Kamis, 08 Februari 2018

Electronic lock and locking transponder electronics up grading on ELECTRONIC LOCKING SYSTEMS AMNIMARJESLOW GOVERNMENT 91220017 LJBUSAF XI XA PIN PING HUNG CHOP 2003+2005+2010 x 2+2020 ELECTRONIC LOOP SYSTEM INTERLOCKING

                                                            ^_^  ^_^  ^_^  ^_^

a key is often made for someone's privacy both for the living room and study room as well as the sex room ^ _ ^ also the main money-box when we need the key of course we need the tools and materials to open it in manual locks that are moved by the human hand can be made key by the result mechanical machine wipes between the key and lock containers; in key electronics is considered as a key to the memory of electronic circuit components, the key to memory can be represented using electronic components called transistors, diodes, and ICs of both linear ICs, timer ICs and digital ICs; component component electronics process above that is the component that replaces the gear gear manual on the mechanical lock that is between the mechanical container and the mechanical opening key. in the electronics locking system a lot of instrumentation and control tools that can be made as electronic locks, electronic key locks are arranged either using an input transducer (sensor) that produces an efficient and effective transducer output (actuator) while the process of connecting the key (sensor) and the key container (actuator) is called an efficient and effective process component; the process component may use semi-conductor electronic means and materials; optical fiber optic apparatus and materials; magnetic electronic appliance and materials; tools and electronic materials pneumatic controller; appliance and electronic material of super conductor; electron mechanical tools and materials; and transponder electronic devices and materials while the memory and key genetic codes can use many analog and digital coding techniques and dynamic controls and other triggering triggering techniques that may one day be described in my book {GO LOOK IMPORTANTBOOK}
                           

                              Electronic lock 


                                                 Slam lockLocked by pressing the locking button on the transponder unitCan learn up to 20 transpondersSimple programming without additional softwareSet contains Optical Indicator, Programming Stick and Striker Transponder sold separately        




An electronic lock (or electric lock) is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and unlock. 

                                                        File:Electronic lock yl88 operation.ogv 
                                             A quick demonstration of an electronic door lock 

Operation

Electric locks use magnets, solenoids, or motors to actuate the lock by either supplying or removing power. Operating the lock can be as simple as using a switch, for example an apartment intercom door release, or as complex as a bio metric based access control system.
There are two basic types of locks: "preventing mechanism" or operation mechanism . 

Types 

Electromagnetic lock 


 A deadbolt electronic lock mounted in a home safe
The most basic type of electronic lock is a magnetic lock (informally called a "mag lock"). A large electro-magnet is mounted on the door frame and a corresponding armature is mounted on the door. When the magnet is powered and the door is closed, the armature is held fast to the magnet. Mag locks are simple to install and are very attack-resistant. One drawback is that improperly installed or maintained mag locks can fall on people, and also that one must unlock the mag lock to both enter and to leave. This has caused fire marshals to impose strict rules on the use of mag locks and access control practice in general. Additionally, NFPA 101 (Standard for Life Safety and Security), as well as the ADA (Americans with Disability Act) require "no prior knowledge" and "one simple movement" to allow "free egress". This means that in an emergency, a person must be able to move to a door and immediately exit with one motion (requiring no push buttons, having another person unlock the door, reading a sign, or "special knowledge").
Other problems include a lag time (delay), because the collapsing magnetic field holding the door shut does not release instantaneously. This lag time can cause a user to collide with the still-locked door. Finally, mag locks fail unlocked, in other words, if electrical power is removed they unlock. This could be a problem where security is a primary concern. Additionally, power outages could affect mag locks installed on fire listed doors, which are required to remain latched at all times except when personnel are passing through. Most mag lock designs would not meet current fire codes as the primary means of securing a fire listed door to a frame. Because of this, many commercial doors (this typically does not apply to private residences) are moving over to stand-alone locks, or electric locks installed under a Certified Personnel Program.
The first mechanical recodable card lock was invented in 1976 by Tor Sørnes, who had worked for VingCard since the 1950s. The first card lock order was shipped in 1979 to Westin Peachtree Plaza Hotel, Atlanta, US. This product triggered the evolution of electronic locks for the hospitality industry.

Electronic strikes

Electric strikes (also called electric latch release) replace a standard strike mounted on the door frame and receive the latch and latch bolt. Electric strikes can be simplest to install when they are designed for one-for-one drop-in replacement of a standard strike, but some electric strike designs require that the door frame be heavily modified. Installation of a strike into a fire listed door (for open backed strikes on pairs of doors) or the frame must be done under listing agency authority, if any modifications to the frame are required (mostly for commercial doors and frames). In the US, since there is no current Certified Personnel Program to allow field installation of electric strikes into fire listed door openings, listing agency field evaluations would most likely require the door and frame to be de-listed and replaced.
Electric strikes can allow mechanical free egress: a departing person operates the lockset in the door, not the electric strike in the door frame. Electric strikes can also be either "fail unlocked" (except in Fire Listed Doors, as they must remain latched when power is not present), or the more-secure "fail locked" design. Electric strikes are easier to attack than a mag lock. It is simple to lever the door open at the strike, as often there is an increased gap between the strike and the door latch. Latch guard plates are often used to cover this gap.

Electronic deadbolts and latches

Electric mortise and cylindrical locks are drop-in replacements for door-mounted mechanical locks. An additional hole must be drilled in the door for electric power wires. Also, a power transfer hinge is often used to get the power from the door frame to the door. Electric mortise and cylindrical locks allow mechanical free egress, and can be either fail unlocked or fail locked. In the US, UL rated doors must retain their rating: in new construction doors are cored and then rated. but in retrofits, the doors must be re-rated.
Electrified exit hardware, sometimes called "panic hardware" or "crash bars", are used in fire exit applications. A person wishing to exit pushes against the bar to open the door, making it the easiest of mechanically-free exit methods. Electrified exit hardware can be either fail unlocked or fail locked. A drawback of electrified exit hardware is their complexity, which requires skill to install and maintenance to assure proper function. Only hardware labeled "Fire Exit Hardware" can be installed on fire listed doors and frames and must meet both panic exit listing standards and fire listing standards.
Motor-operated locks are used throughout Europe. A European motor-operated lock has two modes, day mode where only the latch is electrically operated, and night mode where the more secure deadbolt is electrically operated.
In South Korea, most homes and apartments have installed electronic locks, which are currently replacing the lock systems in older homes. South Korea mainly uses a lock system by Gateman.

