Вы находитесь на странице: 1из 40

CE6011 - Smart Buildings and Automation

INTELLIGENT
UNLOCKING
SYSTEM

OUR TEAM (Group 1)


CE11B032 - Chaitra Lakshmi Mallela
CE11B022 - Anusha GVV
CE11B030 - K Sravan Kumar Reddy
CE11B036 - Kavya Marupudi
CE11B094 - Palash Somani

The project is about unlocking an office door using the facial recognition system with
owners authentication. This system will be helpful in a building which is used by multiple
sources. For example, a lab which is to be accessed by many research students use either
multiple keys or a biometric access to the registered users. Giving away multiple keys might be
misused and the biometric access requires the registration and the updating is not easy. Through
this system, user can allow access to any person either once or for every time the person comes.
It makes updating the database simpler and the one-time access for a person to enter.

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Table of Contents:
S.No.

Content

Page Number

Conceptual Design

Components & Softwares

Specifications of components

Softwares

Proposed System

11

Benefits

15

Issues

16

Bill of Quantities

16

References

17

10

Contributions

17

11

Brochures

18

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Conceptual Design
When the bell is pressed or the RFID tag is read, the camera gets switched on.
Images are sent to the facial recognition software.
If match is found, the door is opened. Else, the image is sent to the virtual sensor in the
Global Sensor Network.
This sends the image to the mobile phone of the client.
Then the response of the client is taken using an application which is again connected to the
virtual sensor.
Depending on the response, the door is opened or an alert system gives a voice message
that access is denied.

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Components
Hardware:

Push Button
RFID Reader module
Wireless IP Camera
Computer
Smart Phone
Door Lock system
o Mechanical Lock
o Communication Hub
o Access Control

Software:
Global Sensor network
Mobile application

Specifications of Components
Push button:
50 mA 12V DC rating
Through hole mounting design
Single or dual LED options
Momentary actuation

RFID reader module:


Support external antenna
Maximum effective distance up to
50mm
Less than 100ms decoding time
UART TTL interface
Support EM4100 compatible read only
or read/write tags
Built-in external bi-color LED and buzzer
driver
Frequency: 125 KHz
Baud Rate - 9600 (TTL Electricity Level RS232 format)

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Power Supply: DC 5V
Current: <50 Ma
Operating Range: >50 mm
Working Temperature: -100C to 700C

Wireless IP camera
Sensor: CMOS 1/4 inch
Network Interface: 802.11b/g/n
Network Protocol: TCP/IP, DHCP, SMTP, TP, DDNS, UPNP
White Balance: Auto
Working Temperature: 0 - 50 C
Power Source: Power Adapter (100V-240V)
Power Consumption 3W
Viewing Distance: 80 - 100 meters
Resolution - 320 x 240, 640 x 480
Mode - 50 Hz/60Hz, Outdoor

Lock parts and Specifications:

SNo
1
2
3
4
5
6
7
8
9
10
11
12
13
14

Component
Cylinder
Control Unit
Cover
Spacer (thick)
Spacer(thin)
Mounting plate
Locking unit
Locking nut tool
Mounting
screws
Allen wrench
Battery
Cover screw
Set screw
Thumbturn

Qty
1
1
1
1
1
1
1
1
1
1
1
1
1
1

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Mounting hardware:
S.No

Component

Qty

Screw caps

2-56 x 1 1/4 screw

6-32 x 1 screw

2-56 x 1 3/8 screw

Wireless Frequency: 2.4 GHz, IEEE 802.15.4, using AES 128bit encryption
Hub Power Requirement: 8-24VDC, 250mA
Lock Battery Type: CR2, providing 30,000 Cycles
Operating Temperature: -10C to 50C
FCC Part 15, Class B Compliant
Credentials Supported: 13.56MHz iCLASS credentials are supported

Communication Hub
Communication Hub is the link between locks and the existing access control system. Up to 8 locks
can be paired to one Hub and has a standard RS485 connection, making it compatible with most
systems on the market today. It communicates directly with enabled locks via an encrypted 2.4GHz
wireless link, and is designed to be positioned above the door within approximately 5 -25m of the
lock.
Key Features

Connect up to 8 devices on a single hub


RS485 interface
Encrypted radio communication
Integrated antenna
LED status for visual indication

Applications

Internal doors only


Expand existing access control systems
New access control installations
Doors that can't be hard wired

Technical Information:

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Power: 8-24Vdc
Power consumption: 250 mA - Minimum 80mA at 12VDC
Radio standard: IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)
Encryption: AES 128 Bit
Range between Locks and Hubs - 15 - 25 m depending on building environments
Operating temperature: 5C to 35C
Humidity: < 95% non condensation
IP-degree: IP 20

Access Control System:


Access control system is an integrated solution that consists of hardware and software designed to
control entry into selected areas and manage movement of people/vehicles within. The system is
designed to increase security by defining access permissions based on area and time for each user
and maintaining a log of all events.

