DEVELOPMENT OF MICROCONTROLLER BASED IDENTIFICATION CARD FEATURES IDENTIFIER
USER'S INSTRUCTIONS: The project work you are about to view is on "development of microcontroller based identification card features identifier" Please, sit back and study the below research material carefully. This project topic "development of microcontroller based identification card features identifier" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "development of microcontroller based identification card features identifier" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "development of microcontroller based identification card features identifier" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.
TITLE PAGE
DEVELOPMENT OF MICROCONTROLLER BASED IDENTIFICATION CARD FEATURES IDENTIFIER
BY
---
EE/H2013/01430
DEPARTMENT OF ---
INSTITUTE OF ---
DECEMBER,2018
APPROVAL PAGE
This is to certify that the research work, "development of microcontroller based identification card features identifier" by ---, Reg. No. EE/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on Electrical and Electronics Engineering has been approved.
By
Dr. --- Dr. ---
Supervisor Head of Department.
Signature………………. Signature……………….
……………………………….
Dr. ---
External Invigilator
DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.
ACKNOWLEDGEMENT
The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.
PROJECT DESCRIPTION: This work “development of microcontroller based identification card features identifier” research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of “development of microcontroller based identification card features identifier” visible for everyone, then the complete material on “design and construction of an automatic emergency lighting system” is to be ordered for. Happy viewing!!!
A microcontroller based identification card features identifier is also known as a digital or smart card reader is designed and developed for human management. The smart card reader uses an 8-bit microcontroller for high performance and supports contact interfaces. We developed smart card identifier for efficient verification of the smart card. Further the attendance analysis of organization employees has been carried out through serial communication by interfacing the terminal with personal computer. In the present paper hardware and software details are there. The system is tested and results are found satisfactory.
TABLE OF CONTENTS
COVER PAGE
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
CHAPTER ONE
INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
- PROBLEM STATEMENT
- AIM OF THE PROJECT
- OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- APPLICATION OF THE PROJECT
- BENEFITS OF THE PROJECT
- PURPOSE OF THE PROJECT
- METHODOLOGY
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
- OVERVIEW OF A SMART CARD
- PHYSICAL ID VERIFICATION
- HISTORICAL BACKGROUND OF A SMART CARD
- SMART READER / TERMINAL
- PRIVACY REQUIREMENTS FOR SECURE ID SYSTEMS
- THREE ELEMENTS OF SECURITY
- THE ROLE OF SMART CARDS IN THE CHAIN OF TRUST
- POWER SUPPLY UNIT
CHAPTER THREE
SYSTEM DESIGN METHODOLOGY
- SYSTEM BLOCK DIAGRAM
- DESCRIPTION OF SYSTEM BLOCK
- HARDWARE DESIGN IMPLEMENTATION
CHAPTER FOUR
TEST AND RESULT ANALYSIS
- INSTALLATION OF THE COMPLET DESIGN
- CONSTRUCTION PROCEDURE AND TESTING
- CASING AND PACKAGING
- ASSEMBLING OF SECTIONS
- TESTING OF SYSTEM OPERATION
- RESULT
CHAPTER FIVE
- CONCLUSION
- RECOMMENDATION
- REFERENCES
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE STUDY
A microcontroller based identification card which is also known as a Smart Card is like an "electronic wallet". It is a standard credit card-sized plastic intelligent token within which a microchip is embedded that makes it 'smart'. It provides not only memory capacity, but computational capability as well and thus the chip is capable of processing data. It has gold contacts that allow other devices to communicate with it. Smart Cards are often touted as “secure” portable storage devices according to [Business Week, 2002]. A complete, high-level design methodology has been proposed for embedded information systems based on smart card devices. However, this methodology takes as granted that information’s stored on the card will be really securely stored, and access control will be correctly maintained. A microcontroller based identification card features identifier also known as Smart Card Readers technology (SCRT) is the latest and most advanced technology available in the world [Business Week, 2002]. Employee has to simply insert the ID card in to a reader for marking attendance. While inserting the card, name of the employee appears on display of the reader into 16 alphanumeric characters along with its employee code identity, which is visual confirmation for marking successful attendance. Smart Cards are made with inbuilt electronic chip, which is having a memory, where employee’s related information can be feed into the card like Employee name, Employee Identity Number, Designation, Department, Address etc.
