Академический Документы
Профессиональный Документы
Культура Документы
INTELLIGENT
UNLOCKING
SYSTEM
The project is about unlocking an office door using the facial recognition system with
owners authentication. This system will be helpful in a building which is used by multiple
sources. For example, a lab which is to be accessed by many research students use either
multiple keys or a biometric access to the registered users. Giving away multiple keys might be
misused and the biometric access requires the registration and the updating is not easy. Through
this system, user can allow access to any person either once or for every time the person comes.
It makes updating the database simpler and the one-time access for a person to enter.
Table of Contents:
S.No.
Content
Page Number
Conceptual Design
Specifications of components
Softwares
Proposed System
11
Benefits
15
Issues
16
Bill of Quantities
16
References
17
10
Contributions
17
11
Brochures
18
Conceptual Design
When the bell is pressed or the RFID tag is read, the camera gets switched on.
Images are sent to the facial recognition software.
If match is found, the door is opened. Else, the image is sent to the virtual sensor in the
Global Sensor Network.
This sends the image to the mobile phone of the client.
Then the response of the client is taken using an application which is again connected to the
virtual sensor.
Depending on the response, the door is opened or an alert system gives a voice message
that access is denied.
Components
Hardware:
Push Button
RFID Reader module
Wireless IP Camera
Computer
Smart Phone
Door Lock system
o Mechanical Lock
o Communication Hub
o Access Control
Software:
Global Sensor network
Mobile application
Specifications of Components
Push button:
50 mA 12V DC rating
Through hole mounting design
Single or dual LED options
Momentary actuation
Power Supply: DC 5V
Current: <50 Ma
Operating Range: >50 mm
Working Temperature: -100C to 700C
Wireless IP camera
Sensor: CMOS 1/4 inch
Network Interface: 802.11b/g/n
Network Protocol: TCP/IP, DHCP, SMTP, TP, DDNS, UPNP
White Balance: Auto
Working Temperature: 0 - 50 C
Power Source: Power Adapter (100V-240V)
Power Consumption 3W
Viewing Distance: 80 - 100 meters
Resolution - 320 x 240, 640 x 480
Mode - 50 Hz/60Hz, Outdoor
SNo
1
2
3
4
5
6
7
8
9
10
11
12
13
14
Component
Cylinder
Control Unit
Cover
Spacer (thick)
Spacer(thin)
Mounting plate
Locking unit
Locking nut tool
Mounting
screws
Allen wrench
Battery
Cover screw
Set screw
Thumbturn
Qty
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Mounting hardware:
S.No
Component
Qty
Screw caps
6-32 x 1 screw
Wireless Frequency: 2.4 GHz, IEEE 802.15.4, using AES 128bit encryption
Hub Power Requirement: 8-24VDC, 250mA
Lock Battery Type: CR2, providing 30,000 Cycles
Operating Temperature: -10C to 50C
FCC Part 15, Class B Compliant
Credentials Supported: 13.56MHz iCLASS credentials are supported
Communication Hub
Communication Hub is the link between locks and the existing access control system. Up to 8 locks
can be paired to one Hub and has a standard RS485 connection, making it compatible with most
systems on the market today. It communicates directly with enabled locks via an encrypted 2.4GHz
wireless link, and is designed to be positioned above the door within approximately 5 -25m of the
lock.
Key Features
Applications
Technical Information:
Power: 8-24Vdc
Power consumption: 250 mA - Minimum 80mA at 12VDC
Radio standard: IEEE 802.15.4 (2.4 GHz) - 16 channels (11-26)
Encryption: AES 128 Bit
Range between Locks and Hubs - 15 - 25 m depending on building environments
Operating temperature: 5C to 35C
Humidity: < 95% non condensation
IP-degree: IP 20
Electric locks
Controllers: receive settings from software and control the electromechanical hardware of
the system.
Contactless readers: use the image from the camera to read the relative position, size and
shape of the user's eyes, nose, cheekbones and jaw features to ensure accuracy of the
identification
Technical requirements
1. Systems using Ethernet converters, adapters, or terminal servers that enable
network connectivity for legacy controllers by tunneling RS-485 serial data over
Ethernet shall not be acceptable.
2. Single-door controller and IP-reader/Camera shall have at least 32Mb SDRAM
operating memory and 8 MB Flash memory for database and events. Two-door
controller shall have an option for expanding Flash memory to 32MB.