Components of an access control system:


-

Electric locks

Controllers: receive settings from software and control the electromechanical hardware of
the system.

Contactless readers: use the image from the camera to read the relative position, size and
shape of the user's eyes, nose, cheekbones and jaw features to ensure accuracy of the
identification

Technical requirements
1. Systems using Ethernet converters, adapters, or terminal servers that enable
network connectivity for legacy controllers by tunneling RS-485 serial data over
Ethernet shall not be acceptable.
2. Single-door controller and IP-reader/Camera shall have at least 32Mb SDRAM
operating memory and 8 MB Flash memory for database and events. Two-door
controller shall have an option for expanding Flash memory to 32MB.
3. All controllers and IP-readers/Camera shall use a 32Bit 100Mhz RISC processor (or
better) in order to enable fast execution of advanced functions.
4. Controllers and IP-readers shall be capable of supplying up to 600mA @ 12VDC to
peripheral devices: readers, electric locks, sirens, detectors, etc.
5. Controllers and IP-readers shall accept the standard 12VDC power input in case an
existing network infrastructure does not support PoE.

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

Software
Global Sensor Network

Sensor data is captured using sensors built into the mobile phones. The open source sensor data
stream processing engine called Global Sensor Network (GSN) with android platform is used to
capture the data. A prototype application should be developed which can be installed on android
devices and an Android wrapper is used as a GSN middleware component.
Global Sensor Network makes the access to sensor networks and data simple, powerful and flexible
just as accessing web documents.
Simplicity: The sensor networks are defined in a declarative way using SQL as data manipulation
language.
Adaptability: Adding new types of sensor networks and dynamic reconfiguration of data sources has
to be supported without interfering with the ongoing system operation which can be achieved using
a container based implementation.
Scalability: The design of GSN is based on peer-to-peer architecture for distributed query processing
and discovery of sensor networks.

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

GLOBAL SENSOR NETWORK MODEL


Single sensors or whole sensor networks are connected via wireless connections to an access point.
Ad-hoc routing protocols route data to selected sensors that communicate with an access point
which is connected to the Internet and can process and make available the data received from the
sensors. Applications wanting to use the sensor data need to first identify the access points, possibly
through multiple layers and then follow the specific access protocols defined.
GSN provides logical view on sensor networks based on the virtual sensor abstraction. They abstract
implementation details to access sensor
data and model sensor data as temporal
streams of relational data. They can also
represent derived views on sensor data
streams, resulting from post-processing
and combination of sensor data from
different sources. Applications can
discover sensor networks using the
registry and subsequently access sensor
networks by using standard data access
interface.

SYSTEM ARCHITECTURE AND IMPLEMENTATION:


Each GSN container hosts a number of virtual sensor definitions for the set of virtual sensors it is
responsible for.
Virtual Sensor : A virtual sensor corresponds either to a data stream received directly from sensors
or to a data stream derived from other virtual sensors. The specification of a virtual sensor provides
all necessary information required for deploying and using it including:
Metadata used for identification and discovery
Structure of data streams which the virtual sensor consumes and produces
A declarative SQL based specification of the data stream processing performed in a
virtual sensor.
Functional properties related to persistency, error handling, life cycle management and
physical deployment.
Virtual Sensor Manager (VSM) : It is responsible for providing access to the virtual sensors,
managing the delivery of sensor data, and providing the necessary administrative infrastructure. The
VSM has two main subcomponents: The life-cycle manager (LCM) provides and manages the
resources provided to a virtual sensor and manages the interactions with a virtual sensor (sensor
readings, etc.)
The input stream manager (ISM): It is responsible for handling sensor disconnections, missing
values, unexpected delays, etc., thus ensuring stream quality of service via the included stream

