Ibutton Security System

Topics: Rectifier, Access control, Microcontroller Pages: 2 (361 words) Published: January 19, 2013

Title of the project I-BUTTON ACCESS CONTROL SECURITY SYSTEM Domain: Advanced Embedded Systems Design
Software: Embedded C, Keil, Proload
Microcontroller: AT89S52
Power Supply: +5V, 750mA Regulated Power Supply
Display: LED 5mm, 16 X 2 LCD
Crystal: 11.0592MHz
Data Communication: Through Serial Communication
Applications: Colleges, Companies, Banks, Industries etc

The iButton is a computer chip enclosed in a 16mm thick stainless steel can. Because of this unique and durable container, up-to-date information can travel with a person or object anywhere they go. The steel iButton can be mounted virtually anywhere because it is rugged enough to withstand harsh environments, indoors or outdoors. It is small and portable enough to attach to a key fob, ring, watch, or other personal items, and be used daily for applications such as access control to buildings and computers, asset management, and various data logging tasks. By simply touching the iButton to the two contacts described above, you can communicate with it through our 1-Wire protocol. The 1-Wire interface has two communication speeds: standard mode at 16kbps, and overdrive mode at 142kbps. For more information, please see our application note, Reading and Writing 1-Wire® Devices through Serial Interfaces. In this project, the iButton can is interfaced with the micro controller and when the iButton is brought to the sight of the can, it reads the data on the iButton and displays on the LCD. If the data of the iButton is matched with the data in the program memory then it compares and displays authorized message. If the data is not matched it displays unauthorized. For authorized message, the door gets opened and the person gets in after sometime the door gets closed (A relay will be energized). If it is an unauthorized person it alerts the persons through a buzzer. This project uses regulated 5v, 500mA power supply. 7805, a...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • The National Terrorism Advisory System Essay
  • The Regional Security System in the Twenty-Second Century Essay
  • Rfid Based Security System Essay
  • Essay about System Security
  • device security system Essay
  • Essay on House Security System
  • Network Security Protocol with Rfid System Essay
  • proposal home security system Essay

Become a StudyMode Member

Sign Up - It's Free