Authentication methods

Simple PIN electronic lock securing an elevator
A bio metric electronic lock with PIN entry
A feature of electronic locks is that the locks can deactivated or opened by authentication, without the use of a traditional physical key:

Numerical codes, passwords, and passphrases

Perhaps the most common form of electronic lock uses a keypad to enter a numerical code or password for authentication. Such locks typically provide, and some feature an audible response to each press. Combination lengths are usually between 4 and 6 digits long.

Security tokens

Another means of authenticating users is to require them to scan or "swipe" a security token such as a smart card or similar, or to interact a token with the lock. For example, some locks can access stored credentials on a personal digital assistant (PDA) or smartphone, by using infraredBluetooth, or NFC data transfer methods.

Biometrics

As biometrics become more and more prominent as a recognized means of positive identification, their use in security systems increases. Some electronic locks take advantage of technologies such as fingerprint scanning, retinal scanning, iris scanning and voice print identification to authenticate users.

RFID

Radio-frequency identification (RFID) is the use of an object (typically referred to as an "RFID tag") applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. This technology is also used in some modern electronic locks.





                                       XXX  .  XXX   Access control 


In the fields of physical security and information securityaccess control (AC) is the selective restriction of access to a place or other resource. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.
Locks and login credentials are two analogous mechanisms of access control. 
  A sailor allows a driver to enter a military installation. 

Physical security 

Drop Arm Optical Turnstiles Manufactured by Q-Lane Turnstiles LLc
Underground entrance to the New York City Subway system
Physical security access control with a hand geometry scanner
Example of fob based access control using an ACT reader
Geographical access control may be enforced by personnel (e.g., border guardbouncerticket checker), or with a device such as a turnstile. There may be fences to avoid circumventing this access control. An alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country.
The term access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons. Physical access control can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap. Within these environments, physical key management may also be employed as a means of further managing and monitoring access to mechanically keyed areas or access to certain small assets.
Physical access control is a matter of who, where, and when. An access control system determines who is allowed to enter or exit, where they are allowed to exit or enter, and when they are allowed to enter or exit. Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.
Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked.

Access control system operation

When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked. If there is a match between the credential and the access control list, the control panel operates a relay that in turn unlocks the door. The control panel also ignores a door open signal to prevent an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.
The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a bio metric input.
There are three types (factors) of authenticating information:
  • something the user knows, e.g. a password, pass-phrase or PIN
  • something the user has, such as smart card or a key fob
  • something the user is, such as fingerprint, verified by bio metric measurement
Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios. For example, a user may have their password, but have forgotten their smart card. In such a scenario, if the user is known to designated cohorts, the cohorts may provide their smart card and password, in combination with the extant factor of the user in question, and thus provide two factors for the user with the missing credential, giving three factors overall to allow access.

Credential

A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a bio metric feature), or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
There are many card technologies including magnetic stripe, bar code, Wiegand, 125 kHz proximity, 26-bit card-swipe, contact smart cards, and contact less smart cards. Also available are key-fobs, which are more compact than ID cards, and attach to a key ring. Bio metric technologies include fingerprint, facial recognition, iris recognition, retinal scan, voice, and hand geometry. The built-in bio metric technologies found on newer smartphones can also be used as credentials in conjunction with access software running on mobile devices.[4] In addition to older more traditional card access technologies, newer technologies such as Near field communication (NFC) and Bluetooth low energy also have potential to communicate user credentials to readers for system or building access.

Access control system components

Various control system components
An access control point can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a bio metric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list. To monitor the door position a magnetic door switch can be used. In concept, the door switch is not unlike those on refrigerators or car doors. Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the door.

Access control topology

Typical access control door wiring
Access control door wiring when using intelligent readers
Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks.

Types of readers

Access control readers may be classified by the functions they are able to perform:
  • Basic (non-intelligent) readers: simply read card number or PIN, and forward it to a control panel. In case of biometric identification, such readers output the ID number of a user. Typically, Wiegand protocol is used for transmitting data to the control panel, but other options such as RS-232, RS-485 and Clock/Data are not uncommon. This is the most popular type of access control readers. Examples of such readers are RF Tiny by RFLOGICS, ProxPoint by HID, and P300 by Farpointe Data.
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus. Examples of such readers are InfoProx Lite IPL200 by CEM Systems, and AP-510 by Apollo.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers. Examples of such readers could be InfoProx IPO200 by CEM Systems, and AP-500 by Apollo. There is also a new generation of intelligent readers referred to as "IP readers". Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host.
Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support.
Access control readers may also be classified by their type of identification technology.