INTELLIGENT UNLOCKING SYSTEM

CE6011 - Smart Buildings and Automation

quality manager (SQM). The data from/to the VSM passes through the storage layer which is in
charge of providing and managing persistent storage for data streams.
Query processing: It is done by the query manager (QM) which includes the query processor being in
charge of SQL parsing, query planning, execution of queries. The query repository manages all
registered queries(subscriptions) and defines and maintains the set of currently active queries for
the query processor.
Notification Manager: The notification manager deals with the delivery of events and query results
to the registered clients. The notification manager has an extensible architecture which allows the
user to customize its functionality, for example, having results mailed or being notified via SMS.
Wrapper: In order to refer to data
streams produced by a virtual sensor we
use logical addressing. Each virtual sensor
can be equipped with a set of key value
pairs which can be registered and
discovered in GSN. To specify the
processing of the input streams we use
SQL queries which refer to the input
streams by the reserved keyword
WRAPPER. A wrapper connection request
is an object which contains a wrapper
name and its initialisation parameters as defined in the Virtual sensor. Whenever a WCR is
generated at the virtual sensor loader, it will be sent to the wrapper repository.
Few methods used in wrapper:
Initialise() creates a socket and waits until the client mobile sends the metadata
packet.
createDataFieldCollection() The information is passed into this method and stored.
Finalise() End of wrappers life cycle. It closes all the connection established.
getOutputFormat() returns a data field object that provides a description of the data
provided by the wrapper.
Run() retrieves data from the mobile phone.
mapSensorData() maps the newly received data to the GSN model structure.
After the data is sent to the GSN data model, querying, filtering and other functionalities provided by
GSN can be done.

Mobile Application
The Android SDK provides you the API libraries and developer tools necessary to build, test, and
debug apps for Android. The ADT Bundle should be downloaded for this purpose. It includes the
essential Android SDK components and a version of the Eclipse IDE with built-in ADT (Android
Developer Tools) to streamline your Android app development.

INTELLIGENT UNLOCKING SYSTEM

10

CE6011 - Smart Buildings and Automation

User Interface:
Notification to user, when the image is received
Option to click yes/no to unlock the door or keep the door locked respectively
Behavior:
The input stream from the virtual sensor is directed to the mobile application and the app
should display the notification
The input given by the user should be sent back to the virtual sensor where the respective
queries are processed

Proposed System
Initializing the camera:
When the bell is pressed or RFID card is read, the camera is switched on and starts recording. When
it is activated once, the circuit will be closed til the images are sent to the computer.

Facial Recognition:
Below is the process of setting up a wireless network camera sensor to monitor a office building
Mounting the camera
Before the camera is configured, the position of it has to be fixed. The best position would
be to place at six feet above the ground, but since it disturbs the aesthetic sense, we should
place at the left top corner on the wall next to the door
The switch (used for bells) will be an input source of voltage signals to power the camera on.
Configuration
Connect the Camera to the computer, which acts as the router, by using Ethernet. This is
done by installing the software CD provided by the camera's company
Working:
When a person wants to enter the building, he is to press the bell which will initiate the camera.
Then the camera will take continuous pictures using the Eigen face generation system. Using this,
the unique identity with the relevant features, from facial images were extracted and sent to the
database through Ethernet. The method involved in extracting the data for identifying the facial
features is explained as below:
Eigen face generation
This camera uses Principle Component Analysis (PCA) which is a well known Eigen face based face
recognition algorithm. Here a set of Eigen faces, Eigen vectors and mean were extracted by
performing a mathematical process on a set of trained images depicting different human faces. Here

INTELLIGENT UNLOCKING SYSTEM

11

CE6011 - Smart Buildings and Automation

the training images are defined as a set of flattened vectors and these vectors are assembled
together into a single matrix. The extracted Eigen vectors of the matrix are stored in a database.
Eigen vectors are defined by the face spaces which are the training face images that are projected.
This results in the variation between the set of faces without emphasis on any one facial region like
the eyes or nose. The projected face space representation of each training image is also saved to a
database. To identify a face, the test image is projected to face space using the saved Eigen vectors.
The projected test image is then compared against each saved projected training image for
similarity. The identity of the person in the test image is assumed to be the same as the person
depicted in the most similar training image. Then the final recognized images are sent to the router.

Action taken from the Facial Recognition responses:


If the face is recognised, the door will open. The process of opening the door will be explained in the
later section.
If the face is not recognised, the image is sent to the virtual sensor in GSN. The process is explained
under working of GSN section.

Intelligent Wi-Fi Access Control Locking :


The reach of the access control system is extended using IEEE 802.11b/g WiFi infrastructure. This
system provides complete access control in locations where it would be difficult or cost-prohibitive
to install a wired lock. With no wires to run, installation time is significantly reduced . It can be
simply installed on the door and configured to communicate with the wireless network.

INTELLIGENT UNLOCKING SYSTEM

12

CE6011 - Smart Buildings and Automation

The Locking system offers an easy retrofit solution for mechanical door hardware. Access control is
added to the door in the time it takes to switch out a cylinder. Local wireless communication
between the lock and a hub connects to the access control system, eliminating the inconvenience of
bringing wiring to the door. The lock communicates wirelessly to an Hub, which connects to the
access control system using RS-485 or Wiegand wiring. Industry standard Wiegand output offers
easy integration with many popular access control systems, while the RS-485 version offers the
flexibility and scalability to support up to eight locks per hub. We choose to use RS-485 as it can be
used for opening multiple doors and it would be convenient for scaling up the project in the future.

