door lock-using-rfid-technology
TRANSCRIPT
Door lock using RFID technology
Member: Ho Dac VuNguyen Mai Truong
Nguyen Huu ThanhTran Hoang Loc
Group: 10
Presentation Outline1. Introduction 2. Background3. Proposals from partner companies4. Method5. Results6. Conclusion7. Recommendation8. References
1. Introduction Evaluating proposals from Bosch, Renesas,
eSilicon. Introducing our method of evaluation to
select the suitable product. Representing the most feasible solution for
our company.
2. Background Vietcombank
building in Danang. Present situation:
obsolete and unsafe office doors.
Implementation of secure and reliable door locks. Figure 1. Vietcombank Building in Danang
3. Proposals from partner companies.
Bosch: Fingerprint door lock Renesas: RFID door lock with passive tag. eSilicon: RFID door lock with active tag.
3.1 Basic explaination of RFID technology.
Radio Frequency Identification. A micro-chip in a label used to transmit
data when the label is exposed to radio wave.
Figure 2. RFID Micro-chip
3.2 Main components of RFID system
RFID Tag
RFID Reader
Host computer
Figure 3. Main components.
3.3 Main components
RFID Tag Transponder Located on the object
RFID Reader Transceiver Can read and write
data to TagHost Computer Translate and
process radio wave Send text messages
Table 1. RFID Micro-chip
3.4 How it works
Figure 4. RFID working.
3.5 New features
Connect to your smartphone immediately as illegally intervened
Figure 5. Warning light and message.
Warning light
4. Method
Bought sample equipments from each candidate.
Tested samples in 3 rooms in our building.
Assessed performance of sample products based on 4 criteria:
Cost Maintenance Security Efficiency
4. Method (cont’d)
Evaluating criteria: Comparison in cost between 3 samples Comparison in time periods of
maintenance between 3 samples. Comparison in security between 3
samples. Comparison in efficiency (reaction ability
to external impacts) between 3 samples.
5. Result
Ranking Cost aspect Maintenance Security aspect Efficiency
1 Passive RFID Active RFID Active RFID Active RFID
2 Active RFID Passive RFID Fingerprint Fingerprint
3 Fingerprint Fingerprint Passive RFID Passive RFID
Table 2. Ranking the door locks according to the four criteria
5.1 Comparison between posible candidates (cost)
Fingerprint door lock Active tag RFID Passive tag
RFIDPurchase Cost
per unit. 35$ 30$ 27$
Life-cycle cost 14$ 12$ 10$Total 49$ 42$ 37$
Table 3. Comparison in cost of the three door locks
5.1 Comparison between posible candidates (cost)
Fingerprint lock
Active tag RFID lock
Pasive tag RFID lock
0 5 10 15 20 25 30 35 40 45 50 55
USD
Figure 6. Comparison in cost between 3 samples
5.2 Comparison between posible candidates (remained criteria) (cont’d)
Maintenance Security Efficiency0
1
2
3
4
5Active RFIDPassive RFIDFingerprint
Figure 7. Comparison in maintenance, security and efficiency
6. ConclusionsUnacceptable product: Fingerprint. Unaffordable Extensive maintaince InefficientAcceptable products: Active RFID and Passive
RFID. Affordable Toll-free installation Popular spare parts.
6. Conclusions Regarding acceptable the two models:
Active RFID and Passive RFID Active RFID technology meet superior
criteria: Higher levels of security and
efficiency. Meeting cost criterion. Ease of use.
7. Recommendation
Recommending purchasing Active RFID door locks.
Ensuring the safety of our properties and employees.
Investing in Active RFID door locks within our budget (needing $4050 out of $5000)
Being total responsible for our judgement and selection.
8. ReferencesAvonie.net. (2013). RFID and Privacy Lounge. US: Brian Nutter.Juho Partanen, Co-founder of Voyantic Ltd. (2015, 2). History of
RFID.LibBest. (2015, 3 16). System Architecture. Retrieved from
http://www.rfid-library.com/flip/rfid_u500e/index.htmlRFID journal. (2012, 3 16). Retrieved from
http://www.rfidjournal.com/articlestechit.net. (2015, 12 26). RFIDJournal.com. Retrieved from
http://www.rfidjournal.com/articles/view?1338TX-co. (2009, 2 12). Arduino-RFID-Door-Lock. Retrieved 5 12, 2016,
from http://www.instructables.com/id/RFID-8/Wang, Y. (2013). RFID privacy and Security. US: RSA Laboratoris.
THANK YOU FOR WATCHING