Access control system topologies

Access control system using serial controllers
1. Serial controllers. Controllers are connected to a host PC via a serial RS-485 communication line (or via 20mA current loop in some older systems). External RS-232/485 converters or internal RS-485 cards have to be installed, as standard PCs do not have RS-485 communication ports.
Advantages:
  • RS-485 standard allows long cable runs, up to 4000 feet (1200 m)
  • Relatively short response time. The maximum number of devices on an RS-485 line is limited to 32, which means that the host can frequently request status updates from each device, and display events almost in real time.
  • High reliability and security as the communication line is not shared with any other systems.
Disadvantages:
  • RS-485 does not allow Star-type wiring unless splitters are used
  • RS-485 is not well suited for transferring large amounts of data (i.e. configuration and users). The highest possible throughput is 115.2 kbit/sec, but in most system it is downgraded to 56.2 kbit/sec, or less, to increase reliability.
  • RS-485 does not allow the host PC to communicate with several controllers connected to the same port simultaneously. Therefore, in large systems, transfers of configuration, and users to controllers may take a very long time, interfering with normal operations.
  • Controllers cannot initiate communication in case of an alarm. The host PC acts as a master on the RS-485 communication line, and controllers have to wait until they are polled.
  • Special serial switches are required, in order to build a redundant host PC setup.
  • Separate RS-485 lines have to be installed, instead of using an already existing network infrastructure.
  • Cable that meets RS-485 standards is significantly more expensive than regular Category 5 UTP network cable.
  • Operation of the system is highly dependent on the host PC. In the case that the host PC fails, events from controllers are not retrieved, and functions that require interaction between controllers (i.e. anti-passback) stop working.
Access control system using serial main and sub-controllers
2. Serial main and sub-controllers. All door hardware is connected to sub-controllers (a.k.a. door controllers or door interfaces). Sub-controllers usually do not make access decisions, and instead forward all requests to the main controllers. Main controllers usually support from 16 to 32 sub-controllers.
Advantages:
  • Work load on the host PC is significantly reduced, because it only needs to communicate with a few main controllers.
  • The overall cost of the system is lower, as sub-controllers are usually simple and inexpensive devices.
  • All other advantages listed in the first paragraph apply.
Disadvantages:
  • Operation of the system is highly dependent on main controllers. In case one of the main controllers fails, events from its sub-controllers are not retrieved, and functions that require interaction between sub-controllers (i.e. anti-passback) stop working.
  • Some models of sub-controllers (usually lower cost) do not have the memory or processing power to make access decisions independently. If the main controller fails, sub-controllers change to degraded mode in which doors are either completely locked or unlocked, and no events are recorded. Such sub-controllers should be avoided, or used only in areas that do not require high security.
  • Main controllers tend to be expensive, therefore such a topology is not very well suited for systems with multiple remote locations that have only a few doors.
  • All other RS-485-related disadvantages listed in the first paragraph apply.
Access control system using serial main controller and intelligent readers
3. Serial main controllers & intelligent readers. All door hardware is connected directly to intelligent or semi-intelligent readers. Readers usually do not make access decisions, and forward all requests to the main controller. Only if the connection to the main controller is unavailable, will the readers use their internal database to make access decisions and record events. Semi-intelligent reader that have no database and cannot function without the main controller should be used only in areas that do not require high security. Main controllers usually support from 16 to 64 readers. All advantages and disadvantages are the same as the ones listed in the second paragraph.
Access control systems using serial controllers and terminal servers
4. Serial controllers with terminal servers. In spite of the rapid development and increasing use of computer networks, access control manufacturers remained conservative, and did not rush to introduce network-enabled products. When pressed for solutions with network connectivity, many chose the option requiring less efforts: addition of a terminal server, a device that converts serial data for transmission via LAN or WAN.
Advantages:
  • Allows utilizing the existing network infrastructure for connecting separate segments of the system.
  • Provides a convenient solution in cases when the installation of an RS-485 line would be difficult or impossible.
Disadvantages:
  • Increases complexity of the system.
  • Creates additional work for installers: usually terminal servers have to be configured independently, and not through the interface of the access control software.
  • Serial communication link between the controller and the terminal server acts as a bottleneck: even though the data between the host PC and the terminal server travels at the 10/100/ 1000Mbit /sec network speed, it must slow down to the serial speed of 112.5 kbit/sec or less. There are also additional delays introduced in the process of conversion between serial and network data.
All the RS-485-related advantages and disadvantages also apply.
Access control system using network-enabled main controllers
5. Network-enabled main controllers. The topology is nearly the same as described in the second and third paragraphs. The same advantages and disadvantages apply, but the on-board network interface offers a couple of valuable improvements. Transmission of configuration and user data to the main controllers is faster, and may be done in parallel. This makes the system more responsive, and does not interrupt normal operations. No special hardware is required in order to achieve redundant host PC setup: in the case that the primary host PC fails, the secondary host PC may start polling network controllers. The disadvantages introduced by terminal servers (listed in the fourth paragraph) are also eliminated.
Access control system using IP controllers
6. IP controllers. Controllers are connected to a host PC via Ethernet LAN or WAN.
Advantages:
  • An existing network infrastructure is fully utilized, and there is no need to install new communication lines.
  • There are no limitations regarding the number of controllers (as the 32 per line in cases of RS-485).
  • Special RS-485 installation, termination, grounding and troubleshooting knowledge is not required.
  • Communication with the controllers may be done at the full network speed, which is important if transferring a lot of data (databases with thousands of users, possibly including bio metric records).
  • In case of an alarm, controllers may initiate connection to the host PC. This ability is important in large systems, because it serves to reduce network traffic caused by unnecessary polling.
  • Simplifies installation of systems consisting of multiple sites that are separated by large distances. A basic Internet link is sufficient to establish connections to the remote locations.
  • Wide selection of standard network equipment is available to provide connectivity in various situations (fiber, wireless, VPN, dual path, PoE)
Disadvantages:
  • The system becomes susceptible to network related problems, such as delays in case of heavy traffic and network equipment failures.
  • Access controllers and workstations may become accessible to hackers if the network of the organization is not well protected. This threat may be eliminated by physically separating the access control network from the network of the organization. Also it should be noted that most IP controllers utilize either Linux platform or proprietary operating systems, which makes them more difficult to hack. Industry standard data encryption is also used.
  • Maximum distance from a hub or a switch to the controller (if using a copper cable) is 100 meters (330 ft).
  • Operation of the system is dependent on the host PC. In case the host PC fails, events from controllers are not retrieved and functions that require interaction between controllers (i.e. anti-passback) stop working. Some controllers, however, have a peer-to-peer communication option in order to reduce dependency on the host PC.
Access control system using IP readers
7. IP readers. Readers are connected to a host PC via Ethernet LAN or WAN.
Advantages:
  • Most IP readers are PoE capable. This feature makes it very easy to provide battery backed power to the entire system, including the locks and various types of detectors (if used).
  • IP readers eliminate the need for controller enclosures.
  • There is no wasted capacity when using IP readers (e.g. a 4-door controller would have 25% of unused capacity if it was controlling only 3 doors).
  • IP reader systems scale easily: there is no need to install new main or sub-controllers.
  • Failure of one IP reader does not affect any other readers in the system.
Disadvantages:
  • In order to be used in high-security areas, IP readers require special input/output modules to eliminate the possibility of intrusion by accessing lock and/or exit button wiring. Not all IP reader manufacturers have such modules available.
  • Being more sophisticated than basic readers, IP readers are also more expensive and sensitive, therefore they should not be installed outdoors in areas with harsh weather conditions, or high probability of vandalism, unless specifically designed for exterior installation. A few manufacturers make such models.
The advantages and disadvantages of IP controllers apply to the IP readers as well.