Choosing the hub location


It is recommended that the hub be mounted near the top of a wall, on the ceiling or above the
ceiling to reduce potential for interference. For a stable and
reliable radio link, it is recommended that the hub is located
within 45 feet of the lock. A maximum of two interior walls
between the hub and lock can be present.
Recommended locations:

Wall Mount
Ceiling Mount
Inside Ceiling Mount
Wall Mount, Adjacent Room

Mounting the hub


The adapter plate is used to mount the hub on a
single or double gang box.

INTELLIGENT UNLOCKING SYSTEM

13

CE6011 - Smart Buildings and Automation

Wiring the hub:

Connects to the Access


Control system via Wiegand
wiring.

Requires 8-24VDC power


(250mA).

Includes three form C relays


that can be used to
transmit Lock jamb status,
low battery signal and a
tamper signal.

Connects to the mortise


lock wirelessly.

Then the hub connected to power and the access control system. With a known credential to
confirm, the lock will open as desired.

Authentication from the client


If the image is not recognized by the facial recognition software, the image is sent to the virtual
sensor in the GSN whose input stream comes from the web cam. The image is sent to the owner via
mail. Then the user can choose whether to open the door or not using the application installed in
the phone. The response of the application is sent to the virtual sensor via Android wrapper and the
corresponding query processing is done.
Acting to the responses of the owner:
If the command is yes, the command is sent to door unlocking system to open the door.
If the command is no, the voice alert system is activated
Code - Wireless camera to Virtual sensor
1<virtual-sensor name="FacialRec" priority="11">
2 <class>gsn.vsensor.BridgeVirtualSensor</class>
3 <author>Dslotproj</author>
4 <email>email</email>
5 <description>Facial Recognition</description>
6 <life-cycle pool-size="10" />
7 <output-specification rate="500" />
8 <addressing>
9 <predicate key="geographical">BC143-N</predicate>
10 <predicate key="type">image</predicate>
11 </addressing>
12 <output-structure>

INTELLIGENT UNLOCKING SYSTEM

14

CE6011 - Smart Buildings and Automation

13 <field name="image" type=".jpeg" />


14 </output-structure>
15 <storage history-size="1 hour " permanent-storage="true" />
16 <input-streams>
17 <input-stream name="image" >
18 <stream-source alias="facreg" storage-size="1">
19 <address wrapper="tinyos">
20 <predicate key="host">lsirpc24.epfl.ch</predicate>
21 <predicate key="port">9001</predicate>
22 </address>
23 <query>
24 //Mail the image to the owner
26 </query>
27 </stream-source>
31 </input-stream>
32 </input-streams>
33 </virtual-sensor>

Code - Android wrapper


public class EmptyWrapper extends AbstractWrapper{
public boolean initialize(){
//Wait for client to send meta data packet
//Analyse the meta data packet and identify the enabled application on client side
//CreateDataFieldCollection (Response recorded in the application)
}
public void run(){
while(isActive()){
//Wait for the client to send the data
//mapSensorData(data from app, enabled sensors)
}
public DataField getOutputFormat(){.}
public string getWrapperName(){.}
public void finalise(){}
}

Benefits:

Improvising the quality and energy efficiency of the environmental system while allowing
almost unlimited reconfiguration and customization in the future.
The door can be accessed from anywhere.
It provides real-time information about who is accessing the office.
We can also choose to receive notifications about all the activity around the door to our
mobile phone. All activity is recorded and logged by the system, and it is available for review
at any time.
One of the main advantages of automatic door unlock is the fact that you will not be
required to carry a key all the time.
We can provide entry into the workplace to others at our discretion.
Local wireless communication eliminates the cost and inconvenience of wiring in and around
the door. With no wires to run, installation time is significantly reduced.

INTELLIGENT UNLOCKING SYSTEM

15

CE6011 - Smart Buildings and Automation

The images captured by the camera system are recorded and stored into a database. These
are helpful in maintaining records so that they can be easily retrieved later, when needed.
Reducing the amount of communication required to perform tasks by distributed or local pre
computations

Issues:

The system is highly dependent on the smart phone of the owner. It becomes difficult to
access the door if the phone is misplaced.
No alternative is provided if even one of the components malfunctions.
Camera system cannot monitor every area of your office at all times, hence may not be able
to detect everyone arriving at the door.
If several persons are standing at the door, the image sent to the system is analyzed and
even if one persons image is authenticated, the system opens the door.
The initial costs incurred are high. The installation may also increase the initial expenditure.
Developing wrappers is a time consuming and tedious job. Therefore, research is conducted
to develop automatic wrappers.
Location privacy against a global eavesdropper:
While many protocols for sensor network security provide confidentiality for the
content of messages, contextual information usually remains exposed. The location privacy
issues can be formalized under a strong adversary model and communication overhead
needed for achieving a given level of privacy can be determined. Periodic collection and
source simulation can be used to prevent leakage of information. Periodic collection
provides a high level of location privacy, while source simulation provides trade-offs
between privacy, communication cost, and latency.

