You are on page 1of 19

1.

INTRODUCTION
Radio frequency identification (RFID) is a generic term that is used to describe a system that transmits the identity (in the form of a unique serial number) of an object or person wirelessly, using radio waves. It's grouped under the broad category of automatic identification technologies. RFID is in use all around us. If you have ever chipped your pet with an ID tag, used EZ Pass through a toll booth, or paid for gas using Speed Pass, you've used RFID. In addition, RFID is increasingly used with biometric technologies for security. Unlike ubiquitous UPC bar-code technology, RFID technology does not require contact or line of sight for communication. RFID data can be read through the human body, clothing and non-metallic materials. Universal Product Code (UPC) bar code is replaced by radio frequency identification (RFID) tags. RFID tags are intelligent bar codes that can talk to a networked system to track every product that you put in your shopping cart. Imagine going to the grocery store, filling up your cart and walking right out the door. No longer will you have to wait as someone rings up each item in your cart one at a time. Instead, these RFID tags will communicate with an electronic reader that will detect every item in the cart and ring each up almost instantly. The reader will be connected to a large network that will send information on your products to the retailer and product manufacturers. Your bank will then be notified and the amount of the bill will be deducted from your account. RFID tags, a technology once limited to tracking cattle, are tracking consumer products worldwide. Many manufacturers use the tags to track the location of each product they make from the time it's made until it's pulled off the shelf and tossed in a shopping cart. Outside the realm of retail merchandise, RFID tags are tracking vehicles, airline passengers, Alzheimer's patients and pets. Soon, they may even track your preference for chunky or creamy peanut butter. Some critics say RFID technology is becoming too much a part of our lives.

2. HISTORY OF RFID
In 1945 Lon Theremin invented an espionage tool for the Soviet Union which retransmitted incident radio waves with audio information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator, which modulated the reflected radio frequency. Even though this device was a covert listening device, not an identification tag, it is considered to be a predecessor of RFID technology, because it was likewise passive, being energized and activated by electromagnetic waves from an outside source.[1] Similar technology, such as the IFF transponder developed in the United Kingdom, was routinely used by the allies in World War II to identify aircraft as friend or foe. Transponders are still used by most powered aircraft to this day. Another early work exploring RFID is the landmark 1948 paper by Harry Stockman, titled "Communication by Means of Reflected Power". Stockman predicted that "... considerable research and development work has to be done before the remaining basic problems in reflected-power communication are solved, and before the field of useful applications is explored." Mario Cardullo's device in 1973 was the first true ancestor of modern RFID, as it was a passive radio transponder with memory. The initial device was passive, powered by the interrogating signal, and was demonstrated in 1971 to the New York Port Authority and other potential users and consisted of a transponder with 16 bit memory for use as a toll device. The basic Cardullo patent covers the use of RF, sound and light as transmission media. The original business plan presented to investors in 1969 showed uses in transportation (automotive vehicle identification, automatic toll system, electronic license plate, electronic manifest, vehicle routing, vehicle performance monitoring), banking (electronic check book, electronic credit card), security (personnel identification, automatic gates, surveillance) and medical (identification, patient history). An early demonstration of reflected power (modulated backscatter) RFID tags, both passive and semi-passive, was performed by Steven Depp, Alfred Koelle, and Robert Freyman at the Los Alamos National Laboratory in 1973.The portable system operated at 915 MHz and used 12-bit tags. This technique is used by the majority of today's UHFID and microwave RFID tags.
2

The first patent to be associated with the abbreviation RFID was granted to Charles Walton in 1983.The largest deployment of active RFID is the US Department of Defense use of Savi active tags on every one of its more than a million shipping containers that travel outside of the continental United States. The largest passive RFID deployment is the Defense Logistics Agency (DLA) deployment across 72 facilities implemented by ODIN who also performed the global roll-out for Airbus consisting of 13 projects across the globe.

