Automation, informatization, and intelligence have become the needs of the development of the times. Since the beginning of the 21st century, infinite technology and computer technology have continued to develop in depth, and the Internet of Things industry is booming. The access control system based on RFID technology is a good embodiment of the practicality of the Internet of Things. The access control system can be divided into the following three categories according to the identification method of entry and exit: password identification; card identification; biometric identification. Password identification is to identify the entry and exit authority by checking whether the entered password is correct. The password identification security is relatively high, but the password is easy to forget, and every time you enter the door, you need to enter the password, which is cumbersome. Biometric identification is identified by some biometric features of people. Biometric identification is highly secure and very convenient, but its high cost makes it difficult to promote. Card identification is divided into two categories: the first is the use of magnetic cards, but the magnetic cards are low in security, easy to wear and require frequent magnetization; the second is RFID cards, which are cheap, easy to use, high security and can use the database. It is well managed, its cost performance is very high, and it has a good promotion prospect. To sum up, this paper introduces an access control system based on RFID technology, which has low cost and high security. Ability to view information about the access control system in real time. 1 Overall structure and working principle The overall structure of the system consists of the upper computer server management system and the lower computer card reader. The lower computer card reader is mainly composed of power supply, main controller, liquid crystal display, card reader module, antenna, and serial communication. Among them, the card reader module M102GPCV3 adopts 13.56MHz non-contact radio frequency technology, which can read MifareOneS50, S70, FM11RF08 and its compatible cards. The LCD displays some prompt information and time and date. The serial port is used for the communication between the lower computer and the upper computer server. The host computer server management system adopts the database MySQL database management, and the specific management interface is displayed in the form of web pages. The working principle of the entire access control system is: one person, one card, and the corresponding personal information is established in the database management system according to the serial number of the card. When you want to open the door, use the card to swipe on the lower computer, and the card reader of the lower computer transmits the serial number to the upper computer server, and the server queries the corresponding personal information in the database according to the serial number and transmits it to the lower computer. At the same time, the lower computer reads the data of the fixed sector block of the card (card reading), and compares the read data with the data sent by the upper computer one by one, and only opens the door if they are exactly the same, otherwise an error will be displayed on the LCD and the door will not be opened. All the above information will be uploaded to the upper computer management system for storage. The upper computer management system can change the data information (write card) set by the lower computer. 2 System hardware design 2.1 Overall hardware design Design of RFID Intelligent Access Control System Based on ARM 2.2 Card reader module and main controller circuit hardware design The M102GPCV3 read-write module is designed to provide two interface modes: the I2C bus mode of 10Mb/s, and the UART mode of up to 1228.8Kb/s. The UART mode is used here, and the card information is read and written through the M102GPCV3. 3 System software design 3.1 Overall software design of the system The overall software design of the access control system includes the software design of the card reader of the lower computer and the software design of the database management system of the upper computer. The lower computer card reader of the access control system mainly realizes the reading of the card and the communication with the upper computer management system, which is realized by C language programming in the Keil4 environment. The upper computer management system is written by Myecfipse and Firefox programming aids. As shown in Figure 3. 3.2 The software design of the card reader system of the lower computer The lower computer access control card reader system is shown in Figure 4. The lower computer card reader system needs to follow the ISO14443TYPEA standard transmission protocol, that is, in the order of card search→anti-collision→card selection→key authentication→block reading. When anti-collision, read the serial number and transmit it to the upper computer management system, and save it to the database management system. The read block read data is compared with the set data and judged. 3.3 The software design of the host computer database management system The host computer database management system records and publishes information about cardholders when they enter the door, and adds, deletes, and modifies cardholder information and permissions. The information is saved through the database, and the information table is made and published on the website through the Java language. Ordinary users can log in to the ordinary account to visit the local area network website and inquire about the information about the access control system. The administrator can log in to modify the card information and permissions through the administrator account. 4 Conclusion Through many physical tests, the RFID access control system designed in this scheme is safe, reliable and easy to use. And compared with other access control systems, it has a high cost performance. With the rapid development of Internet of Things technology in the world and the promotion of my country's gold card project, it is believed that RFID technology will be more and more applied to all walks of life. RFID-based security systems will also develop with this trend. Facts also prove that, according to statistics, RFID access control sales in 2008 accounted for 87.2% of the entire security market.
Features
A push button switch is a switch that has a knob that you push to open or close the contacts. In some pushbutton switches, you push the switch once to open the contacts and then push again to close the contacts. In other words, each time you push the switch, the contacts alternate between opened and closed. These types are commonly called latching switches. There are also Non latching push button switches that only maintain the switch contacts when the switch is help in position. Once the switch is let go, the current is broken and the switch turns off. Push switches are usually a simple on-off switch.
Push On Off Switch,Small Push Button Switch,Automotive Push Switch,Miniature Push Button Switch Ningbo Jialin Electronics Co.,Ltd , https://www.donghai-switch.com