An RFID Based Access Control System operating with a Computer Program and a Database

被引:0
|
作者
Fall W. [1 ,3 ]
Seck D.A.N. [2 ]
Barro F.I. [1 ,3 ]
机构
[1] Department of Physics Faculty of Science and Technology, Cheikh Anta Diop University of Dakar, Dakar
[2] Department of Mathematics and Computer Science Faculty of Science and Technology, Cheikh Anta Diop University of Dakar, Dakar
[3] Department of Physics Faculty of Science and Technology, Cheikh Anta Diop University of Dakar, Dakar
来源
International Journal of Circuits, Systems and Signal Processing | 2021年 / 15卷
关键词
Access control; Badge; Database; Electronic lock; Identification; Microcontroller; Program; Reader; RFID; System;
D O I
10.46300/9106.2021.15.195
中图分类号
学科分类号
摘要
This article focuses on the realization of an access control system based on RFID (Radio Frequency by Identification) technology. It is an authentication system for controlling access to a sensitive place. This system is composed of RFID cards which are badges that act as electronic keys, an RFID reader, an electronic lock, a microcontroller, a wifi module and a database installed on a computer. The identification number of an RFID card detected by the RFID reader is transferred, via the serial interface, to the microcontroller that communicates with the computer through the wifi module for verification in the database. If the information is valid, the microcontroller triggers the opening of the electronic lock. © 2021, North Atlantic University Union NAUN. All rights reserved.
引用
收藏
页码:1817 / 1820
页数:3
相关论文
共 50 条
  • [1] An Access Control and Positioning Security Management System Based on RFID
    Mai, Anchan
    Wei, Zongtian
    Gao, Mengji
    2015 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS IHMSC 2015, VOL II, 2015,
  • [2] Access Control System in Campus Combining RFID and Biometric Based Smart Card Technologies
    El Beqqal, Mohamed
    Kasmi, Mohammed Amine
    Azizi, Mostafa
    EUROPE AND MENA COOPERATION ADVANCES IN INFORMATION AND COMMUNICATION TECHNOLOGIES, 2017, 520 : 559 - 569
  • [3] An office intelligent access control system based on RFID
    Wang, Xiaoxu
    Wang, Yuesheng
    PROCEEDINGS OF THE 30TH CHINESE CONTROL AND DECISION CONFERENCE (2018 CCDC), 2018, : 623 - 626
  • [4] A Staff Access Control System Based on RFID Technology
    Li, Danmei
    Yang, Huanle
    Fred, Kayijire
    Chen, Yuxing
    PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, 2016, 43 : 78 - 83
  • [5] Smart Access Control System for Industrial Machines and Vehicles based on RFID Technology
    Colaiuda, Davide
    Ferri, Giuseppe
    Leoni, Alfiero
    Pelliccione, Andrea
    Faraone, Piero
    Quaranta, Orlando
    Arezzo, Valerio
    Stornelli, Vincenzo
    ICT4AWE: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES FOR AGEING WELL AND E-HEALTH, 2022, : 163 - 167
  • [6] Design and implementation of a vehicular access control using RFID.
    Almanza-Ojeda, D. L.
    Hernandez-Gutierrez, A.
    Ibarra-Manzano, M. A.
    MEP 2006: PROCEEDINGS OF MULTICONFERENCE ON ELECTRONICS AND PHOTONICS, 2006, : 223 - +
  • [7] An automated parking access control system based on RFID technology
    Rouan, El hassania
    Safi, Said
    Boumezzough, Ahmed
    2020 15TH IEEE INTERNATIONAL CONFERENCE ON DESIGN & TECHNOLOGY OF INTEGRATED SYSTEMS IN NANOSCALE ERA (DTIS 2020), 2020,
  • [8] Implementation of RFID-Based Access Control Management System
    Lin, Haiyun
    Wang, Yujiao
    Bi, Jian
    ADVANCED MATERIALS RESEARCH II, PTS 1 AND 2, 2012, 463-464 : 1630 - +
  • [9] Embedded System for Access Control Based on Facial Biometry and RFID
    Souza, Cristian Henrique M.
    Junior, Ivanilson Franca V.
    Alves, Robinson Luis S.
    Costa, Arthur Henrique C.
    Lima Junior, Melquiades P.
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2018, VOL 2, 2019, 881 : 868 - 883
  • [10] Risk adaptive hybrid RFID access control system
    Al-Zewairi, Malek
    Alqatawna, Ja'far
    Atoum, Jalal
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3826 - 3835