3. BASIC BLOCK DIAGRAM


A basic RFID system consists of three components:

An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically programmed with unique information

The purpose of an RFID system is to enable data to be transmitted by a portable device, called a tag, which is read by an RFID reader and processed according to the needs of a particular application. The antenna emits radio signals to activate the tag and to read and write data to it. An RFID reader is a device that is used to interrogate an RFID tag. The reader has an antenna that emits radio waves; the tag responds by sending back its data. A number of factors can affect the distance at which a tag can be read (the read range). The frequency used for identification, the antenna gain, the orientation and polarization of the reader antenna and the transponder antenna, as well as the placement of the tag on the object to be identified will all have an impact on the RFID systems read range. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing. At a basic level, each tag works in the same way. Data stored within an RFID tag's microchip waits to be read. The tag's antenna
4

receives electromagnetic energy from an RFID reader's antenna. Using power from its internal battery or power harvested from the reader's electromagnetic field, the tag sends radio waves back to the reader. The reader picks up the tag's radio waves and interprets the frequencies as meaningful data. The reader then passes the information in digital form to a computer system. The data transmitted by the tag may provide identification or location information, or specifics about the product tagged, such as price, color, date of purchase, etc. A typical RFID tag consists of a microchip attached to a radio antenna mounted on a substrate. The chip can store as much as 2 kilobytes of data. Active, Semi-passive and Passive RFID Tags: Active and semi-passive RFID tags use internal batteries to power their circuits. An active tag also uses its battery to broadcast radio waves to a reader, whereas a semi-passive tag relies on the reader to supply its power for broadcasting. Active and semi-passive tags are reserved for costly items that are read over greater distances they broadcast high frequencies from 850 to 950 MHz that can be read 100 feet or more away. If it is necessary to read the tags from even farther away, additional batteries can boost a tag's range to over 300 feet (100 meters). Passive RFID tags rely entirely on the reader as their power source. These tags are read up to 20 feet away. Storage types : There are three storage types read-write read-only WORM (write once, read many). A read-write tag's data can be added to or overwritten. Read-only tags cannot be added to or overwritten -- they contain only the data that is stored in them when they were made. WORM tags can have additional data (like another serial number) added once, but they cannot be overwritten.

4. RFID APPLICATIONS
Current and Potential Uses of RFID : Asset Tracking : It's no surprise that asset tracking is one of the most common uses of RFID. Companies can put RFID tags on assets that are lost or stolen often, that are underutilized or that are just hard to locate at the time they are needed. Just about every type of RFID system is used for asset management. NYK Logistics, a third-party logistics provider based in Secaucus, N.J., needed to track containers at its Long Beach, Calif., distribution center. It chose a real-time locating system that uses active RFID beacons to locate container to within 10 feet.

Manufacturing : RFID has been used in manufacturing plants for more than a decade. It's used to track parts and work in process and to reduce defects, increase throughput and manage the production of different versions of the same product.

Supply Chain Management : RFID technology has been used in closed loop supply chains or to automate parts of the supply chain within a company's control for years.As standards emerge, companies are increasingly turning to RFID to track shipments among supply chain partners.

Payment Systems : RFID is all the rage in the supply chain world, but the technology is also catching on as a convenient payment mechanism. One of the most popular uses of RFID today is to pay for road tolls without stopping. These active systems have caught on in many countries, and quick service restaurants are experimenting with using the same active RFID tags to pay for meals at drivethrough windows.

Security and Access Control : RFID has long been used as an electronic key to control who has access to office buildings or areas within office buildings. The first access control systems used low-frequency RFID tags. Recently, vendors have introduced 13.56 MHz systems that offer longer read range. The advantage of RFID is it is convenient (an employee can hold up a badge to unlock a door, rather than looking for a key or swiping a magnetic stripe card) and because there is no contact between the card and reader, there is less wear and tear, and therefore less maintenance. As RFID technology evolves and becomes less expensive and more robust, it's likely that companies and RFID vendors will develop many new applications to solve common and unique business problems. Transportation payments: Governments use RFID applications for traffic management, while automotive companies use various RFID tracking solutions for product management. Many of these solutions may work together in the future, though privacy regulations prevent many initiatives from moving forward at the same pace that technology allows. Libraries: Among the many uses of RFID technology is its deployment in libraries. The RFID tag can contain identifying information, such as a book's title or material type, without having to be pointed to a separate database .The information is read by an RFID reader, which replaces the standard barcode reader. E-Passports: The first RFID passports ("E-passport") were issued by Malaysia in 1998. In addition to information also contained on the visual data page of the passport, Malaysian e-passports record the travel history (time, date, and place) of entries and exits from the country.