Smart cards are passive devices. So to function they needs to be inserted into a reader connected to a computer, or an integrated smart terminal. These devices are usually known as CAD (Card Acceptance Device). They come in many a kind of shapes: readers integrated into a vending machine, handheld battery-operated readers with a small LCD screen, readers integrated into a GSM mobile phone, or attached to a personal computer by a variety of interfaces. Mechanically, readers have various options including: whether the user must insert/remove the card versus automated insertion/ejection mechanism, sliding contacts versus landing contacts, and provisions for displays and keystroke entry. [Simon Liu and Mark Silverman, 2001] Electrically, the reader must conform to the ISO/IEC 7816-3 standard.
The modern smart card is essentially a stand-alone computer, much like a personal computer without a screen or a keyboard. They carry in-built microprocessors, enabling them to carry out intelligent functions. They have their own operating systems, temporary memory and file storage memory. In contrast to a PC, the operating system for a smart card is usually installed on the card by the manufacturer and cannot be changed. “Contact" smart cards use electrical contacts, placed on the cards in accordance with international standards, to allow them to be read by purpose built smart card readers. "Contactless" smart cards use low frequency radio waves to provide power and to communicate with smart card readers. Most contactless smart cards can be read from a distance of about six inches [Simon Liu and Mark Silverman, 2001].
1.2 PROBLEM STATEMENT
Microcontroller based identification card features identifier came to overcome the use of paper or plastic ID card because it was observed that people can easily falsified the old ID card identification. Such as Falsification in student or works attendance do occur rampantly in the traditional method. For example, another student or worker can easily present someone’s picture on behalf of another student or worker. In other to prevent this problem, microcontroller based ID card (smart card) which is been read and identified ID identifier was invented which is necessary to develop an Authentication and identification System using a microcontroller based ID card features identifier [Simon Liu and Mark Silverman, 2001].
1.3 AIM OF THE PROJECT
The main aim of this work is to develop a system that is used to authenticate and identify a smart card using a microcontroller as the heart of the system [Peter Ventura, 2000].
1.4 OBJECTIVE OF THE PROJECT
i. To ensure accuracy and authentication.
ii. At the end of this work, the student involve shall be able to build a system that will display the correct details of a smart card holder from a distance.
1.5 APPLICATIONS OF THE PROJECT
This device is used to identify the real owner of smart card in the following places according to [FRANK VAHID, 2015] [ Abadi, M. Burrows, C. Kaufman and B. Lampson, 2003]:
Financial
Smart cards serve as credit or ATM cards, fuel cards, mobile phone SIMs, authorization cards for pay television, household utility pre-payment cards, high-security identification and access badges, and public transport and public phone payment cards.
Smart cards may also be used as electronic wallets. The smart card chip can be "loaded" with funds to pay parking meters, vending machines or merchants. Cryptographic protocols protect the exchange of money between the smart card and the machine. No connection to a bank is needed. The holder of the card may use it even if not the owner.
SIM
The subscriber identity modules used in mobile-phone systems are reduced-size smart cards, using otherwise identical technologies.
Identification
Smart-cards can authenticate identity. Sometimes they employ a public key infrastructure (PKI). The card stores an encrypted digital certificate issued from the PKI provider along with other relevant information. Smart cards are not always privacy-enhancing, because the subject may carry incriminating information on the card. Contactless smart cards that can be read from within a wallet or even a garment simplify authentication; however, criminals may access data from these cards.
