia.org/wiki/File:Access_control_topologies_IP_reader.pnghttp://en.wikipedia.org/wiki/IP_reader

  • 8/18/2019 fpga in outer world

    27/31

    • 1P readers eliminate the need for controller enclosures.

    • ,here is no %asted ca'acity %hen using 1P readers (i.e. a @Edoor controller %ould hae

    03 unused ca'acity if it %as controlling only ? doors).• 1P reader systems scale easily: there is no need to install ne% main or subEcontrollers.

    • /ailure of one 1P reader does not affect any other readers in the system.

    Disadantages:

    1n order to be used in highEsecurity areas 1P readers reuire s'ecial in'utGout'ut modules toeliminate the 'ossibility of intrusion by accessing lock andGor e&it button %iring. 6ot all 1Preader manufacturers hae such modules aailable.

    • 4eing more so'histicated than basic readers 1P readers are also more e&'ensie and

    sensitie- therefore they should not be installed outdoors in areas %ith harsh %eatherconditions or high 'ossibility of andalism- unless s'ecifically designed for e&teriorinstallation. A fe% manufacturers make such models.

    ,he adantages and disadantages of 1P controllers a''ly to the 1P readers as %ell.

    #OPO6!6,S *!U1*!D

    /or making the */1D based access control system 'roect- %e reuire follo%ing com'onents:

    =. icrocontroller ;>?

    07

  • 8/18/2019 fpga in outer world

    28/31

    7. A8E0?0 16,!*/A#! #A49!

    ;. */1D #A*D

  • 8/18/2019 fpga in outer world

    29/31

    V 1ncreased *eenues

    V !&ce'tion anagement

    APP91#A,1O6S

    ,he term access control refers to the 'ractice of restricting entrance to the 'ro'erty- a buildingor room to authoriFed 'ersons. 1ntegrated and controller based access control numeric andal'habetic keyless entry key'ads %ith 'rogrammable features for access control of singleo'ening. ,he arious a''lications are as follo%sE

    V 1ndustrial facilities

    V #ommercial buildings

    V Air'orts trans'ortation

    V #iil trans'ortation

    V #onention hall

    V Psychiatric care centres

    0

  • 8/18/2019 fpga in outer world

    30/31

    V useums and fine art galleries

    V $are house

    V ,echnology centres

    V oernment and military

    V 9ong term care facilities

    V Drug rehabilitation centres

    #O6#9US1O6

    Access control is the only technology that 'roactiely attem'ts to kee' unauthoriFedindiiduals out of a building or areas %ithin a facility- and is a 'erfect com'lement to ideosureillance- burglar and fire systems in a com'rehensie security solution 'ro'osal.

    ,he im'lementation of */1D based system in access control and security o'erations are bound to increase in future. ,he adantages- reliability of the system hae made it manifestitself oer the e&isting systems. ,he system achiees a t%o leel security making in

    incor'orating firm more secure.

    /urther this system is com'atible for the future u' gradations like a /inger 'rint scanner- retinascanner- monitoring camera etc- making it more ersatile. $ith the introduction of more */1Ddeices in near future the system is going to rule the field of access control and security.

    ?>

  • 8/18/2019 fpga in outer world

    31/31

    *!/!*!6#!S

    =. %%%.docstoc.comGdocsG00550=

    0. %%%.slideshare.netGsearch

    ?. htt':GGdocs.google.comGie%er 

    @. htt':GG'roect%orld.%ord'ress.co.

    3. htt':GGscientific.netGamr 

    5. google.com

    http://www.docstoc.com/docs/226http://www.slideshare.net/searchhttp://projectworld.wordpress.co/http://www.docstoc.com/docs/226http://www.slideshare.net/searchhttp://projectworld.wordpress.co/