3. All controllers and IP-readers/Camera shall use a 32Bit 100Mhz RISC processor (or
better) in order to enable fast execution of advanced functions.
4. Controllers and IP-readers shall be capable of supplying up to 600mA @ 12VDC to
peripheral devices: readers, electric locks, sirens, detectors, etc.
5. Controllers and IP-readers shall accept the standard 12VDC power input in case an
existing network infrastructure does not support PoE.
Software
Global Sensor Network
Sensor data is captured using sensors built into the mobile phones. The open source sensor data
stream processing engine called Global Sensor Network (GSN) with android platform is used to
capture the data. A prototype application should be developed which can be installed on android
devices and an Android wrapper is used as a GSN middleware component.
Global Sensor Network makes the access to sensor networks and data simple, powerful and flexible
just as accessing web documents.
Simplicity: The sensor networks are defined in a declarative way using SQL as data manipulation
language.
Adaptability: Adding new types of sensor networks and dynamic reconfiguration of data sources has
to be supported without interfering with the ongoing system operation which can be achieved using
a container based implementation.
Scalability: The design of GSN is based on peer-to-peer architecture for distributed query processing
and discovery of sensor networks.
quality manager (SQM). The data from/to the VSM passes through the storage layer which is in
charge of providing and managing persistent storage for data streams.
Query processing: It is done by the query manager (QM) which includes the query processor being in
charge of SQL parsing, query planning, execution of queries. The query repository manages all
registered queries(subscriptions) and defines and maintains the set of currently active queries for
the query processor.
Notification Manager: The notification manager deals with the delivery of events and query results
to the registered clients. The notification manager has an extensible architecture which allows the
user to customize its functionality, for example, having results mailed or being notified via SMS.
Wrapper: In order to refer to data
streams produced by a virtual sensor we
use logical addressing. Each virtual sensor
can be equipped with a set of key value
pairs which can be registered and
discovered in GSN. To specify the
processing of the input streams we use
SQL queries which refer to the input
streams by the reserved keyword
WRAPPER. A wrapper connection request
is an object which contains a wrapper
name and its initialisation parameters as defined in the Virtual sensor. Whenever a WCR is
generated at the virtual sensor loader, it will be sent to the wrapper repository.
Few methods used in wrapper:
Initialise() creates a socket and waits until the client mobile sends the metadata
packet.
createDataFieldCollection() The information is passed into this method and stored.
Finalise() End of wrappers life cycle. It closes all the connection established.
getOutputFormat() returns a data field object that provides a description of the data
provided by the wrapper.
Run() retrieves data from the mobile phone.
mapSensorData() maps the newly received data to the GSN model structure.
After the data is sent to the GSN data model, querying, filtering and other functionalities provided by
GSN can be done.
Mobile Application
The Android SDK provides you the API libraries and developer tools necessary to build, test, and
debug apps for Android. The ADT Bundle should be downloaded for this purpose. It includes the
essential Android SDK components and a version of the Eclipse IDE with built-in ADT (Android
Developer Tools) to streamline your Android app development.
10
User Interface:
Notification to user, when the image is received
Option to click yes/no to unlock the door or keep the door locked respectively
Behavior:
The input stream from the virtual sensor is directed to the mobile application and the app
should display the notification
The input given by the user should be sent back to the virtual sensor where the respective
queries are processed
Proposed System
Initializing the camera:
When the bell is pressed or RFID card is read, the camera is switched on and starts recording. When
it is activated once, the circuit will be closed til the images are sent to the computer.
Facial Recognition:
Below is the process of setting up a wireless network camera sensor to monitor a office building
Mounting the camera
Before the camera is configured, the position of it has to be fixed. The best position would
be to place at six feet above the ground, but since it disturbs the aesthetic sense, we should
place at the left top corner on the wall next to the door
The switch (used for bells) will be an input source of voltage signals to power the camera on.
Configuration
Connect the Camera to the computer, which acts as the router, by using Ethernet. This is
done by installing the software CD provided by the camera's company
Working:
When a person wants to enter the building, he is to press the bell which will initiate the camera.