Bill Of Quantities:
S.No
1
2
3
4
5
6

Component*
Bell Switch
RFID reader module
Wireless camera (D-Link DCS-932L)
Communication hub
Lock
Access control

Quantity
1
1
1
1
1
1

Price(INR)
150
865
4599
8500

*Cost of assembled components is mentioned above. The separate hardware components required
for each of the above mentioned components are listed in the Specifications.

INTELLIGENT UNLOCKING SYSTEM

16

CE6011 - Smart Buildings and Automation

References:
http://www.intelligentopenings.com/en/site
http://www.medeco.com/Other/Medeco
http://www.assaabloy.com.au/
http://gadgets.ndtv.com/mobile
http://www.hidglobal.com/product-display
http://www.alibaba.com/showroom
http://sweets.construction.com/
http://startrinity.com/VideoRecognition/Resources
http://arxiv.org/abs/1301.0157

Contributions:
We have divided the whole project equally and everyone contributed the same.
Hence we are giving equal weightage to everyone's work.

20% - CE11B032 - Chaitra Lakshmi Mallela


20% - CE11B022 - Anusha GVV
20% - CE11B030 - K Sravan Kumar Reddy
20% - CE11B036 - Kavya Marupudi
20% - CE11B094 - Palash Somani

INTELLIGENT UNLOCKING SYSTEM

17

Aperio Technology
TM

Contents

Introducing Aperio Technology

Aperio System Overview

Aperio System Components

Upgrading System Components

Simplified Management of Security

E100 Series Escutcheon

C100 Series Cylinder

10

K100 Cabinet Lock

12

1 to 8 Communication Hub

14

Software & USB Radio Dongle

15

Aperio Technology (Version 1.2) 1

Introducing Aperio Technology

Aperio is a new technology developed to


complement new and existing electronic
access control systems, providing end users
with a simple, intelligent way to upgrade
the controllability and security level of their
premises.
The heart of Aperio is a short distance wireless
communication protocol; designed to link an
online electronic access control system with an
Aperio enabled mechanical lock.

Key Benefits
Affordable online door control of internal doors
Few components
Very easy installation
No changes to existing access control installation
Extends existing access control system
Connects over standard interface
No separate management software uses existing
access control system management software
No change of cards
Enhances security for internal doors
Eliminates key management issues
Authorization changes in real time
Encrypted communication
Audit trails and time zones through existing system

Wireless Locking Evolution for Online Door Control

aperiotechnology.com.au

Aperio System Overview

Existing Electronic
Access Control
System Software

The open architecture of Aperio provides a


convenient way of connecting with most access
control systems via a standard RS485 Interface.
Cylinders or escutcheons communicate via an
encrypted wireless link to a communication hub
that is wired directly to the existing system.

Existing Electronic
Access Control Panel

RS485
Communication
Hub

Aperio Lock

Wired access control door

Aperio enabled door

Aperio Technology (Version 1.2) 3

Aperio System Components

E100 Series Escutcheon


The E100 series escutcheon is designed to fit
Lockwood mechanical 3570 series mortice
locks. In addition to card access the external
side of the door provides for key override
entry, whilst the inside lever is designed for
emergency egress.

C100 Series Cylinder


Designed to fit the standard Lockwood oval 570
series cylinder, the C100 provides a unique and
cost effective migration to an on line electronic
access control door.

Communication Hub
The Communication Hub is the link between
Aperio locks and the existing access control
system. The Hub has a standard RS485
connection, making it compatible with most
systems on the market today. Up to 8 Aperio
locks can be connected to one Hub.

Programming Application
The Aperio programming Application is the
software tool used to set up and programme
Aperio based products.

USB Radio Dongle


The Radio Dongle is used in conjunction with
the programming application. It communicates
via an encrypted wireless link directly to the
Hub and Aperio enabled lock.

aperiotechnology.com.au

Upgrading Existing Systems

Expanding an electronic access control system


with Aperio is more cost effective than alternative
solutions because it is easy to install and does not
require any wiring of the door.

Being compatible with most RFID technologies,


there is no need to change users credentials
just use existing cards.

Electronic cylinders and escutcheons have been


designed to suit existing mechanical locks, so in
many cases doors and locking systems do not
need to be changed only upgraded with Aperio
enabled products.