Telemetry: Active RFID tags also have the potential to function as low-cost remote sensors that broadcast telemetry back to a base station. Applications of tagometry data could include sensing of road conditions by implanted beacons, weather reports, and noise level monitoring.[75] Animal Chipping: Animal chipping is nothing new -- farmers have been tracking livestock for years using RFID technology. RFID pet recovery systems rely on tiny microchips the size of a grain of rice that contains the pet owner's contact information and sometimes an animal's medical history. Human chipping: Microchips are made with unique identification numbers that link to a human chip medical database. The human chip database contains emergency contact information and medical histories. Retailing : Retailers such as Best Buy, Metro, Target, Tesco and Wal-Mart are in the forefront of RFID adoption. These retailers are currently focused on improving supply chain efficiency and making sure product is on the shelf when customers want to buy it.

5. MOTTO OF THE PROJECT


Many RFID systems with different designs are being implemented now a days in variety of areas and applications successfully. This mini project done is also one of those applications and our objective is to implement a very simple RFID system in area of access control. This mini project titled as RFID based access control system aims at the security regarding access of door locks solely by the authorized persons. There are many circuits designed for this cause which use variety of principles. Here in this project as the title reads RFID principle is used for the designing purpose. The receiver circuit acts as the lock and the transmitter circuit acts as the unique key designed for unlocking. The lock can be unlocked only when the transmitter circuit is brought with in the vicinity of the receiver and transmitter is activated. Thus it is made possible by use of this system to have the access to the lock by the only one who possesses the key i..e, the transmitter circuit.

6. VITAL COMPONENTS
There are resistors and capacitors in the circuit used as in many electronic circuits. But still there are some important components in the circuit which play key roles for the circuit operation. IC 324 Transistor BC 547 Transistor BC 494 The coil antennas IC 324: This is the IC with 4 operational amplifiers fabricated in it. All the operational amplifiers are independent in their working from each other. The user can use any number of operational amplifier s from one to four. The pin diagram of the IC is:

10

Transistors: The 2 transistors used here are BC 547 BF 494

BC 547: BC547 is an NPN bi-polar junction transistor. A transistor, stands for transfer of resistance, is commonly used to amplify current. A small current at its base controls a larger current at collector & emitter terminals. BC547 is mainly used for amplification and switching purposes. It has a maximum current gain of 800. Its equivalent transistors are BC548 and BC549. The transistor terminals require a fixed DC voltage to operate in the desired region of its characteristic curves. This is known as the biasing. For amplification applications, the transistor is biased such that it is partly on for all input conditions. The input signal at base is amplified and taken at the emitter. BC547 is used in common emitter configuration for amplifiers. The voltage divider is the commonly used biasing mode. For switching applications, transistor is biased so that it remains fully on if there is a signal at its base. In the absence of base signal, it gets completely off. BF 494: This is said to be a RF transistor as it is used for generation of radio frequency(3 kHz to 300 GHz). This is a NPN silicon planar epitaxial transistor for RF small signal application up to 120MHz.

11

Coil antennas: The antennas used are handmade antennas. These can be made using the enameled copper wire of gauge 21 SWG. Both the coils are identical and have 4 turns of wire with diameter of 4 mm approximately. Similarity of both the antennas is very important as any difference may lead to impedance mismatch.

12

7. THE COMPLETE CIRCUIT


The RFID access control circuit presented here is super simple to build. Once the tuning is completed, the lock will respond only to the particular key matched with the lock. In the present design of RFID for area security management the receiver circuit forms the lock and the transmitter forms the key. Receiver circuit:

13

The following explanation of the receiver circuit will give a clear picture of its internal functioning: Only 1 op-amp out of the four in IC 324 has been used here. It performs the function of a strong RF amplifier. The RF signal from the transmitter is received by the antenna coil and is tuned by the trimmer capacitor. The resonated voltage is immediately amplified by the op-amp. Its output triggers the transistor which in turn activates the relay. The relay gets latched instantly through its N/O contacts. Whatever load (12 V) is connected to these contacts is also thus activated. Transmitter circuit:

14

The transmitter circuit can be easily understood through the following explanations: The RF transistor BF494 and its associated parts together form a high frequency RF signal generator of around 100MHz. The coil i..e, the antenna coil and the capacitors along with the transistor form a kind of feedback oscillator circuit, where basically the "tank circuit" formed by the coil and the parallel capacitor determines the frequency of oscillations. As long as the push button is kept depressed the circuit continues to generate the high frequency RF signal through the antenna coil. Testing Procedure: The testing procedure of the circuit of RFID for area security management is absolutely simple and is completed through the following simple steps: Connect a 12V DC regulated supply to the receiver circuit. Keeping the transmitter circuits switch depressed, bring its antenna to a close proximity to the antenna coil of the receiver circuit. Adjust the capacitor trimmer in the receiver circuit till the LED starts glowing brightly and the relay gets energized. The receiver frequency is now matched with the transmitter frequency and will respond only to this particular key. Now releasing the transmitter switch should switch OFF the LED immediately, but the relay should remain latched. Switch the power OFF to reset the relay.

Tank circuit: A tank circuit is an electronic circuit used in many applications, including oscillators, TV and radio sets. In its most basic form, the circuit consists of just two electronic components, namely a capacitor and an inductor (a coil). In actual application, as opposed to a theoretical design, other

15

components come into play that affect the circuit's operation. These include a resistive load and an alternating current source. Once energy is supplied to the tank circuit, a cycle begins. The capacitor stores energy in its configuration of plates. In the circuit, the capacitor's plates are connected to the ends of the inductor coil. As current begins to flow out of the capacitor (its voltage starts dropping) and into the inductor, a magnetic field builds up around the coil. Although the capacitor will quickly become empty of energy, current will continue to flow in the inductor caused by the effect of the energy in the magnetic field. This current will start to send current back into the capacitor, although this time the polarity (the "plus" and "minus") will be reversed. The cycle then repeats, over and over, at a period (frequency) that is determined by the values of the inductor, the capacitor, and a few other components in the system. The circuit is not a "perpetual motion" machine, and an alternating current source must constantly drive the tank.

16

8. FUTURE SCOPE
RFID is such an intriguing concept to businesses because it can cut inventory and supply chain costs through its implementation. The ultimate goal is for RFID to replace barcodes. RFID allows for individual product identification, not for product line identification like barcodes. There can be a problem with reading tags with an external reader due to the standardization of RFID technology. Steps will have to be taken to counter such problems, and solution is to use a form of encryption. If the tags send their messages in an encrypted format, only the authorized reader will be able to decipher the signal. Such a method is years away. Smart products clothing, appliances, CDs etc tagged for store returns. Smart appliances

like Refrigerators that automatically create shopping lists, Closets that tell you what clothes you have available, and search the Web for advice on current styles, etc. The pan reads the card you show and tells the cook top what to do to perfectly monitor each cooking step and perfectly reproduce the most difficult recipes. Each pan handle is embedded with an RFID chip that uses a proprietary signal to communicate with coordinated chips in the cook top and special recipe RFID enabled mobile phones can scan movie poster to learn show times and can scan consumer product to get price quotes.

17

9. CONCLUSION

Assuming RFID does not stumble because of security- or privacy-related problems, people will begin to use RFID in their homes within the next two years. Many may first notice RFID tags in security and health applications. For example, they might see tags on prescriptionmedicine bottles, library books, or luggage tags. These are useful but incidental applications of RFID. People will also begin to experiment with personalized applications. RFID will become a component in home management systems, which will help to schedule shopping, laundry, and other tasks. RFID will also help track essential everyday items like car keys, wallets, and book bags. Finally, this technology will become part of systems that help patients complete prescription-drug courses. First, RFID systems will become instruments for delivering content, entertainment, and education. Second, people will reinvent RFID. Users will create and share applications and services using the technology; providing an example of creative destruction and technological evolution at its messiestand its best.

18

REFERENCES
www.brighthub.com www.answers.com www.howstuffworks.com www.wikipedia.org www.google.com www.datasheetcatalog.com Electronic Devices & Circuits by Milliman & Halkias

19

You might also like