Then the camera will take continuous pictures using the Eigen face generation system. Using this,
the unique identity with the relevant features, from facial images were extracted and sent to the
database through Ethernet. The method involved in extracting the data for identifying the facial
features is explained as below:
Eigen face generation
This camera uses Principle Component Analysis (PCA) which is a well known Eigen face based face
recognition algorithm. Here a set of Eigen faces, Eigen vectors and mean were extracted by
performing a mathematical process on a set of trained images depicting different human faces. Here
11
the training images are defined as a set of flattened vectors and these vectors are assembled
together into a single matrix. The extracted Eigen vectors of the matrix are stored in a database.
Eigen vectors are defined by the face spaces which are the training face images that are projected.
This results in the variation between the set of faces without emphasis on any one facial region like
the eyes or nose. The projected face space representation of each training image is also saved to a
database. To identify a face, the test image is projected to face space using the saved Eigen vectors.
The projected test image is then compared against each saved projected training image for
similarity. The identity of the person in the test image is assumed to be the same as the person
depicted in the most similar training image. Then the final recognized images are sent to the router.
12
The Locking system offers an easy retrofit solution for mechanical door hardware. Access control is
added to the door in the time it takes to switch out a cylinder. Local wireless communication
between the lock and a hub connects to the access control system, eliminating the inconvenience of
bringing wiring to the door. The lock communicates wirelessly to an Hub, which connects to the
access control system using RS-485 or Wiegand wiring. Industry standard Wiegand output offers
easy integration with many popular access control systems, while the RS-485 version offers the
flexibility and scalability to support up to eight locks per hub. We choose to use RS-485 as it can be
used for opening multiple doors and it would be convenient for scaling up the project in the future.
Wall Mount
Ceiling Mount
Inside Ceiling Mount
Wall Mount, Adjacent Room
13
Then the hub connected to power and the access control system. With a known credential to
confirm, the lock will open as desired.
14
Benefits:
Improvising the quality and energy efficiency of the environmental system while allowing
almost unlimited reconfiguration and customization in the future.
The door can be accessed from anywhere.
It provides real-time information about who is accessing the office.
We can also choose to receive notifications about all the activity around the door to our
mobile phone. All activity is recorded and logged by the system, and it is available for review
at any time.
One of the main advantages of automatic door unlock is the fact that you will not be
required to carry a key all the time.
We can provide entry into the workplace to others at our discretion.
Local wireless communication eliminates the cost and inconvenience of wiring in and around
the door. With no wires to run, installation time is significantly reduced.
15
The images captured by the camera system are recorded and stored into a database. These
are helpful in maintaining records so that they can be easily retrieved later, when needed.
Reducing the amount of communication required to perform tasks by distributed or local pre
computations
Issues:
The system is highly dependent on the smart phone of the owner. It becomes difficult to
access the door if the phone is misplaced.
No alternative is provided if even one of the components malfunctions.
Camera system cannot monitor every area of your office at all times, hence may not be able
to detect everyone arriving at the door.
If several persons are standing at the door, the image sent to the system is analyzed and
even if one persons image is authenticated, the system opens the door.
The initial costs incurred are high. The installation may also increase the initial expenditure.
Developing wrappers is a time consuming and tedious job. Therefore, research is conducted
to develop automatic wrappers.
Location privacy against a global eavesdropper:
While many protocols for sensor network security provide confidentiality for the
content of messages, contextual information usually remains exposed. The location privacy
issues can be formalized under a strong adversary model and communication overhead
needed for achieving a given level of privacy can be determined. Periodic collection and
source simulation can be used to prevent leakage of information. Periodic collection
provides a high level of location privacy, while source simulation provides trade-offs
between privacy, communication cost, and latency.
Bill Of Quantities:
S.No
1
2
3
4
5
6
Component*
Bell Switch
RFID reader module
Wireless camera (D-Link DCS-932L)
Communication hub
Lock
Access control
Quantity
1
1
1
1
1
1
Price(INR)
150
865
4599
8500
*Cost of assembled components is mentioned above. The separate hardware components required
for each of the above mentioned components are listed in the Specifications.
16
References:
http://www.intelligentopenings.com/en/site
http://www.medeco.com/Other/Medeco
http://www.assaabloy.com.au/
http://gadgets.ndtv.com/mobile
http://www.hidglobal.com/product-display
http://www.alibaba.com/showroom
http://sweets.construction.com/
http://startrinity.com/VideoRecognition/Resources
http://arxiv.org/abs/1301.0157
Contributions:
We have divided the whole project equally and everyone contributed the same.
