template

RFID Based Automated Bank Locker System
Swetha J
Department of Electronics and Communication Engineering,
PSG College of Technology, Coimbatore, India
Email: [email protected]
Abstract—Banks provide locker system for their customers
for safekeeping. In the current locker system, there is no
separate banker to take care and attend to people wishing to
access lockers. Every time a customer wishes to access his
locker, he must wait until a banker becomes free so that he
can authenticate access to the locker. This results in waste of
time for both the banker as well as the customer, as the
customer has to wait until the banker becomes free and the
banker has to stop his work and attend to the customer.
This project aims to change the existing system and
automate the locker system using RFID tags for customer
identification. Every customer is given a unique RFID card
with a unique number so that the customer can be identified
and access can be granted to the customer’s locker.
Index Terms—RFID tag, RFID based locker, automated
locker, time saving, easy access, 8051 microcontroller.
I. INTRODUCTION
In the recent years, in spite of increased security
and protection in banks, there are many thefts happening
in banks. As the technology keeps growing, the need for
safe and secure lockers keeps growing. The solution to
this problem can be met with this project. It greatly
reduces the waiting time and increases the security. There
are various methods; some of them are bar-code systems,
optical character recognition, biometrics, smart cards and
RFIDs, of which RFID technology is a revolution.
Various applications of RFID include: Transportation and
logistics, manufacturing and processing, security, animal
tagging, waste management, time and attendance, postal
tracking, airline baggage reconciliation, road toll
management, etc.
tag when read by the RFID reader will automatically
open and close the locker. Thereby, security is guaranteed
and the customers waiting time is drastically reduced.
III. METHODS USED
RFID technology is the fast growing technology in
the recent years. RFID is similar to bar code technology
but uses the radio waves to capture the data from the tags
rather than optical scanning. One of the key
characteristics of RFID is that it does not require any tag
or label to be seen to read it’s stored data. The RFID
system interfaced with microcontroller requires the
controller to continuously scan the input from the RFID
reader. RFID reader module is also called as interrogator.
They convert the radio waves returned from the RFID tag
into a form tat can be passed on to controllers, which can
make use of it. RFID system consists of two separate
components: a tag and a reader. Tags are analogous to
barcode labels and reader functions similarly to barcode
scanners.
IV. ARCHITECTURE OF THE SYSTEM
II. EXISTING SCENARIOS
In most of the banks, the locker systems involve
manual lock. Whenever the user wishes the use the
locker, he should be assisted by the bank employee which
leads to waste of time for both the customer and the
employee. The major drawbacks of such manual lock
systems are lack of security and the waiting time of the
customers. It should be noted that the person
accompanying the customer can be any employee who is
free at that instant of time. Solely, time is wasted. This
can be overcome by any automatic locker system. There
are many techniques in which this can be implemented.
In this project, RFID tags are used which holds the user’s
information like locker number, username, etc, this RFID
Figure 1. Block Diagram For The System
From the Fig. 1, it can be seen that RFID reader is
interfaced to port 3.0. TXD of RFID reader is connected
to RXD pin (port 3.0) of AT89S51. RFID tags when read
by the reader will display the relevant information on
LCD.LCD is interfaced to the microcontroller through
port 2. The LCD is used for displaying the user’s ID and
status of the locker. In this project, we have considered
two customers whose lockers are being controlled by
stepper motor 1 and stepper motor 2. User 1 stepper
motor is interfaced to lower bits of port 0 and user 2
stepper motor is interfaced to the upper bits of port 0.
When user 1 is granted access, stepper motor 1 will rotate
in anticlockwise direction which indicates the locker is
opened. Similarly, when user 2 is granted access, stepper
motor 2 will rotate in anticlockwise direction which
indicates the locker is opened. Whenever the user is done
with his work, he will close his locker by pressing the
corresponding switch provided. This will automatically
enable the lock. Two switches are interfaced to port 1.4
and 1.5 respectively.