Security risks

Access control door wiring when using intelligent readers and IO module
The most common security risk of intrusion through an access control system is by simply following a legitimate user through a door, and this is referred to as tailgating. Often the legitimate user will hold the door for the intruder. This risk can be minimized through security awareness training of the user population, or more active means such as turnstiles. In very high security applications this risk is minimized by using a sally port, sometimes called a security vestibule or mantrap, where operator intervention is required presumably to assure valid identification.
The second most common risk is from levering a door open. This is relatively difficult on properly secured doors with strikes or high holding force magnetic locks. Fully implemented access control systems include forced door monitoring alarms. These vary in effectiveness, usually failing from high false positive alarms, poor database configuration, or lack of active intrusion monitoring. Most newer access control systems incorporate some type of door prop alarm to inform system administrators of a door left open longer than a specified length of time.
The third most common security risk is natural disasters. In order to mitigate risk from natural disasters, the structure of the building, down to the quality of the network and computer equipment vital. From an organizational perspective, the leadership will need to adopt and implement an All Hazards Plan, or Incident Response Plan. The highlights of any incident plan determined by the National Incident Management System must include pre-incident planning, during incident actions, disaster recovery, and after action review.
Similar to levering is crashing through cheap partition walls. In shared tenant spaces the divisional wall is a vulnerability. A vulnerability along the same lines is the breaking of sidelights.
Spoofing locking hardware is fairly simple and more elegant than levering. A strong magnet can operate the solenoid controlling bolts in electric locking hardware. Motor locks, more prevalent in Europe than in the US, are also susceptible to this attack using a doughnut shaped magnet. It is also possible to manipulate the power to the lock either by removing or adding current, although most Access Control systems incorporate battery back-up systems and the locks are almost always located on the secure side of the door.
Access cards themselves have proven vulnerable to sophisticated attacks. Enterprising hackers have built portable readers that capture the card number from a user’s proximity card. The hacker simply walks by the user, reads the card, and then presents the number to a reader securing the door. This is possible because card numbers are sent in the clear, no encryption being used. To counter this, dual authentication methods, such as a card plus a PIN should always be used.
Many access control credentials unique serial numbers are programmed in sequential order during manufacturing. Known as a sequential attack, if an intruder has a credential once used in the system they can simply increment or decrement the serial number until they find a credential that is currently authorized in the system. Ordering credentials with random unique serial numbers is recommended to counter this threat.
Finally, most electric locking hardware still have mechanical keys as a fail-over. Mechanical key locks are vulnerable to bumping.

The need-to-know principle

The need to know principle can be enforced with user access controls and authorization procedures and its objective is to ensure that only authorized individuals gain access to information or systems necessary to undertake their duties.

Computer security

In computer security, general access control includes authenticationauthorization, and audit. A more narrow definition of access control would cover only access approval, whereby the system makes a decision to grant or reject an access request from an already authenticated subject, based on what the subject is authorized to access. Authentication and access control are often combined into a single operation, so that access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, bio metric scans, physical keys, electronic keys and devices, hidden paths, social barriers, and monitoring by humans and automated systems.
In any access-control model, the entities that can perform actions on the system are called subjects, and the entities representing resources to which access may need to be controlled are called objects ( Access Control Matrix). Subjects and objects should both be considered as software entities, rather than as human users: any human users can only have an effect on the system via the software entities that they control.
Although some systems equate subjects with user IDs, so that all processes started by a user by default have the same authority, this level of control is not fine-grained enough to satisfy the principle of least privilege, and arguably is responsible for the prevalence of malware in such systems (see computer insecurity).
In some models, for example the object-capability model, any software entity can potentially act as both subject and object.
As of 2014, access-control models tend to fall into one of two classes: those based on capabilities and those based on access control lists (ACLs).
  • In a capability-based model, holding an unforgeable reference or capability to an object provides access to the object (roughly analogous to how possession of one's house key grants one access to one's house); access is conveyed to another party by transmitting such a capability over a secure channel
  • In an ACL-based model, a subject's access to an object depends on whether its identity appears on a list associated with the object (roughly analogous to how a bouncer at a private party would check an ID to see if a name appears on the guest list); access is conveyed by editing the list. (Different ACL systems have a variety of different conventions regarding who or what is responsible for editing the list and how it is edited.)
Both capability-based and ACL-based models have mechanisms to allow access rights to be granted to all members of a group of subjects (often the group is itself modeled as a subject).
Access control systems provide the essential services of authorizationidentification and authentication (I&A), access approval, and accountability where:
  • authorization specifies what a subject can do
  • identification and authentication ensure that only legitimate subjects can log on to a system
  • access approval grants access during operations, by association of users with the resources that they are allowed to access, based on the authorization policy
  • accountability identifies what a subject (or all subjects associated with a user) did

Access control models

Access to accounts can be enforced through many types of controls.
  1. Attribute-based Access Control (ABAC)
    An access control paradigm whereby access rights are granted to users through the use of policies which evaluate attributes (user attributes, resource attributes and environment conditions)
  2. Discretionary Access Control (DAC)
    In DAC, the data owner determines who can access specific resources. For example, a system administrator may create a hierarchy of files to be accessed based on certain permissions.
  3. History-Based Access Control (HBAC)
    Access is granted or declined based on the real-time evaluation of a history of activities of the inquiring party, e.g. behavior, time between requests, content of requests.[12] For example, the access to a certain service or data source can be granted or declined on the personal behavior, e.g. the request interval exceeds one query per second.
  4. Identity-Based Access Control (IBAC)
    Using this network administrators can more effectively manage activity and access based on individual needs.
  5. Mandatory Access Control (MAC)
    In MAC, users do not have much freedom to determine who has access to their files. For example, security clearance of users and classification of data (as confidential, secret or top secret) are used as security labels to define the level of trust.
  6. Organization-Based Access control (OrBAC)
    OrBAC model allows the policy designer to define a security policy independently of the implementation
  7. Role-Based Access Control (RBAC)
    RBAC allows access based on the job title. RBAC largely eliminates discretion when providing access to objects. For example, a human resources specialist should not have permissions to create network accounts; this should be a role reserved for network administrators.
  8. Rule-Based Access Control (RAC)
    RAC method is largely context based. Example of this would be only allowing students to use the labs during a certain time of day.
  9. Responsibility Based Access control
    Information is accessed based on the responsibilities assigned to an actor or a business role[15]