Cryptographic smart cards are often used for single sign-on. Most advanced smart cards include specialized cryptographic hardware that uses algorithms such as RSA and Digital Signature Algorithm (DSA). Today's cryptographic smart cards generate key pairs on board, to avoid the risk from having more than one copy of the key (since by design there usually isn't a way to extract private keys from a smart card). Such smart cards are mainly used for digital signatures and secure identification.
Public transit
Smart cards, used as transit passes, and integrated ticketing are used by many public transit operators. Card users may also make small purchases using the cards. Some operators offer points for usage, exchanged at retailers or for other benefits. Examples include Singapore's CEPAS, Ontario's Presto card, Hong Kong's Octopus Card, London's Oyster Card, Ireland's Leap card, Brussels' MoBIB, Québec's OPUS card, San Francisco's Clipper card, Auckland's AT Hop, Brisbane's go card, Perth's SmartRider, Sydney's Opal card and Victoria's myki. However, these present a privacy risk because they allow the mass transit operator (and the government) to track an individual's movement. In Finland, for example, the Data Protection Ombudsman prohibited the transport operator Helsinki Metropolitan Area Council (YTV) from collecting such information, despite YTV's argument that the card owner has the right to a list of trips paid with the card. Earlier, such information was used in the investigation of the Myyrmanni bombing [FRANK VAHID, 2015].
Computer security
Microcontroller based ID identifier can be used to read or identify a security token.
Mozilla's Firefox web browser can use smart cards to store certificates for use in secure web browsing.[ Technical Report 67, 1990]
Some disk encryption systems, such as VeraCrypt and Microsoft's BitLocker, can use smart cards to securely hold encryption keys, and also to add another layer of encryption to critical parts of the secured disk.
GnuPG, the well known encryption suite, also supports storing keys in a smart card.[ Abadi, M. Burrows, C. Kaufman and B. Lampson, 2003]
Smart cards are also used for single sign-on to log on to computers.
Schools
Smart cards are being provided to students at some schools and colleges.[ FRANK VAHID, 2015] Uses include:
- Tracking student attendance
- As an electronic purse, to pay for items at canteens, vending machines, laundry facilities, etc.
- Tracking and monitoring food choices at the canteen, to help the student maintain a healthy diet
- Tracking loans from the school library
- Access control for admittance to restricted buildings, dormitories, and other facilities. This requirement may be enforced at all times (such as for a laboratory containing valuable equipment), or just during after-hours periods (such as for an academic building that is open during class times, but restricted to authorized personnel at night), depending on security needs.
- Access to transportation services
Healthcare
Digital health cards can improve the security and privacy of patient information, provide a secure carrier for portable medical records, reduce health care fraud, support new processes for portable medical records, provide secure access to emergency medical information, enable compliance with government initiatives and mandates, and provide the platform to implement other applications as needed by the health care organization.[ FRANK VAHID, 2015]
Other uses
Smart cards are widely used to encrypt digital television streams. VideoGuard is a specific example of how smart card security worked.
Security
Smart cards have been advertised as suitable for personal identification tasks, because they are engineered to be tamper resistant. The chip usually implements some cryptographic algorithm. There are, however, several methods for recovering some of the algorithm's internal state.
Differential power analysis involves measuring the precise time and electric current required for certain encryption or decryption operations. This can deduce the on-chip private key used by public key algorithms such as RSA. Some implementations of symmetric ciphers can be vulnerable to timing or power attacks as well.
Smart cards can be physically disassembled by using acid, abrasives, solvents, or some other technique to obtain unrestricted access to the on-board microprocessor. Although such techniques may involve a risk of permanent damage to the chip, they permit much more detailed information (e.g., photomicrographs of encryption hardware) to be extracted.
1.6 BENEFITS OF THE PROJECT
The benefits of smart identification cards identifier are directly related to the volume of information and applications that are programmed for use on a card. A single contact/contactless smart card can be programmed with multiple banking credentials, medical entitlement, driver's license/public transport entitlement, loyalty programs and club memberships to name just a few. Multi-factor and proximity authentication can and has been embedded into smart cards to increase the security of all services on the card. For example, a smart card can be programmed to only allow a contactless transaction if it is also within range of another device like a uniquely paired mobile phone. This can significantly increase the security of the smart card according to [Technical Report 67, 1990].