V. HARDWARE COMPONENTS
A. AT89S51 Microcontroller
The AT89S51 is a low power, high performance
CMOS 8-bit microcontroller with 4K bytes of In-system
programmable flash memory. The device is manufactured
using Atmel’s high non-volatile memory technology and
is compatible with the industry standard 80C51
instruction set and pin out. The on-chip flash allows the
program memory to be reprogrammed in-system or by a
conventional non-volatile memory programmer. By
combining a versatile 8-bit CPU with in-system
programmable flash on a monolithic chip, the Atmel
AT89S51 is a powerful microcontroller which provides a
highly-flexible and cost-effective solution to many
embedded control applications. The AT89S51 provides
the following standard features: 4K bytes of Flash, 128
bytes of RAM, 32 I/O lines, Watchdog timer, two data
pointers, two 16-bit timer/counters, a five-vector twolevel interrupt architecture, a full duplex serial port, onchip oscillator, and clock circuitry. In addition, the
AT89S51 is designed with static logic for operation down
to zero frequency and supports two software selectable
power saving modes. The Idle Mode stops the CPU while
allowing the RAM, timer/counters, serial port, and
interrupt system to continue functioning. The Powerdown mode saves the RAM contents but freezes the
oscillator, disabling all other chip functions until the next
external interrupt or hardware reset. The datasheet for
AT89S51 is also enclosed. The AT89S51 microcontroller
is as shown in the Fig. 2.
Figure 2. AT89S51 Microcontroller
B. RFID Module
RFID stands for Radio frequency identification. It is
an automatic identification technology where digital data
encoded in an RFID tag is read by the RFID reader. The
RFID module is as shown in the Fig. 3. An RFID system
consists of a reader device and a tag (transponder). A tag
has a unique serial number which is identified by the
reader. In this project, RFID has been interfaced with
microcontroller to provide secured access. The relevant
messages are also displayed on a 16x2 LCD.
RFID Reader Module, are also called as interrogators.
They convert radio waves returned from the RFID tag
into a form that can be passed on to Controllers, which
can make use of it. RFID tags and readers have to be
tuned to the same frequency in order to communicate.
RFID systems use many different frequencies. The tag
contains an antenna connected to a small microchip. The
reader functions similarly to a barcode scanner; however,
while a barcode scanner uses a laser beam to scan the
barcode, an RFID scanner uses electromagnetic waves.
To transmit these waves, the reader uses an antenna that
transmits a signal, communicating with the tags antenna.
The tags antenna receives data from the reader and
transmits its particular chip information to the reader. The
data on the chip is usually stored in one of two types of
memory. The most common is Read-Only Memory
(ROM) as its name suggests, read-only memory cannot
be altered once programmed onto the chip during the
manufacturing process. The second type of memory is
Read/Write Memory; though it is also programmed
during the manufacturing process, it can later be altered
by certain devices.
Figure 3. RFID Module
C. RFID Tags
RFID tag, shown in the Fig. 4, is a small device
which stores and sends data to RFID reader. They are
categorized in two types –active tag and passive tag.
Active tags are those which contain an internal battery
and do not require power from the reader. Typically
active tags have a longer distance range than passive tags.
Passive tags are smaller and lighter in size than the active
tags. They do not contain an internal battery and thus
depend on RFID reader for operating power and certainly
have a low range limited up to few meters. The RFID tag
is used as an identity for a particular user. If the identity
(serial number of the tag) of the user is matched with the
one already stored in this system, he gets immediate
access through it. This RFID based secured access system
also has many additional features. For example, a new
user can register himself with the system. A registered
user can also withdraw his entry from the system. These
features can be accessed by pressing a switch connected
to the microcontroller. In beginning, the user is prompted
to scan his tag or ID. The serial code of the tag is
identified by the reader module and is sent to AT89S51
for checking. If the ID is matched by the microcontroller,
the user gets the access. On the contrary, if the tag is not
identified, the user will not be granted access. When an
RFID tag comes in this range, the reader detects it and
sends a unique code of the tag serially. This serial code,
consisting of 12 bytes, is received by the microcontroller.
This code is treated as an ID for the user and is stored as
an array in the microcontroller. If the ID is matched with
this code, the user is granted access though the system.