Telecommunication

In telecommunication, the term access control is defined in U.S. Federal Standard 1037C  with the following meanings:
  1. service feature or technique used to permit or deny use of the components of a communication system.
  2. A technique used to define or restrict the rights of individuals or application programs to obtain data from, or place data onto, a storage device.
  3. The definition or restriction of the rights of individuals or application programs to obtain data from, or place data into, a storage device.
  4. The process of limiting access to the resources of an AIS (Automated Information System) to authorized users, programs, processes, or other systems.
  5. That function performed by the resource controller that allocates system resources to satisfy user requests.
This definition depends on several other technical terms from Federal Standard 1037C.

In object-oriented programming

In object-oriented programming languagesaccess control is a part of the apparatus of achieving encapsulation, one of four fundamentals of object-oriented programming. The goal is to establish a clear separation between interface (visible and accessible parts of the class) and implementation (internal representation and helper methods).
Also known as data hiding, it ensures exclusive data access to class members (both variables and methods) and protects object integrity by preventing corruption by a client programmer/ client classes. Rule of thumb is to use the more restrictive access level for your data, unless there is a compelling reason to expose it. This also helps to reduce inter dependencies between classes - leading to lower coupling and fewer regression bugs.[
In object-oriented programming, access control is typically implemented using access modifiers in the object or class. Although access modifiers may be syntactically different between languages, they all attempt to achieve the same goal; Define which variables and methods are visible and to whom.
Several programming languages (e.g. Java, C++, C#, Ruby) use the same publicprotected and private access modifiers. These are the keywords which allow a programmer to establish access levels to classes and class members (both data and methods). Their exact use in each programming language is varied, depending on the language philosophy, but there are more similarities than differences.

Comparison of use of access modifier keywords in different OOP languages

KeywordC++JavaRubyC#
privateclassclass-class
protectedderived classesderived classes
and/or
within same package
derived classesderived class
package-within its package--
internal---current assembly
publiceverybodyeverybodyeverybodyeverybody
no modifier (default)classsame packageeverybodyclass

Note: in Ruby, private methods always have self as an implicit receiver. Therefore, they can only be used on their current object.
In some languages there are mechanisms to override access modifies to gain access to the private components of an object. One such example is the friend class in C++.

Attribute accessors

Special public member methods - accessors (aka getters) and mutator methods (often called setters) are used to control changes to class variables in order to prevent unauthorized access and data corruption.

Public policy

In public policy, access control to restrict access to systems ("authorization") or to track or monitor behavior within systems ("accountability") is an implementation feature of using trusted systems for security or social control.

Security lighting

In the field of physical security, security lighting is lighting that intended to deter or detect intrusions or other criminal activity on a piece of real property. It can also be used to increase a feeling of safety. Lighting is integral to crime prevention through environmental design.

Planning considerations

Security lighting can be counter-productive. Turning off lights halved the number of thefts and burglary in Övertorneå Sweden.  A test in West Sussex UK showed that adding all-night lighting in some areas made people there feel safer, although crime rates increased 55% in those areas compared to control areas and to the county as a whole.
Bright, unshielded floodlights often prevent people from noticing criminal activity, and help criminals see what they are doing. 
While adequate lighting around a physical structure is deployed to reduce the risk of an intrusion, it is critical that the lighting be designed carefully as poorly arranged lighting can create glare which actually obstructs vision. Studies have shown that many criminals are aware of this effect and actively exploit it. The optimal design will also depend on whether the area will be watched directly by humans or by closed-circuit television, and on the location of the observers or cameras.
Security lighting may be subject to vandalism, possibly to reduce its effectiveness for a subsequent intrusion attempt. Thus security lights should either be mounted very high, or else protected by wire mesh or tough polycarbonate shields. Other lamps may be completely recessed from view and access, with the light directed out through a light pipe or reflected from a polished aluminium or stainless steel mirror. For similar reasons high security installations may provide a stand-by power supply for their security lighting.
Some typical considerations include:
  • Reduce and prevent glare and situations mentioned above
    • Shielded or full cut-off (FCO) lamp housings which conceal the bulb could be used, which should direct light onto the ground or target and away from observers. These lights should send no light above 80 degrees from the nadir. Lighting should be bright enough, and not "as bright as possible". In many cases a good rule of thumb is 0.5 watts per square metre (0.05 watts per square foot). This might need to be increased in very confused environments, but conversely can be reduced in very open environments. Multiple lamps of moderate power instead of a few powerful lamps will reduce glare, provide more even illumination with reduced pools of shadow, and provide some redundancy if one lamp's bulb blows out or develops a bad ballast.
  • Prevent malicious tampering or interference. This means that besides the lamp itself, the entire circuit from the source (electric company or generator), through the wires, to the lamp and back should be protected.
    • Luminaires should be accessible so that the maintainer can replace blown bulbs as quickly as possible and clean the luminaires periodically. However they should be protected or somehow made inaccessible to tampering.
    • Ensure the electric meter box is locked or inaccessible, or else power the lights from a different line.
    • Control and power lines, where outside or vulnerable, should be either buried well underground (in conduits preferably) or at a height of at least 8 metres (about 24 feet).
    • Ideally multiple circuits should be used to prevent an accidental or malicious short or cut causing all illumination to fail.