Hence we are giving equal weightage to everyone's work.
17
Aperio Technology
TM
Contents
10
12
1 to 8 Communication Hub
14
15
Key Benefits
Affordable online door control of internal doors
Few components
Very easy installation
No changes to existing access control installation
Extends existing access control system
Connects over standard interface
No separate management software uses existing
access control system management software
No change of cards
Enhances security for internal doors
Eliminates key management issues
Authorization changes in real time
Encrypted communication
Audit trails and time zones through existing system
aperiotechnology.com.au
Existing Electronic
Access Control
System Software
Existing Electronic
Access Control Panel
RS485
Communication
Hub
Aperio Lock
Communication Hub
The Communication Hub is the link between
Aperio locks and the existing access control
system. The Hub has a standard RS485
connection, making it compatible with most
systems on the market today. Up to 8 Aperio
locks can be connected to one Hub.
Programming Application
The Aperio programming Application is the
software tool used to set up and programme
Aperio based products.
aperiotechnology.com.au
aperiotechnology.com.au
General Description
The E100 series escutcheon is designed to fit
Lockwood mechanical 3570 series mortice locks
& provide a cost effective migration to an on
line electronic access control door. In addition
to card access the external side of the door
provides for key override entry, whilst the inside
lever is designed for emergency egress.
The external plate incorporates a sophisticated
battery powered proximity reader that
communicates wirelessly to a hub. The Hub is
then wired directly to the access control system
and enables standard on line access control
functionality at significantly reduced costs to
that of a hard wired door.
Key Features
Wireless on line access control
Authorisation changes in real time
Audit trails and time zones managed through
existing system
Compatible with Lockwood 3570 series
mechanical mortice locks
Additional Key Override
Emergency egress
Lock can store up to 10 override credentials/
prox cards
Store last 200 events and audit trails locally
in the lock
Battery powered up to 40,000 operations
LED status
Battery low warning sent to EAC system
Applications
Internal doors only
Retro fit mechanical mortice locks
Expand existing access control installations
New access control installations
Doors that cant be hard wired
Heritage listed buildings
aperiotechnology.com.au
Function
External lever is always locked.
To unlock badge card and activate lever.
Door automatically re locks after set time.
Can also be opened via Key override.
Internal lever is set to escape free egress
at all times.
77.5
13.7
41
40
155.5
22
194.7
323
77.5
10
312.5
22
172
20
13.7
22
172
20
312.5
22
10
41
40
155.5
194.7
52
1 x Lithium CR123A
>40,000 cycles
Radio standard
Encryption
Ordering Information
Product Description
Part Number
E102MU1SS1
E102MU1SS2
AES128 Bit
E102IU1SS1
Wireless range
E102IU1SS2
RFID technology**
RFID Reading
< 4cm
Operating temperature
0C 60C
Humidity
IP-degree
IP30
Approvals
CE
Colour
Override cylinder
Door Thickness
Spindles
7.6mm
Backset
60mm
** Model dependant
Accessories
Product Description
Part Number
E100-PL2SSS
AH30-3-0
3572SCNOHD
Spare Parts
Product Description
Part Number
E-SP35/45
E-SP45/55
Notes:
E 100 cover plate is used only if required when retro fitting
existing door furniture.
E ach cover plate is 1.2mm thick. A total of 2.4mm should be
added to door thickness if using these plates
T
o change the spindle; special tools may be required
General Description
Designed to fit the standard Lockwood oval 570
series cylinder, the C100 provides a unique and
cost effective migration to an online electronic
access control door.
The external housing contains a sophisticated
battery powered proximity reader that
communicates wirelessly to a hub. The hub is
then wired directly to the access control system
and enables standard on line access control
features at significantly reduced costs than that
of a hard wired door.