The RFID system interfaced with microcontroller
requires the controller to continuously scan the input
from the RFID reader. When an RFID tag comes in this
range, the reader detects it and sends a unique code of the
tag serially. This serial code, consisting of 12 bytes, is
received by the microcontroller. The baud rate is set to
9600bps for data transmission. The LCD is initialized to
display the code. When a card/tag comes in the proximity
of RFID reader, the microcontroller reads the code and
sends it to the LCD module. The serial interrupt is
triggered on every reception of one byte of data. Since the
identification code of transponder consists of 12 bytes,
the flag is also generated 12 times to indicate the byte
wise transfer of data. Whenever the serial code is
generated by the reader, the interrupt is activated and the
data is sent to the receiver pin of microcontroller.
Figure 4. RFID Tags
D. Stepper Motor
A stepper motor (or step motor) shown in the
Fig. 5 is a brushless DC electric motor that divides a full
rotation into a number of equal steps. The motor's
position can then be commanded to move and hold at one
of these steps without any feedback sensor (an open-loop
controller), as long as the motor is carefully sized to the
application. The use of stepper motor in this project is to
mimic the locker operation. The operation can be
explained as follows. DC brush motors rotate
continuously when voltage is applied to their terminals.
Stepper motors, on the other hand, effectively have
multiple "toothed" electromagnets arranged around a
central gear-shaped piece of iron. The electromagnets are
energized by an external control circuit, such as a
microcontroller. To make the motor shaft turn, first, one
electromagnet is given power, which magnetically
attracts the gear's teeth. When the gear's teeth are aligned
to the first electromagnet, they are slightly offset from the
next electromagnet. So when the next electromagnet is
turned on and the first is turned off, the gear rotates
slightly to align with the next one, and from there the
process is repeated. Each of those rotations is called a
"step", with an integer number of steps making a full
rotation. In that way, the motor can be turned by a precise
angle.
Figure 5. Stepper Motor
E. Liquid Crystal Display
LCD (Liquid Crystal Display) screen shown in
the Fig. 6 is an electronic module used in a wide range of
applications. A 16x2 LCD is a very basic module and is
very common in various devices and circuits. They are
preferred over seven segment displays. There are many
advantages when compared to seven segment displays.
They are: LCDs can display characters, numbers and
even graphics. There are refreshing controllers present
inside the LCDs so 8051 need not refresh the displays. It
is cost efficient and the current dissipation is low. A 16x2
LCD means it can display 16 characters per line and there
are 2 such lines. In tis LCD, each character is displayed in
5x7 pixel matrix. This LCD has two registers namely
command and data register. The command register stores
the command instructions given to the LCD. A command
is an instruction given to LCD to do a predefined task like
initializing it, clearing its screen, setting the cursor
position, controlling display etc. The data register stores
the data to be displayed on the LCD. The data is the
ASCII value of the character to be displayed on the LCD.
Figure 6. Liquid Crystal Display
The command codes for Liquid Crystal Display are
written in hexadecimal. The commonly used command
codes are
 0x38 – 2 lines 5X7 matrix
 0x0F- display on, cursor blinking
 0x81 – forces the cursor to line 1, position 2
 0xC1 – forces the cursor to line 2, position 2
VI. ALGORITHM AND WORKING OF THE SYSTEM
Step 1: Start
Step 2: Wait until RFID card is detected.
Step 3: Read card data and identify the customer.
Step 4: Unlock the locker corresponding to the customer.
Step 5: Wait until the customer locks the locker.
Step 6: Repeat from step 2.
VII. OUTPUTS OF THE PROJECT
The various outputs are explained with pictures. When
the ID is read by the reader, the message displayed is as
shown in Fig. 8.
Figure 8. Initial Message On LCD
During this stage, the user places his/her unique RFID tag
in front of the reader to read the data present. The next
stage is as shown in the Fig. 9.