Aperio Technology (Version 1.2) 5

Simplified Management of Security

Installing Aperio provides a simple way to


facilitate card-based access, while also fulfilling
end-users needs for an easily operated system.
Aperio enabled products are managed with
existing electronic access control systems and
management software. This means that all
decisions and updates are in real time. This offers
a high level of security and control over audit
trails, usage, and adding/deleting users.

Any number of doors can be wirelessly


connected to the access control system through
Aperio technology, providing a cost effective
solution to upgrade internal mechanical doors
to online access control.

Wired access control door


Aperio enabled door

aperiotechnology.com.au

E100 Series Escutcheon

General Description
The E100 series escutcheon is designed to fit
Lockwood mechanical 3570 series mortice locks
& provide a cost effective migration to an on
line electronic access control door. In addition
to card access the external side of the door
provides for key override entry, whilst the inside
lever is designed for emergency egress.
The external plate incorporates a sophisticated
battery powered proximity reader that
communicates wirelessly to a hub. The Hub is
then wired directly to the access control system
and enables standard on line access control
functionality at significantly reduced costs to
that of a hard wired door.
Key Features
Wireless on line access control
Authorisation changes in real time
Audit trails and time zones managed through
existing system
Compatible with Lockwood 3570 series
mechanical mortice locks
Additional Key Override
Emergency egress
Lock can store up to 10 override credentials/
prox cards
Store last 200 events and audit trails locally
in the lock
Battery powered up to 40,000 operations
LED status
Battery low warning sent to EAC system
Applications
Internal doors only
Retro fit mechanical mortice locks
Expand existing access control installations
New access control installations
Doors that cant be hard wired
Heritage listed buildings

aperiotechnology.com.au

Function
External lever is always locked.
To unlock badge card and activate lever.
Door automatically re locks after set time.
Can also be opened via Key override.
Internal lever is set to escape free egress
at all times.

E100 Series Escutcheon

77.5

13.7
41

40

155.5

22

194.7

323

77.5

10

312.5

22

172

20

13.7

22

172

20

312.5

22

10

41

40

155.5

194.7

52

E100 cover plate

E100 Technical Information


Battery type

1 x Lithium CR123A

Battery life time

>40,000 cycles

Radio standard

IEEE 802.15.4 (2.4GHz)

Encryption

Ordering Information
Product Description

Part Number

E100 V2 35-45 Door Mifare Classic / Desfire

E102MU1SS1

E100 V2 46-55 Door Mifare Classic / Desfire

E102MU1SS2

AES128 Bit

E100 V2 35-45 Door iCLASS

E102IU1SS1

Wireless range

5-25m depending on location of


Hub & environment

E100 V2 46-55 Door iCLASS

E102IU1SS2

RFID technology**

Mifare Classic / Desfire, Mifare


Classic / Plus
iCLASS and Prox 125 Khz

RFID Reading

UID / sector / block

Card read range

< 4cm

Operating temperature

0C 60C

Humidity

< 85% non condensating

IP-degree

IP30

Approvals

CE

Colour

Brushed stainless steel

Override cylinder

Lockwood Australian oval 570


series

Door Thickness

35-45mm & 46-55mm

Spindles

7.6mm

Backset

60mm

** Model dependant

Accessories
Product Description

Part Number

E100 Cover Plate Pair

E100-PL2SSS

Aperio Hub 1:8 RS485 Hub

AH30-3-0

3572 Series Mortice Lock To Suit E100 Series

3572SCNOHD

Spare Parts
Product Description

Part Number

Aperio Spindle Kit 35-45mm

E-SP35/45

Aperio Spindle Kit 45-55mm

E-SP45/55

Notes:
E 100 cover plate is used only if required when retro fitting
existing door furniture.
E ach cover plate is 1.2mm thick. A total of 2.4mm should be
added to door thickness if using these plates
T
 o change the spindle; special tools may be required

Aperio Technology (Version 1.2) 9

C100 Series Cylinder

General Description
Designed to fit the standard Lockwood oval 570
series cylinder, the C100 provides a unique and
cost effective migration to an online electronic
access control door.
The external housing contains a sophisticated
battery powered proximity reader that
communicates wirelessly to a hub. The hub is
then wired directly to the access control system
and enables standard on line access control
features at significantly reduced costs than that
of a hard wired door.
Key Features
Wireless Online access control
Authorisation changes in real time
A
 udit trails and time zones managed through
existing system
C
 ompatible with standard Lockwood 3570
series mortice locks
C
 ylinder can store up to 10 override
credentials/prox cards
S
 tores last 200 events and audit trails locally
in the cylinder
LED status indication
Battery powered 40,000 operations
Battery low warning sent to EAC system
Available in Stainless Steel Knob
Applications

Function

Internal doors only

External badge card in front of cylinder and


rotate knob to retract latch.

