Preview

Zigbee Based Trolley Cart Access System Using Rfid for Shopping Trolley

Good Essays
Open Document
Open Document
569 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Zigbee Based Trolley Cart Access System Using Rfid for Shopping Trolley
Electronic code lock with user defined password using 8051 microcontroller (AT89C51)

Summary
An electronic lock or digital lock is a device which has an electronic control assembly attached to it. They are provided with an access control system. This system allows the user to unlock the device with a password. The password is entered by making use of a keypad. The user can also set his password to ensure better protection. The major components include akeypad, LCD and the controller AT89C51 which belongs to the 8051 series of microcontrollers. This article describes the making of an electronic code lock using the 8051 microcontroller.
Description
A 4x3 matrix keypad and a 16x2 LCD have been used here. Keypad and LCD are very commonly used input & output devices, respectively. A four digit predefined password needs to be specified the user. This password is stored in the system.
While unlocking, if the entered password from keypad matches with the stored password, then the lock opens and a message is displayed on LCD. Also an output pin is made high to be used for further purpose.
The connections in the circuit are as following: port P2 of microcontroller AT89C51 is used as data input port which is connected to data pins (7-14) of LCD. P1^0, P1^1 and P1^2 pins of microcontroller are connected to control pins RS, RW and EN of LCD. Port P0 is used to take input from keypad. P0^7 has been used as lock output pin of controller. As the program starts, string ‘Enter Password’ is displayed on LCD. The keypad is scanned for pressed digits one by one. Every time, row and column of the key pressed is detected and a ‘*’ is displayed on LCD corresponding to the entered number. After the four digits are entered, the user is prompted to ‘Confirm Password’ and again the input is taken through LCD. If the passwords do not match, a message is displayed to indicate ‘Wrong Password’; otherwise the user is prompted to unlock the device. To unlock, user needs to

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Each workstation will be set up to automatically lock the screen after 3 minutes of no use. Employees will be trained on how to keep their workstations and network credentials secure. Under no circumstances are employees to use flash drives or any type of external…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Simplicity of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the user domain, one of the easiest ways for the system to be compromised is through the users. Easiness of user’s passwords can be a major problem so we need to implement complex passwords including eight or more characters, both upper and lower case, and use of at least one special character. Passwords will need to be changed every three months and the same password cannot be used again for one calendar year.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Authentication: The key badge given to each employee will be used to allow access and authenticate that employee. An initial temporary password will be applied to each employee logon information and require the employee to change the password on first login. The policy will be set up to ensure that the employees create strong passwords and are required to change their passwords every 60 to 90 days. Employees at higher levels who have access to sensitive information may also be required to use two-factor authentication such as fingerprint biometric access to get into rooms and buildings and/or simply login to their computer system. PIN numbers will be used to access server rooms. Token will be issued to provide access remotely to allow for secure logins.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Bananas

    • 344 Words
    • 2 Pages

    2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area.…

    • 344 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Automated Locks: ¿Forgot to lock your door? No problem. Just by touching an icon on your smartphone’s screen, you can make sure all your doors are properly locked… and you can do it from anywhere in the world. Moreover, crooks won’t be able to open your door by using a credit card.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    There are some software’s that you cannot trust with a security computer systems software and hardware. Which different types of computer systems that can resulted in many possibility and use it very limited. Because ones approached with computer systems can always lead them to failure. Computer designing which often has hardware techniques are used to effective the security after they are design. The approach of the techniques and using the techniques security systems is having the effective of the design in the computer systems. The technique is to enforce the computer design principle and provide them with the function they need to attack and gain access to the program then need.…

    • 1224 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Input Controls

    • 1669 Words
    • 7 Pages

    Text type input controls are used to input text. They provide a single-line input field in which any text can be entered. The text type input controls are useful for form data such as names, street addresses, and user names. This data is viewable on the screen, so it ought to not be used for passwords.…

    • 1669 Words
    • 7 Pages
    Better Essays
  • Good Essays

    The encryption is a mathematically derived combination of your passcode and a unique set of secret numbers baked into your device.…

    • 753 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Academia Keepers

    • 2073 Words
    • 9 Pages

    The visitor signs the electronic signature pad. A badge or label is printed out with visitor's name, photo, destination and badge number. The visitor can now pass their badge or fingerprint through a reader when entering and departing. The visitor's photo pops up on the monitor positively identifying the visitor. The date/time and gate number is recorded into the database when the identification card is passed through the card reader. Pre-authorized visits can be recorded into the Appointment book from the authorization person's office. This has the added benefit of faster sign-in with minimum data…

    • 2073 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Storm pulled the oversize sports bag off the back seat, unzipped it and took out the two backpacks stuffed inside. He swung the straps of the three bags over his shoulder and set off up the path to the surgery entrance. At the top of the steps, he tapped the five digits into the security control keypad. The was a metallic click from the lock mechanism, the lights flashed to verify the sequence was correct, and he turned the key.…

    • 1455 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Smart Phone

    • 2740 Words
    • 11 Pages

    --->As with every computer, a good password alone is not enough to protect us. If our phone does get lost or stolen there is a line of software that will help you recover it, or wipe the data if you are unable to do so. The first step is a piece of software that will lock your phone down. This software will turn off the phone's screen and disable it, preventing an attacker from being able to easily access your…

    • 2740 Words
    • 11 Pages
    Powerful Essays