RFID Based Automated Bank Locker System Swetha J Department of Electronics and Communication Engineering, PSG College of Technology, Coimbatore, India Email: [email protected] Abstract—Banks provide locker system for their customers for safekeeping. In the current locker system, there is no separate banker to take care and attend to people wishing to access lockers. Every time a customer wishes to access his locker, he must wait until a banker becomes free so that he can authenticate access to the locker. This results in waste of time for both the banker as well as the customer, as the customer has to wait until the banker becomes free and the banker has to stop his work and attend to the customer. This project aims to change the existing system and automate the locker system using RFID tags for customer identification. Every customer is given a unique RFID card with a unique number so that the customer can be identified and access can be granted to the customer’s locker. Index Terms—RFID tag, RFID based locker, automated locker, time saving, easy access, 8051 microcontroller. I. INTRODUCTION In the recent years, in spite of increased security and protection in banks, there are many thefts happening in banks. As the technology keeps growing, the need for safe and secure lockers keeps growing. The solution to this problem can be met with this project. It greatly reduces the waiting time and increases the security. There are various methods; some of them are bar-code systems, optical character recognition, biometrics, smart cards and RFIDs, of which RFID technology is a revolution. Various applications of RFID include: Transportation and logistics, manufacturing and processing, security, animal tagging, waste management, time and attendance, postal tracking, airline baggage reconciliation, road toll management, etc. tag when read by the RFID reader will automatically open and close the locker. Thereby, security is guaranteed and the customers waiting time is drastically reduced. III. METHODS USED RFID technology is the fast growing technology in the recent years. RFID is similar to bar code technology but uses the radio waves to capture the data from the tags rather than optical scanning. One of the key characteristics of RFID is that it does not require any tag or label to be seen to read it’s stored data. The RFID system interfaced with microcontroller requires the controller to continuously scan the input from the RFID reader. RFID reader module is also called as interrogator. They convert the radio waves returned from the RFID tag into a form tat can be passed on to controllers, which can make use of it. RFID system consists of two separate components: a tag and a reader. Tags are analogous to barcode labels and reader functions similarly to barcode scanners. IV. ARCHITECTURE OF THE SYSTEM II. EXISTING SCENARIOS In most of the banks, the locker systems involve manual lock. Whenever the user wishes the use the locker, he should be assisted by the bank employee which leads to waste of time for both the customer and the employee. The major drawbacks of such manual lock systems are lack of security and the waiting time of the customers. It should be noted that the person accompanying the customer can be any employee who is free at that instant of time. Solely, time is wasted. This can be overcome by any automatic locker system. There are many techniques in which this can be implemented. In this project, RFID tags are used which holds the user’s information like locker number, username, etc, this RFID Figure 1. Block Diagram For The System From the Fig. 1, it can be seen that RFID reader is interfaced to port 3.0. TXD of RFID reader is connected to RXD pin (port 3.0) of AT89S51. RFID tags when read by the reader will display the relevant information on LCD.LCD is interfaced to the microcontroller through port 2. The LCD is used for displaying the user’s ID and status of the locker. In this project, we have considered two customers whose lockers are being controlled by stepper motor 1 and stepper motor 2. User 1 stepper motor is interfaced to lower bits of port 0 and user 2 stepper motor is interfaced to the upper bits of port 0. When user 1 is granted access, stepper motor 1 will rotate in anticlockwise direction which indicates the locker is opened. Similarly, when user 2 is granted access, stepper motor 2 will rotate in anticlockwise direction which indicates the locker is opened. Whenever the user is done with his work, he will close his locker by pressing the corresponding switch provided. This will automatically enable the lock. Two switches are interfaced to port 1.4 and 1.5 respectively. V. HARDWARE COMPONENTS A. AT89S51 Microcontroller The AT89S51 is a low power, high performance CMOS 8-bit microcontroller with 4K bytes of In-system programmable flash memory. The device is manufactured using Atmel’s high non-volatile memory technology and is compatible with the industry standard 80C51 instruction set and pin out. The on-chip flash allows the program memory to be reprogrammed in-system or by a conventional non-volatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable flash on a monolithic chip, the Atmel AT89S51 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89S51 provides the following standard features: 4K bytes of Flash, 128 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, two 16-bit timer/counters, a five-vector twolevel interrupt architecture, a full duplex serial port, onchip oscillator, and clock circuitry. In addition, the AT89S51 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Powerdown mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next external interrupt or hardware reset. The datasheet for AT89S51 is also enclosed. The AT89S51 microcontroller is as shown in the Fig. 2. Figure 2. AT89S51 Microcontroller B. RFID Module RFID stands for Radio frequency identification. It is an automatic identification technology where digital data encoded in an RFID tag is read by the RFID reader. The RFID module is as shown in the Fig. 3. An RFID system