Figure 7. Working Model
Initially, when the connections are given and when
the entire model is switched on, a message is displayed
on the LCD “CUSTOMER ID:”. When the RFID tag is
brought into the sensing area, the RFID reader reads the
data (user ID) form the tag and displays the ID on the
screen. The microcontroller AT89S51 process the data
i.e. identifies whether it is user 1 or user 2 and allows
access to the corresponding user. For example, if user 1 is
granted access, then the stepper motor 1 will rotate in
anticlockwise direction which indicates that locker 1 is
opened and the user 1 can use it. The message displayed
on the LCD is “LOCKER 1 OPENED”. As soon as the
user has completed his work, he will press the switch 1.
The control goes to the stepper motor 1 and it will rotate
in the clockwise direction which indicates that the lock
has been enabled. The corresponding message displayed
is “LOCKER 1 CLOSED”. The control again to the
beginning where the message will once again be
displayed as “CUSTOMER ID:”.
An important point to be noted is that at any instant
during this process, if user 2 wishes to access the locker,
he will be denied access. This process works in a similar
way for user 2. If user 2 is granted access, then the
stepper motor 2 will rotate in anticlockwise direction
which indicates that locker 2 is opened and the user 2 can
use it. The message displayed on the LCD is “LOCKER 2
OPENED”. As soon as the user has completed his work,
he will press the switch 2. The control goes to the stepper
motor 2 and it will rotate in the clockwise direction which
indicates that the lock has been enabled. The
corresponding message displayed is “LOCKER 2
CLOSED”. The control again to the beginning where the
message will once again be displayed as “CUSTOMER
ID:”.
Figure 9. Access To User 1
As soon as the locker details are obtained, the locker gets
opened i.e. the stepper motor rotates in the anticlockwise
direction to indicate that the locker is opened. The status
of the locker 1 is displayed for the project purpose as
shown in the Fig. 10.
Figure 10. Status Of Locker 1
The user can close the locker by pressing a switch which
is provided this project. When the switch is pressed, the
stepper motor rotates in the clockwise direction to
indicate that the locker is closed. The status of the locker
will be as shown in the Fig. 10. In a similar way, the
locker 2 messages will be displayed. This project can be
extended to n users and real time issues can be met.
Hence, if RFID based bank locker system is implemented
in banks or other security systems, thefts can be greatly
reduced which is a major issue. Moreover, customer’s
waiting time can be greatly reduced and security can also
be guaranteed.
VIII. CONCLUSION
This project is mainly aimed at reducing banker’s
workload. Time is considerably saved by this RFID based
automated bank locker system as there is no need for any
authentication by the bank employee. In the current
existing locker system, there is no separate banker to take
care and attend to people wishing to access lockers.
Every time a customer wishes to access his locker, he
must wait until a banker becomes free so that he can
authenticate access to the locker. As this project is
implemented using software tools Keil µVision, the
outputs can be easily checked before they are embedded
on the hardware. This project has the outputs can be
easily checked before they are embedded on the
hardware. This project has the potential to greatly reduce
the manpower required during the access of bank lockers
by the customers and also greatly saves time for both the
banker and the customer. This project can be extended for
more number of customers and banks by using RFID
cards with identification numbers of more length.
ACKNOWLEDGEMENT
I would like to express my sincere gratitude and
profound thanks to Dr.R.Rudramoorthy, Principal, PSG
College of Technology for his inevitable encouragement
and support, Dr.S.Subha Rani, Professor and Head,
Department of Electronics and Communication
Engineering, my faculty guide, Dr.K.V.Anusuya,
Assistant Professor, Department of Electronics and
Communication Engineering.
REFERENCES
[1]
[2]
[3]
[4]
[5]
Raj Kamal, Embedded Systems: Architecture, Programming And
Design, 2008 edition, published by McGraw Hill Education
Private Limited.
Mazidi Muhammed Ali, The 8051 Microcontroller And Embedded
Systems Using Assembly And C, second edition, published by
Pearson education.
Kenneth J. Ayala, The 8051 Microcontroller, 2004 edition.
Deepak Gupta EM Magazine, RFID Interface To 8051.
V. Daniel Hunt, Albert Puglia, Mike Puglia, RFID – A Guide To
Radio Frequency Identification, 2007 edition, published by A
John Wiley and Sons, Inc., Publications.