Governments and regional authorities save money because of improved security, better data and reduced processing costs. These savings help reduce public budgets or enhance public services.
1.7 SIGNIFICANCE OF THE PROJECT
The first main advantage of smart cards identifier is their flexibility. Smart cards have multiple functions which simultaneously can be an ID, a credit card, a stored-value cash card, and a repository of personal information such as telephone numbers or medical history. The card can be easily replaced if lost, and, the requirement for a PIN (or other form of security) provides additional security from unauthorised access to information by others. At the first attempt to use it illegally, the card would be deactivated by the card reader itself.
The second main advantage is security. Smart cards can be electronic key rings, giving the bearer ability to access information and physical places without need for online connections. They are encryption devices, so that the user can encrypt and decrypt information without relying on unknown, and therefore potentially untrustworthy, appliances such as ATMs. Smart cards identifier is very flexible in providing authentication at different level of the bearer and the counterpart. Finally, with the information about the user that smart cards can provide to the other parties, they are useful devices for customizing products and services [Technical Report 67, 1990].
1.8 PURPOSE OF THIS PROJECT
The main purpose of this work is to ensure flexibility and accuracy in identifying a smart card holder.
1.9 METHODOLOGY
To achieve the aim and objectives of this work, the following are the steps involved:
- Study of the previous work on the project so as to improve it efficiency.
- Draw a block diagram.
- Test for continuity of components and devices,
- programming of microcontroller
- Development of the ID identifier was carried out.
- Studying of various component used in circuit.
- Finally, the whole device was cased and final test was carried out.
1.10 PROJECT ORGANISATION
The work is organized as follows: chapter one discuses the introductory part of the work, chapter two presents the literature review of the study, chapter three describes the methods applied, chapter four discusses the results of the work,chapter five summarizes the research outcomes and the recommendations.
CHAPTER TWO: The complete chapter two of “development of microcontroller based identification card features identifier” is available. Order full work to download. Chapter two of “development of microcontroller based identification card features identifier” consists of the literature review. In this chapter all the related work on “development of microcontroller based identification card features identifier” was reviewed.
CHAPTER THREE: The complete chapter three of “development of microcontroller based identification card features identifier” is available. Order full work to download. Chapter three of “development of microcontroller based identification card features identifier” consists of the methodology. In this chapter all the method used in carrying out this work was discussed.
CHAPTER FOUR: The complete chapter four of “development of microcontroller based identification card features identifier” is available. Order full work to download. Chapter four of “development of microcontroller based identification card features identifier” consists of all the test conducted during the work and the result gotten after the whole work
CHAPTER FIVE: The complete chapter five of “development of microcontroller based identification card features identifier” is available. Order full work to download. Chapter five of “development of microcontroller based identification card features identifier” consist of conclusion, recommendation and references.
To "DOWNLOAD" the complete material on this particular topic above click "HERE"
Do you want our Bank Accounts? please click HERE
To view other related topics click HERE
To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE
Do you want us to research your new topic? if yes, click "HERE"
Do you have any question concerning our post/services? click HERE for answers to your questions
You can also visit our facebook Page at fb.me/hyclas to view our related construction (or design) picture.
For more information contact us through Any of the following means:
Mobile No :+2348146561114 or +2347015391124 [Mr. Innocent]
Email address :engr4project@gmail.com
Watsapp No :+2348146561114
To View Our Design Pix: You can also visit our facebook Page at fb.me/hyclas for our design photos/pics.
COUNTRIES THAT FOUND OUR SERVICES USEFUL
Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124
Watsapp No :+2348146561114
Email Address :engr4project@gmail.com
IF YOU ARE SATISFIED WITH OUR SERVICES, PLEASE DO NOT FORGET TO INVITE YOUR FRIENDS AND COURSEMATES TO OUR PAGE.