consists of a reader device and a tag (transponder). A tag has a unique serial number which is identified by the reader. In this project, RFID has been interfaced with microcontroller to provide secured access. The relevant messages are also displayed on a 16x2 LCD. RFID Reader Module, are also called as interrogators. They convert radio waves returned from the RFID tag into a form that can be passed on to Controllers, which can make use of it. RFID tags and readers have to be tuned to the same frequency in order to communicate. RFID systems use many different frequencies. The tag contains an antenna connected to a small microchip. The reader functions similarly to a barcode scanner; however, while a barcode scanner uses a laser beam to scan the barcode, an RFID scanner uses electromagnetic waves. To transmit these waves, the reader uses an antenna that transmits a signal, communicating with the tags antenna. The tags antenna receives data from the reader and transmits its particular chip information to the reader. The data on the chip is usually stored in one of two types of memory. The most common is Read-Only Memory (ROM) as its name suggests, read-only memory cannot be altered once programmed onto the chip during the manufacturing process. The second type of memory is Read/Write Memory; though it is also programmed during the manufacturing process, it can later be altered by certain devices. Figure 3. RFID Module C. RFID Tags RFID tag, shown in the Fig. 4, is a small device which stores and sends data to RFID reader. They are categorized in two types –active tag and passive tag. Active tags are those which contain an internal battery and do not require power from the reader. Typically active tags have a longer distance range than passive tags. Passive tags are smaller and lighter in size than the active tags. They do not contain an internal battery and thus depend on RFID reader for operating power and certainly have a low range limited up to few meters. The RFID tag is used as an identity for a particular user. If the identity (serial number of the tag) of the user is matched with the one already stored in this system, he gets immediate access through it. This RFID based secured access system also has many additional features. For example, a new user can register himself with the system. A registered user can also withdraw his entry from the system. These features can be accessed by pressing a switch connected to the microcontroller. In beginning, the user is prompted to scan his tag or ID. The serial code of the tag is identified by the reader module and is sent to AT89S51 for checking. If the ID is matched by the microcontroller, the user gets the access. On the contrary, if the tag is not identified, the user will not be granted access. When an RFID tag comes in this range, the reader detects it and sends a unique code of the tag serially. This serial code, consisting of 12 bytes, is received by the microcontroller. This code is treated as an ID for the user and is stored as an array in the microcontroller. If the ID is matched with this code, the user is granted access though the system. The RFID system interfaced with microcontroller requires the controller to continuously scan the input from the RFID reader. When an RFID tag comes in this range, the reader detects it and sends a unique code of the tag serially. This serial code, consisting of 12 bytes, is received by the microcontroller. The baud rate is set to 9600bps for data transmission. The LCD is initialized to display the code. When a card/tag comes in the proximity of RFID reader, the microcontroller reads the code and sends it to the LCD module. The serial interrupt is triggered on every reception of one byte of data. Since the identification code of transponder consists of 12 bytes, the flag is also generated 12 times to indicate the byte wise transfer of data. Whenever the serial code is generated by the reader, the interrupt is activated and the data is sent to the receiver pin of microcontroller. Figure 4. RFID Tags D. Stepper Motor A stepper motor (or step motor) shown in the Fig. 5 is a brushless DC electric motor that divides a full rotation into a number of equal steps. The motor's position can then be commanded to move and hold at one of these steps without any feedback sensor (an open-loop controller), as long as the motor is carefully sized to the application. The use of stepper motor in this project is to mimic the locker operation. The operation can be explained as follows. DC brush motors rotate continuously when voltage is applied to their terminals. Stepper motors, on the other hand, effectively have multiple "toothed" electromagnets arranged around a central gear-shaped piece of iron. The electromagnets are energized by an external control circuit, such as a microcontroller. To make the motor shaft turn, first, one electromagnet is given power, which magnetically attracts the gear's teeth. When the gear's teeth are aligned to the first electromagnet, they are slightly offset from the next electromagnet. So when the next electromagnet is turned on and the first is turned off, the gear rotates slightly to align with the next one, and from there the process is repeated. Each of those rotations is called a "step", with an integer number of steps making a full rotation. In that way, the motor can be turned by a precise angle. Figure 5. Stepper Motor E. Liquid Crystal Display LCD (Liquid Crystal Display) screen shown in the Fig. 6 is an electronic module used in a wide range of applications. A 16x2 LCD is a very basic module and is very common in various devices and circuits. They are preferred over seven segment displays. There are many advantages when compared to seven segment displays. They are: LCDs can display characters, numbers and even graphics. There are refreshing controllers present inside the LCDs so 8051 need not refresh the displays. It is cost efficient and the current dissipation is low. A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In tis LCD, each character is displayed in 5x7 