Use

A sodium vapor light. This type is often used as security lighting.
Security lighting can be used in residential, commercial, industrial, institutional, and military settings. Some examples of security lighting include floodlights and low pressure sodium vapour lights. Most lights intended to be left on all night are high-intensity discharge lamps as these have good energy efficiency, thus reducing the cost of running a lamp for such long periods.
A disadvantage of low pressure sodium lamps is that the colour is pure yellow, so the illuminated scene is seen without any colour differentiation. Consequently, high pressure sodium vapour lamps (which are still yellowish, but closer to golden white) are also used, at the cost of greater running expenses and increased light pollution. High pressure sodium lamps also take slightly longer to restrike after a power interruption.
Other lights may be activated by sensors such as passive infrared sensors (PIRs), turning on only when a person (or other mammal) approaches. PIR activated lamps will usually be incandescent bulbs so that they can activate instantly; energy saving is less important since they will not be on all the time. PIR sensor activation can increase both the deterrent effect (since the intruder knows that he has been detected) and the detection effect (since a person will be attracted to the sudden increase in light). Some PIR units can be set up to sound a chime as well as turn on the light. Most modern units have a photocell so that they only turn on when it is dark.

Limitations

An important limitation to the usefulness of security lighting is the simple fact that it is only useful at night. This is particularly significant for home owners because, contrary to a widespread myth, most household burglaries occur during the day, when the occupants are away at work or shopping.
As with any lighting, security lighting can reduce night vision, making it harder to see into areas that are unlit or are in shadow. 

                

   XXX  .  XXX  4% Differences between Transponder and Remote Control Keys 

The traditional flat metal key that is used to open nearly every type of lock made is losing its popularity and usefulness, as newer types of locking systems come online. This is especially true in the case of the automotive industry, as new vehicles are now coming equipped with transponder keys, as well as remote control keys. Many people confuse the differences between transponder and remote control keys, and think that they are basically the same, they are not.

What is the Difference between a Transponder and a Remote Control Key?

While most cars today come with remote keys, instead of “just” a traditional flat car key, the latest auto mobile models are equipped with key-less transponder locks, thus eliminating the need for physical car keys altogether. The most basic difference between the two is that a transponder unlocks a vehicle without using a physical locking mechanism or key, and the engine will not start without it. A remote key can also unlock the vehicle’s doors, but if the remote control unit does not function, the traditional flat key can be used.
Some types of remote control keys have the remote unit mounted on the head of the key and is basically a separate piece, and others have the remote unit built into/onto the key. If the remote is not functioning, either the battery is dead or the unit is broken, then the remote controlled locking system can be bypassed using the traditional key to unlock the vehicle without causing the alarm to go off.
The main difference is that a remote transponder key has a control chip inside of the unit that is a vital part of a vehicle’s security system, which provides an extra level of anti-theft. Without it, the engine cannot start and the alarm system cannot be disarmed, only an experienced auto locksmith trained in transponder technology can help. High-end cars that are favourite targets for thieves benefit the most from such transponder systems, as it drastically reduces the chance of their vehicle being stolen.
However, there are times that a transponder needs to be maintained, repaired or reprogrammed, and only an authorised auto locksmith can do that because specialised equipment is needed to correctly disarm the security system, and required to reprogram the unique electronic key that will start the vehicle. 

                                            Transponder vs Remote 

The key that has different size cuts on either a single or double side that match the different size tumblers in the lock.  These days it has become a whole lot more involved! Most new cars now come with a Remote Key, so gone are the days of manually unlocking your car… now you can press a button from the other side of the car park.
Remote controlled keys (which come as either remote head keys where the remote is built into the key or fobs where the remote is separate from the key) can unlock and lock your vehicle, and they operate independently from the transponder security system. If your remote key is not working you would need to check that the battery is not flat, or move away from any radio interference (i.e. step closer to the car!) More often than not though cars with remote central locking should have a bypass system using the normal metal key to unlock the doors without setting the alarm off.
These days vehicle keys will also have a transponder microchip embedded into the plastic part of the key – and this is actually part of the vehicle’s anti-theft system. A transponder chip disarms a vehicle immobiliser when the car key is used to start the engine. A European Directive came into place in 1995 enforcing the use of immobilisers on cars in a bid to reduce car theft!
A transponder is short for: transmitter + responder.  The transponder microchip has a unique serial number, which is set during its initial programming. When a person wants to start a car, the chip sends a request to the car for it to validate the serial number and turn off the engine immobiliser. If the car doesn’t recognize the number, it will remain immobilised.  So, even for a simple car key without any buttons, the key must be cut correctly to turn the locks, and also programmed correctly to disarm the immobiliser – each key is programmed to only start a specific vehicle, which reduces the possibility of theft.
Because of its technology, if you need a copy of your car key and it has a transponder you will need an auto-locksmith as all transponder keys need to be programmed to your car or cloned from an existing key for your vehicle to accept it.
Unfortunately the transponder chips required are not cheap, and an older car will often have a transponder chip which is just as expensive as a newer car.  

Anti-Pinch Window Lift Automotive Electronics Project

Good electronics project design references and tips can accelerate your practical know-how in electronics.
Getting good and timely information on the electronic project that you are embarking on sometimes can be time consuming and frustrating. Hence, the objective of this site is to bridge this gap. This site is dedicated to all electronics enthusiasts whether you are a student, a teacher, hobbyist or even an electronics engineer. 
The end result of an electronics project is determined by a few factors. It normally starts with the strong enthusiasm in the project chosen, going on to schematic or circuit design, printed circuit board design, software programming if microcontroller is involved and building prototypes.
If you are looking for electronic parts to test your projects, head over to our newly open electronic store and browse the many products that you can purchase.
For many, the process of design ends here when you achieved your objective of creating a useful device or tool that helps you with your daily lives or meeting the objective of the coursework set by the college that you are currently enrolled in.
However, if you want to go further in marketing the product created, a lot of effort is needed in ensuring the reliability of the product. Good design practices, choice of components, reliability test and compliance to standards set by the governing authorities are some of the steps that you will need to take before you can market your product to the public.
This site provides schematics and parts lists of various projects that you can experiment yourself. It also include articles on the importance of reliability testing, electromagnetic compatibility (EMC) testing, failure mode effect and Analysis (FMEA) and fundamental of electronic parts. Test and measurement tools that are needed are also discussed before you embark on your journey of building your own electronic project.
In automotive electronics networking, the commonly networking standard used is called CAN or controller area network which uses a baud rate of up to 1 Mbps. This speed is needed in the control of engine and other critical components of the automobile that requires fast transfer of information.
However, there are some areas of control which does not require that kind of speed and hence a slower speed standard can be utilized to save control cost. Some of these areas are the mirrors control, Window lift, seat control and door lock among others. 
Due to this requirements, a consortium was formed in 1998 consisting of 5 automotive manufacturers (Volvo, BMW, Audi, VW and Daimler-Chrysler), 1 tool supplier (VCT) and 1 semiconductor supplier (Motorola) to look into this. As a result, the LIN (Local Interconnect Network) specifications was finalised on 2 February 2000. The first version of LIN was 1.1 and currently version 2.0 is in use. The most recent development in LIN is the use of it over the vehicle's battery line using a DC-LIN transceiver. Some of the main features of LIN are listed below.
  • One master and up to 16 slaves. No collision detection feature is needed as master initiated all messages communication with slaves. The master is usually implemented with a more powerful microcontroller compared to the slaves as it has to handle more tasks.
  • Baudrate of up to 20kbps. Slower speed is chosen to reduce the effect of electromagnetic interference.
  • Single wire implementation based on enhanced ISO 9141.
  • Simple SCI or UART hardware interface which is available in most microcontroller chips making its implementation cost effective.
  • Self synchronization in the slave nodes without the need to have crystal or ceramic resonator. Internal RC oscillator for the microcontroller is good enough and hence making its implementation lower cost.