Key Features
Wireless Online access control
Authorisation changes in real time
A
udit trails and time zones managed through
existing system
C
ompatible with standard Lockwood 3570
series mortice locks
C
ylinder can store up to 10 override
credentials/prox cards
S
tores last 200 events and audit trails locally
in the cylinder
LED status indication
Battery powered 40,000 operations
Battery low warning sent to EAC system
Available in Stainless Steel Knob
Applications
Function
10 aperiotechnology.com.au
17.9
44.7
36
31.6
9
36.4
Ordering Information
Product Description
Part Number
Battery type
1 x Lithium CR2
Battery lifetime
>40,000 cycles
C102IASC
Radio standard
C102IASCSS
Encryption
C102MASC
Wireless range:
Cylinder to Hub
C102MASCSS
RFID technology**
RFID reading
< 4cm
Operating temperature
0C - 60
Humidity
IP-degree
IP 30
Knob colour
Black
Cylinder Colour
Cylinder format
Door thickness
Approvals
CE
Accessories
Product Description
Part Number
AH30-3-0
A-KN-SS-C100
** Model dependant
12 aperiotechnology.com.au
1 x Lithium CR123A
>40,000 cycles
Radio standard
Encryption
AES128 Bit
Wireless range
RFID technology
RFID Reading
< 4cm
Operating
0C 60C
temperature
Humidity
IP-degree
IP30
Approvals
CE
Finish
Black
Door Thickness
1.25mm-35mm
Spindles
6.25mm
Ordering Information
Product Description
Part Number
K100620IA
K100620PA
1 To 8 Communication Hub
General Description
The AH30-3-0 Communication Hub is the link
between Aperio locks and the existing access
control system. Up to 8 locks can be paired to
one Hub and has a standard RS485 connection,
making it compatible with most systems on the
market today. It communicates directly with
Aperio enabled locks via an encrypted 2.4GHz
wireless link, and is designed to be positioned
above the door within approximately 5 -25m of
the lock.
Key Features
Connect up to 8 Aperio devices
on a single hub
RS485 interface
Encrypted radio communication
Integrated antenna
LED status for visual indication
Applications
Internal doors only
Expand existing access control systems
New access control installations
Doors that cant be hard wired
8-24Vdc
Power consumption
Radio standard
Encryption
and Hubs
14 aperiotechnology.com.au
Operating temperature
5C to 35C
Humidity
IP-degree
IP 20
Approvals
CE, C-Tick
General Description
The Aperio Programming Application is the
software tool used to set up and programme
Aperio based products.
Using the software the installer simply plugs
in the USB radio dongle to the PC to
communicate directly to the Aperio lock via
the Communication Hub.
The software has an encrypted installation data
base that can be used to manage any number
of sites.
Key Features
Software
Multilingual installation tool
Encrypted installation database
Installation management:
Unit configuration
Firmware update
Pair/Un-pair
Override credentials
Wireless status link
RS485 settings
Radio Dongle
Provides communication to Aperio
based products
Encrypted radio communication
Applications
Tools designed for the installer to set up and
program Aperio based products
Ordering Information
Product Description
USB Dongle
Part Number
APRD1/PAP1
Head Office
ASSA ABLOY Australia Pty Limited
235 Huntingdale Road, Oakleigh
Victoria, 3166 Australia
1300 LOCK UP (1300 562 587)
info.au@assaabloy.com
assaabloy.com.au
ASSA ABLOY Australia Pty Limited ABN 90 086 451 907 2013
RB-See-202
Seeedstudio Grove 125Khz RFID Reader
Introduction
This Grove-125KHz TFID Reader is a module used to read uem4100 RFID card information with two
output formats: Uart and Wiegand. It has a sensitivity with maximum 7cm sensing distance. There is also
the electronic brick version of this module.
Features
Application Ideas
Internet of Thing
Pet Toy
Access Control System
Specifications
Supply voltage: 5v
Max sensing distance: 7cm
Uart output: TTL output, 9600baudrate, 8 data bits, 1 stop bit, and no verify bit.
Wiegand output: 26 bits Wiegand format, 1 even verify bit, 24 data bits, and 1 odd verify bit;
Usage
Pin Definition and Rating
Pin Name
Rating
GND
VCC
Power supply
5V
5V or 0V
5V or 0V
5V or 0V
RX/D0
TX/D1
Hardware Installation
0x02
Checksum
0x03
You would need to select the jumper to "U" to enter this mode, and the setting is: 9600bps, N, 8, 1, TTL
output
In Wiegand Mode, output data is formatted with 26bits including 24bits card info and 2 bits parity.
bit 0
PE
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
D2[7..0]
P0
D1[7..0]
D0[7..0]
Notes
Symbol
Specification
Representative value
THD
1.2ms
TSD
1ms
TDW
160s
TIW
880s
Demo code
The demo code for Arduino is designed to read Wiegand data in interrupt mode.
Programming
Includes important code snippet. Demo code like :
Demo code
{
}