Presentation is loading. Please wait.

Presentation is loading. Please wait.

RFID Security System Problem Impact Approach Diagram

Similar presentations


Presentation on theme: "RFID Security System Problem Impact Approach Diagram"— Presentation transcript:

1 RFID Security System Problem Impact Approach Diagram
A security profile can be programmed based on the day time and gate location. Immediate notification (by /cell phone) of the time, day and an image upon intrusion. Password protected server logs can be accessed remotely. Various security systems for homes/small businesses exist that can record video and sound an alarm but are expensive and difficult to upgrade to other security devices. Security devices are limited by the level of integration, power outlets and wire length. Approach Diagram Thesis: Having a central security system with multiple remote subsystems at all of the entry/exit gates can keep effective track of normal traffic flow and intrusion attempts. Approach: A “master” system that can control access to “slave” remote locations in different buildings, record all entry/exit transactions into the building and immediately report the intrusion to the owner. How: An internet server will act as the “master” controller and will contain a database of key information of valid users. The “slave” units will contain a MCU/FPGA integrated with a RFID reader, LCD display, keypad, digital camera, wireless antenna and optionally, a biometric ID instrument. Master Server Slave Remote System Wireless LCD Display MCU/FPGA Camera RFID Card Reader Keypad Biometric ID 2/22/2019 Abhi Joshi


Download ppt "RFID Security System Problem Impact Approach Diagram"

Similar presentations


Ads by Google