Expand existing access control systems


New access control installations
Doors that cant be hard-wired
Heritage listed buildings

10 aperiotechnology.com.au

Internal lever on mortice lock is set to


escape free egress at all times.

C100 Series Cylinder

17.9

44.7

36

31.6
9

36.4

C100 Technical Information

Ordering Information
Product Description

Part Number

Battery type

1 x Lithium CR2

Battery lifetime

>40,000 cycles

Aperio C100 Cylinder SC V2 iCLASS

C102IASC

Radio standard

IEEE 802.15.4 (2.4GHz)

Aperio C100 Cylinder SC V2 iCLASS SS Knob

C102IASCSS

Encryption

AES 128 Bit

Aperio C100 Cylinder SC V2 Mifare Classic / Desfire

C102MASC

Wireless range:
Cylinder to Hub

5-25m depending on location of


Hub & environment

Aperio C100 Cylinder SC V2 Mifare


Classic /Desfire SS Knob

C102MASCSS

RFID technology**

Mifare Classic / Desfire, Mifare


Classic / Plus
iCLASS Prox 125 Khz

RFID reading

UID / sector / block

Card reading range

< 4cm

Operating temperature

0C - 60

Humidity

< 85% non condensation

IP-degree

IP 30

Knob colour

Black

Cylinder Colour

Satin Chrome. Other finishes on


application

Cylinder format

Lockwood Australian oval 570


series

Door thickness

Suits standard doors up to 50mm

Approvals

CE

Accessories
Product Description

Part Number

Aperio Hub 1:8 RS485 Hub

AH30-3-0

Aperio Stainless Steel Hub only

A-KN-SS-C100

** Model dependant

Aperio Technology (Version 1.2) 11

K100 Cabinet Lock

Features & Benefits


High security Grade 1 asset protection with audit control


Cabinet lock latch bolt status monitoring
250 lb holding force, Grade 1 rating per
ANSI A156.11-2003
Online & offline transaction audit trail capabilities

Fast, easy to install wireless lock tied to existing electronic access


control system infrastructure

Low maintenance with 50,000 cycles of operation with


a single CR123A battery

Low battery signalling and reporting

Two forms of override available, including mechanical


key override and battery jump start pack

Easy to manage user access

Convenient, quick response, single-card system uses


existing ID badges (no keys to control or replace, no codes to
secure or remember)

Add cabinet security without adding


another credential
The K100 Cabinet Lock uses Aperio wireless technology making it
easy and cost effective to bring access control to cabinets and drawers
where audit trail and monitoring are becoming increasingly critical.
It uses local wireless communication between the lock and an Aperio
Hub to connect to an Access Control system, eliminating the cost and
difficulty of wiring integrated Access Control to the cabinet.

12 aperiotechnology.com.au

K100 Technical Information


Battery type

1 x Lithium CR123A

Battery life time

>40,000 cycles

Radio standard

IEEE 802.15.4 (2.4GHz)

Encryption

AES128 Bit

Wireless range

5-25m depending on location of Hub & environment

RFID technology

iCLASS and Prox 125 khz

RFID Reading

UID / sector / block

Card read range

< 4cm

Operating

0C 60C

temperature
Humidity

< 85% non condensating

IP-degree

IP30

Approvals

CE

Finish

Black

Door Thickness

1.25mm-35mm

Spindles

6.25mm

Ordering Information
Product Description

Part Number

K100 iCLASS Cabinet lock

K100620IA

K100 Prox 125khz Cabinet lock

K100620PA

Aperio Technology (Version 1.2) 13

1 To 8 Communication Hub

General Description
The AH30-3-0 Communication Hub is the link
between Aperio locks and the existing access
control system. Up to 8 locks can be paired to
one Hub and has a standard RS485 connection,
making it compatible with most systems on the
market today. It communicates directly with
Aperio enabled locks via an encrypted 2.4GHz
wireless link, and is designed to be positioned
above the door within approximately 5 -25m of
the lock.
Key Features
Connect up to 8 Aperio devices
on a single hub
RS485 interface
Encrypted radio communication
Integrated antenna
LED status for visual indication
Applications
Internal doors only
Expand existing access control systems
New access control installations
Doors that cant be hard wired

AH30-3-0 Communication Hub Technical Information


Power

8-24Vdc

Power consumption

250 mA Minimum 80mA at 12VDC

Radio standard

IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)