Anti-Pinch Window Lift Automotive Electronics Project
One of the LIN application is in the anti-pinch window lift control.  The application note from Microchip uses LIN 2.0 protocol in its implementation example.
The micro controller used is PIC16F688, a 14 pin flash based CMOS device with 4096 words program memory, 256 bytes of static RAM, 256 bytes of EEPROM, 12 I/O, 1 8-bit timer, 1 16-bit timer and 8 channels of 10 bit ADC.
A LIN bus transceiver is used for the slave bus driver to connect to network. 
Other Automotive Projects

LED Battery Level Indicator Project
This bar graph LED battery level indicator project is based on LM3914 monolithic IC from National Semiconductor that senses the voltage levels of the battery and drives the 10 light emitting diodes based on the voltage level that is detected.


12V Lead Acid Battery Charger
This automotive battery charger project is based on National Semiconductor LM350 3A Adjustable Regulator. It is designed to charge 12V lead acid batteries.


Passive Keyless Entry Project
Most vehicles today have remote controls with two buttons that control the locking and the unlocking of the doors of the vehicles. The development of RFID (Radio Frequency Identification) technology will soon replace this method of opening and closing of the doors. 

   

Automotive Key less Lock  

Keyless Lock 
Most vehicles today have remote controls with two buttons that control the locking and the unlocking of the doors of the vehicles. The development of RFID (Radio Frequency Identification) technology will soon replace this method of opening and closing of the doors. When a transponder is placed near a reader, it will start to communicate with the reader and once the information exchange is successful, the door will open.
Chances are that you will have seen this technology been implemented on higher end cars these days. It is more convenient and safe as you do not have to scramble for key on your purse or pocket before being able to open the door and after that using the same key to start the engine. 
A transponder consists of an antenna with a microchip which is embedded into a plastic tag. It is usually light weight and is designed to take the impact of normal mechanical stress.
When the owner of the vehicle with the transponder in the pocket walks towards the car, the doors of the car will automatically open once the owner is within a few feet from the car. One does not need to search frantically for the remote control of the car in order to open it.
Other features incorporated may include the triggering of lights when the doors opened, auto lock once the owner moves away from the car and other features. Many luxury cars manufacturers have already implemented this keyless lock technology in their vehicles and it is forecast that middle range cars will follow suit soon.
Microchip new PIC16F639 flash MCU which has 3 channel, transponder analog front end and KEELOQ cryptographic peripheral is an ideal microchip to be used in the transponder. The 3 channels has omnidirectional 125kHz low frequency communication that are used to communicate with the base station or the reader. This device can also be used in other wireless authentication applications. An example of the passive keyless entry application circuit is shown below.
Automotive Keyless Lock Circuit

The KEELOQ technology is a non linear encryption algorithm that creates a unique transmission on every use, making the capturing and re sending of the same code useless. Hence the security feature is protected from intruders.
This solution from Microchip contains 3 modules. They are the Key Fob, the Base Station and the Receiver/Decoder.
The Base Station starts the communication with the Key Fob by sending out the 125 kHz signal. The Key Fob receives and decodes the challenge from the Base Station. If there is a match, the Key Fob will transmit a 432 MHz signal back to the Receiver/Decoder. If the Receiver/Decoder recognizes the Key Fob as a valid device, it will send out a signal to unlock the door. 







               What’s the Difference Between a Transponder Key and a Remote? 

  
As a car owner who has previously lost your car keys, you might wonder why it’s quite so expensive and complicated for a dealer to replace the key and we will take some time answering your question today. But first you need to understand that there are two types of automotive keys, namely transponder and non-transponder keys. Transponder keys are not to be confused with automotive remotes. While an auto remove can lock and unlock your car, they operate independently from the transponder security system. Flat car keys on the other hand solely use the mechanical cuts to turn the lock.
The transponder key forms part of the anti-theft security system of the car, and the word is made up of the two terms transmitter and responder. The plastic head of the key picks up signals from the antenna ring around the ignition cylinder and when that happens, the vehicle will operate. Without it however, the vehicle is secure.
Modern transponders use a challenge and password transponder system, which may be encrypted with a rolling code. In this case, the password will change after every use. Using complex mathematical algorithms, the transponder has to crunch the number and respond.
Some cars still use more simplified chip keys that are equipped by identification numbers that are recognizable by the car. Much like an ATM PIN, this key works with the Vehicle Anti Theft System. Such keys are equipped with a resistor and one of fifteen different preset resistances. A key needs to be made using the correct cuts, turn the key cylinder and it must have the correct resistance (Ohm’s) in order for the car to start. If not, it will shut down and lock you out. During lockout, which lasts around 3-4 minutes, not even the correct key will successfully start the car.

What Happens When You Lose Your Transponder Key?