pixel matrix. This LCD has two registers namely command and data register. The command register stores the command instructions given to the LCD. A command is an instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting the cursor position, controlling display etc. The data register stores the data to be displayed on the LCD. The data is the ASCII value of the character to be displayed on the LCD. Figure 6. Liquid Crystal Display The command codes for Liquid Crystal Display are written in hexadecimal. The commonly used command codes are 0x38 – 2 lines 5X7 matrix 0x0F- display on, cursor blinking 0x81 – forces the cursor to line 1, position 2 0xC1 – forces the cursor to line 2, position 2 VI. ALGORITHM AND WORKING OF THE SYSTEM Step 1: Start Step 2: Wait until RFID card is detected. Step 3: Read card data and identify the customer. Step 4: Unlock the locker corresponding to the customer. Step 5: Wait until the customer locks the locker. Step 6: Repeat from step 2. VII. OUTPUTS OF THE PROJECT The various outputs are explained with pictures. When the ID is read by the reader, the message displayed is as shown in Fig. 8. Figure 8. Initial Message On LCD During this stage, the user places his/her unique RFID tag in front of the reader to read the data present. The next stage is as shown in the Fig. 9. Figure 7. Working Model Initially, when the connections are given and when the entire model is switched on, a message is displayed on the LCD “CUSTOMER ID:”. When the RFID tag is brought into the sensing area, the RFID reader reads the data (user ID) form the tag and displays the ID on the screen. The microcontroller AT89S51 process the data i.e. identifies whether it is user 1 or user 2 and allows access to the corresponding user. For example, if user 1 is granted access, then the stepper motor 1 will rotate in anticlockwise direction which indicates that locker 1 is opened and the user 1 can use it. The message displayed on the LCD is “LOCKER 1 OPENED”. As soon as the user has completed his work, he will press the switch 1. The control goes to the stepper motor 1 and it will rotate in the clockwise direction which indicates that the lock has been enabled. The corresponding message displayed is “LOCKER 1 CLOSED”. The control again to the beginning where the message will once again be displayed as “CUSTOMER ID:”. An important point to be noted is that at any instant during this process, if user 2 wishes to access the locker, he will be denied access. This process works in a similar way for user 2. If user 2 is granted access, then the stepper motor 2 will rotate in anticlockwise direction which indicates that locker 2 is opened and the user 2 can use it. The message displayed on the LCD is “LOCKER 2 OPENED”. As soon as the user has completed his work, he will press the switch 2. The control goes to the stepper motor 2 and it will rotate in the clockwise direction which indicates that the lock has been enabled. The corresponding message displayed is “LOCKER 2 CLOSED”. The control again to the beginning where the message will once again be displayed as “CUSTOMER ID:”. Figure 9. Access To User 1 As soon as the locker details are obtained, the locker gets opened i.e. the stepper motor rotates in the anticlockwise direction to indicate that the locker is opened. The status of the locker 1 is displayed for the project purpose as shown in the Fig. 10. Figure 10. Status Of Locker 1 The user can close the locker by pressing a switch which is provided this project. When the switch is pressed, the stepper motor rotates in the clockwise direction to indicate that the locker is closed. The status of the locker will be as shown in the Fig. 10. In a similar way, the locker 2 messages will be displayed. This project can be extended to n users and real time issues can be met. Hence, if RFID based bank locker system is implemented in banks or other security systems, thefts can be greatly reduced which is a major issue. Moreover, customer’s waiting time can be greatly reduced and security can also be guaranteed. VIII. CONCLUSION This project is mainly aimed at reducing banker’s workload. Time is considerably saved by this RFID based automated bank locker system as there is no need for any authentication by the bank employee. In the current existing locker system, there is no separate banker to take care and attend to people wishing to access lockers. Every time a customer wishes to access his locker, he must wait until a banker becomes free so that he can authenticate access to the locker. As this project is implemented using software tools Keil µVision, the outputs can be easily checked before they are embedded on the hardware. This project has the outputs can be easily checked before they are embedded on the hardware. This project has the potential to greatly reduce the manpower required during the access of bank lockers by the customers and also greatly saves time for both the banker and the customer. This project can be extended for more number of customers and banks by using RFID cards with identification numbers of more length. ACKNOWLEDGEMENT I would like to express my sincere gratitude and profound thanks to Dr.R.Rudramoorthy, Principal, PSG College of Technology for his inevitable encouragement and support, Dr.S.Subha Rani, Professor and Head, Department of Electronics and Communication Engineering, my faculty guide, Dr.K.V.Anusuya, Assistant Professor, Department of Electronics and Communication Engineering. REFERENCES [1] [2] [3] [4] [5] Raj Kamal, Embedded Systems: Architecture, Programming And Design, 2008 edition, published by McGraw Hill Education Private Limited. Mazidi Muhammed Ali, The 8051 Microcontroller And Embedded Systems Using Assembly And C, second edition, published by Pearson education. Kenneth J. Ayala, The 8051 Microcontroller, 2004 edition. Deepak Gupta EM Magazine, RFID Interface To 8051. V. Daniel Hunt, Albert Puglia, Mike Puglia, RFID – A Guide To Radio Frequency Identification, 2007 edition, published by A John Wiley and Sons, Inc., Publications.
© Copyright 2025 Paperzz