Encryption

AES 128 Bit

Range between Locks

15 - 25 m depending on building environments

and Hubs

14 aperiotechnology.com.au

Operating temperature

5C to 35C

Humidity

< 95% non condensation

IP-degree

IP 20

Approvals

CE, C-Tick

Software & USB Radio Dongle

General Description
The Aperio Programming Application is the
software tool used to set up and programme
Aperio based products.
Using the software the installer simply plugs
in the USB radio dongle to the PC to
communicate directly to the Aperio lock via
the Communication Hub.
The software has an encrypted installation data
base that can be used to manage any number
of sites.
Key Features
Software
Multilingual installation tool
Encrypted installation database
Installation management:
Unit configuration
Firmware update
Pair/Un-pair
Override credentials
Wireless status link
RS485 settings
Radio Dongle
Provides communication to Aperio
based products
Encrypted radio communication
Applications
Tools designed for the installer to set up and
program Aperio based products

Ordering Information
Product Description
USB Dongle

Part Number
APRD1/PAP1

Aperio Technology (Version 1.2) 15

ASSA ABLOY is the global leader in door opening


solutions, dedicated to satisfying end-user needs
for security, safety and convenience.
ASSA ABLOY is represented in all major regions,
in both mature and emerging markets, with
leading positions in Australia, Europe and
North America.

Head Office
ASSA ABLOY Australia Pty Limited
235 Huntingdale Road, Oakleigh
Victoria, 3166 Australia
1300 LOCK UP (1300 562 587)
info.au@assaabloy.com
assaabloy.com.au
ASSA ABLOY Australia Pty Limited ABN 90 086 451 907 2013

AAA-CAT-050_Version 1.2 MC01590

As the worlds leading lock group, ASSA ABLOY


offers a more complete product range of door
opening solutions than any other company
on the market.

RB-See-202
Seeedstudio Grove 125Khz RFID Reader

Introduction
This Grove-125KHz TFID Reader is a module used to read uem4100 RFID card information with two
output formats: Uart and Wiegand. It has a sensitivity with maximum 7cm sensing distance. There is also
the electronic brick version of this module.

Features

Selectable output format: Uart or Wiegand.


4Pins Electronic Grove Interface

Application Ideas

Internet of Thing
Pet Toy
Access Control System

Specifications

Supply voltage: 5v
Max sensing distance: 7cm
Uart output: TTL output, 9600baudrate, 8 data bits, 1 stop bit, and no verify bit.
Wiegand output: 26 bits Wiegand format, 1 even verify bit, 24 data bits, and 1 odd verify bit;

Usage
Pin Definition and Rating

Pin Name

Function and Note

Rating

GND

Connect to the Host GND

VCC

Power supply

5V

RX - In Uart mode, it is unused

D0 - In Wiegand mode, it represents Data0

5V or 0V

TX - In Uart mode, it represents TX data

5V or 0V

D1 - In Wiegand mode, it represents Data1

5V or 0V

RX/D0

TX/D1

Hardware Installation

* Uart Mode (Jumper set to the left two pins)


You would need to select the jumper to "U" to enter this mode, and teh setting is: 9600bps, N, 8, 1, TTL
output
Output Time sequence

Output Data Format

0x02

10ASCII Data Characters

Checksum

0x03

0x02 - 1 byte start flag


10 ASCII Data Characters Card number info
Checksum - 2 bytes
0x03 - 1 byte end flag
Example
Card number: 62E3086CED
Checksum:( 62H)XOR(E3H)XOR(08H)XOR(6CH)XOR(EDH)=08H
Note: The 10 ASCII characters grouped as 5 hex data needs to be further processed as you may find that
the 5 hex data is not equal to the number marked on the tags in Decimal. Actually the tag number is
equal to the later 4 bytes in decimal. For example, the card number is 62E3086CED, the corresponding
number marked on the tag should be 60717296877 which is the Decimal format of E3086CED.
* Wiegand Mode (Jumper Set to the Right two Pins)

You would need to select the jumper to "U" to enter this mode, and the setting is: 9600bps, N, 8, 1, TTL
output
In Wiegand Mode, output data is formatted with 26bits including 24bits card info and 2 bits parity.

bit 0

PE

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25

D2[7..0]

P0

D1[7..0]

D0[7..0]

PE is even bit, PO is odd bit;


E is the data bit which was involved in even, O is the data bit which was involved in odd;
DX[7..0] is the data bit which correspond to Mifare@ Standard & Light card read only ID;
Wiegand Format 26bits output time sequence;

Notes

Symbol

Specification

Representative value

THD

Sending Start Delay

1.2ms

TSD

Sending Stop Delay

1ms

TDW

Data pulse width

160s

TIW

Data pulse interval width

880s

Demo code
The demo code for Arduino is designed to read Wiegand data in interrupt mode.
Programming
Includes important code snippet. Demo code like :
Demo code
{
}

Вам также может понравиться