+ All Categories
Home > Documents > CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages....

CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages....

Date post: 14-Dec-2015
Category:
Upload: cecilia-burns
View: 217 times
Download: 0 times
Share this document with a friend
Popular Tags:
13
Transcript
Page 1: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Page 2: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

CONTENTS:

1.Abstract.

2.Objective.

3.Block diagram.

4.Methodology.

5.Advantages and Disadvantages.

6.Applications.

7.Conclusion.

Page 3: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

1.ABSTRACT:This project proposes RedTacton based smart security card for

ATM system. RedTacton is a Human Area Networking technology that

uses human body as a safe high speed network transmission path.

RedTacton uses minute electric field on the surface of the human body as a

medium for transmitting the data. A transmission path is formed at the

moment a part of human body comes in contact with RedTacton

transceiver. RedTacton transmitter consists of a DTMF encoder which

generates both valid and invalid signals and can be transmitted through

human body to RedTacton receiver (DTMF receiver) for further

processing. In order to enhance the security for ATM cards, RedTacton

based smart security card is presented.

Page 4: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

2.OBJECTIVE:

The objective of this project is to give a better security system to

transmit a data via body. Since there is no problem of hackers as our

body itself acts as transmission medium and can be used more in the

fields where there is a need to upgrade the security in times of high theft

rate

Page 5: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

WORKING PROCEDURE:Transmitter sends data

Transmitting transceiver

creates a change in the field

Field from human body

dissipates into earth

Electric field is received

using sensing technology

Receiving transceiver

recognizes the change in the electric field

Sensing technology measures the weak electric fields induced.

Electro-optical crystal uses laser to convert and read the signal

Page 6: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

3.BLOCK DIAGRAM:

BLOCK DIAGRAM

VISUAL INDICATION

BUZZER

OUTPUT DEVICES

VOICE CHIP

HARDWARE REQUIREMENTS: MSP 430, LCD, Relay Driver, Relays, Resistors, Capacitors, LEDs, Crystal, Diodes, Transformer, Voltage Regul ator, Push Button.

SOFTWARE REQUIREMENTS: Keil compiler uVision 4, Language: Embedded C or Assembly, WLPRO Programmer

230 V, AC Supply

TRANSFORMER RECTIFIER FILTER REGULATOR

+12 Volts

+5 Volts

BUFFER DRIVER RELAY

LCD DISPLAY

MSP430

CODE GENERATOR (ENCODER)

TOUCH PLATE

TOUCH PLATE

DECODER

TOUCH PLATE

TOUCH PLATE

4 X 4 KEYPAD INTERFACE

Page 7: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

4.METHODOLOGY:This module consists of RedTacton transmitter, RedTacton

receiver, Driver, ARM controller unit and the Voice bank. RedTacton is a

HAN; body of human being is used for transmission of signals. RedTacton

transmitter consists of a DTMF encoder which generates both valid and

Invalid signals and can be transmitted through human body through the

RedTacton receiver (DTMF decoder) for further processing. [4] In

RedTacton receiver by the use of DTMF decoder the transmitted signal is

identified.

As the transmitted signal is of very low voltage, buffers and

drivers are used to send the received signal to the electromagnetic switch.

Electromagnetic switch checks the received signal with the predefined

valid code.

Page 8: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

If an invalid code is received and detected in the switch then the

buzzer starts ringing indicating that an invalid card is trying to access the

ATM. If a valid code is received, then only the switch sends the signal to

the main control unit which is the microcontroller. If ARM controller gets

active it switches on the keyboard where predefined options are stored to

perform various tasks such as: Enter password, Change of password, New

password, etc. After entering the valid password the voice bank gets

activated. In voice bank predefined options with keys are present which

guides the user to select appropriate action in the ATM such as: Cash

withdrawal, Pin change, Account balance, etc…

Page 9: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

5.ADVANTAGES AND DISADVANTAGES:ADVANTAGES:

RedTacton does not require the electrode to be in direct contact with

the skin.

Can transmit data at a rate higher than that of peer technologies. (max.

of 10Mbps) and Security is more.

RedTacton transceivers are programmable and we can decide what to

share with whom and what devices you communicate with.

Each communication occurs in separate channels.

Transmission speed does not deteriorate even though the number of

users increases. And More secure than Bluetooth.

Data loss during transfer is less

Use of minimum amount of power (of some milli -volt range)

Superior than infrared technology & Wi-Fi

Page 10: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

No problem of hackers. It is very hard to pick up stray electronic signals

radiating from the body.

DISADVANTAGES:

The obvious barrier to entry is that the cost and time to develop HAN

TECH. is very expensive.

 As a new technology HAN need to gain popularity among users to help

pull the technology into the marketplace instead of having it pushed upon

them. 

 Widespread marketing campaigns will need to be developed to

highlight the benefits of HAN technology to facilitate its adoption. 

Not useful unless many people adopt it..

It can be useful within few centimeters only.

Page 11: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

6.APPLICATIONS:

Automobile Applications

Conference Systems

Touch Advertising

Wireless Headset

This project can be used in

Military, Medical and

Consumer applications.

Page 12: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

7.CONCLUSION:

The proposed RedTacton based smart security card system for

ATM has been implemented successfully and is tested on hardware.

Experimental results verify the effective developed operation. When we

compare RedTacton with other technologies, it can give a better security

since there is no problem of hackers as our body itself acts as transmission

medium and can be used more in the fields where there is a need to

upgrade the security in times of high theft rate.

Page 13: CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.

Recommended