If you need a new transponder key, it has to be programmed, and a locksmith is best placed to do just that. Professional locksmiths combine years of experience with professional-grade equipment to achieve perfect cuts.
Since a car cannot tell the difference between an original key or a cloned copy, it is important to find out which type of transponder key you will get. There are two types, of transponder keys, namely zero bitted, and encrypted. It is important to find a locksmith who owns transponders from all the different car manufacturers, and has the equipment to create a new key for you.
Likewise, it is important to find out whether you can upgrade to a better type of transponder. Some chips require batteries for operation, and others don’t. By choosing one that does not use a battery, you don’t ever have to worry about a battery going flat or leaving you stranded.
Zero bitted keys are meant to be cloned, as they don’t have a preset inscription. These keys are created by inserting your key into a tool before inserting a blank key into the same tool. This way, they can clone your key onto a zero bitted key blank.
Encrypted keys do have a preset, which is a random encryption that needs to be programmed to your car. The locksmith will take a new key to your car, using a tool which hooks up to the car’s OBD port. He will use this tool to add a new, unique and encrypted key to your system. Some brands require all working keys to be present for a new encrypted key to be added, or else they may fall out of the system. 

 variety of components which enable the locking, organizing and managing of various properties. The systems operate with radio, keyboard, RFID or biometrics. 

Actuating Elements

M300 – Electronic lock with 3-point interlock

M300

Motorised electronic lock with 3-point locking
• Internal battery power supply, no need to worry about cabling for external AC power supply
• Solution for filing cabinets and tall hinge doors
• Also available as a 1-point deadbolt lock
• Right / left mounting

M400 – Electronic catch lock/spring bolt lock

M400

Electronic lock with deadbolt or spring loaded slambolt
• Internal battery power supply, no need to worry about cabling for external AC power supply
• Ideal solution for hinge doors, flaps and single drawers
• Can be combined with SVS Elevon interlock system for pedestals and filing cabinets
• Right / left mounting

M500 – Electronic container lock

M500

Electronic pedestal lock
• Motorised lever cylinder
• Rotating motor with the same dimensions as a mechanical lock
• Flexible due to battery operation internal battery power supply, no need to worry about cabling for external AC power supply for mobile pedestals
• Available with various locking lugs pegs for compatibility with a range of interlock systems

Sensor Elements

TA KEYBOARD - Electronic numerical combination lock with film keyboard

TA KEYPAD

Electronic combination lock with keypad
• Individual code selection
• Easy to use
• Stand-alone application
• Master function
• Code setting and modification without additional accessories
• Numerous operating options configurable via keypad
• Optical indicator and battery warning on keypad

FP Scanner – Electronic fingerprint lock

FP SCANNER

Electronic fingerprint lock
• Fingerprint scanner for personalized recognition
• Capable of storing up to 50 fingerprints
• Easy to use
• Standalone application
• Master function
• Programming without additional accessories
• Optical indicator and battery warning on the reader

RADIO TRANSMITTER - 2 and 4 channel radio transmitter

RADIO TRANSMITTER

2 channel radio transmitter
• Convenient solution with simultaneous actuating of multiple locks
• Programming up to 50 transmitters
• Easy to use
• Standalone application
• Master function
• Programming without additional accessories
• Optional with optical indicator for Emergency power supply and battery warning

RFID – Electronic lock with RFID

RFID

Electronic lock with 13,56 MHz RFID
• Lock operated by RFID transponder
• Available as assigned use / shared use version
• No additional software required
• Optical LED indicator and battery warning in on the external reader

SMART SECURE - Security control comfortably from your smartphone

SMART SECURE

Manage cabinet security with your smartphone
• Simple security management, even for complex user configurations
• Basic APP functions are free of charge
• Optional proximity locking and unlocking, with individual range control
• Many other functions available to help you optimize convenience, security and organization of your storage
• Optional use of optical LED indicator for emergency power supply and battery warning .


                                                                                                      


                                  XXX  .  XXX  4 % zero sample transponder 

SE transponder

SE transponder
SE transponder
SE transponder
The SE transponder boasts small dimen­sions and a high-quality design along with a pleasant touch. In addi­tion, it offers maximum func­tio­nality.
The "Data on Transponder" ver­sion impresses through its large memory capacity. Unlike RFID media, the SE transponder can memo­rise, in addi­tion to validity periods, a plu­rality of data thus pro­viding users with maximum flexibility wit­hout having to com­promise on secu­rity.
Apart from transponder groups, up to 65,000 single door aut­ho­ri­sa­tions and 500 events can be stored.
The sto­rage of access events and service events such as, for example, the battery states of cylinders and locks are especi­ally useful. The BKS-Key Manager software­ for managing master key sys­tems clearly dis­plays the cur­rent state of a system wit­hout having to network its locks and cylinders. In addi­tion, the transponders transmit pro­gramming jobs such as dis­ab­ling transponders and defi­ning new time zones.
Regard­less of whe­ther you use mecha­nical, mecha­tronic or elec­tronic master key sys­tems – the SE transponder from BKS can be used for any of them. Different cylinders can be combined in a cost-effec­tive overall system. This can be done wit­hout having to sacri­fice comfort, as all cylinders, keys and transponders are admi­nistered and pro­grammed via the BKS-Key Manager software­ for managing master key sys­tems. Especi­ally efficient master key sys­tems combine the use of mecha­nical and elec­tronic cylinders. 

Features and bene­fits pro­vided by SE transponders:

  • High-quality design
  • Pleasant haptics
  • High-capacity memory for flexible aut­ho­ri­sa­tion allo­ca­tion
  • Mul­tifunc­tional LED indica­ting active aut­ho­ri­sa­tions and battery charge level
  • Combinable with all cur­rent BKS master key sys­tems
  • Active transponder for minimal cylinder battery usage
  • Long battery life
  • Easy battery exchange
  • Con­tinuous IDs for simple and fast recording via the BKS-KeyManager software­
  • System-specific client pro­vides high secu­rity

Technical data (Data on Transponder ver­sion)

SE transponder
High-capacity memory for
– validity periods
– transponder groups



OTS Electronic Lock

The battery-operated offline lock that cooperates with MIFARE 1K and 4K transponders. The lock is operated by simple pressing a button through transponder.
The lock has independent power supply. It is powered by four alkaline 1.5V AA batteries. The battery service life is about 30 000 cycles. Battery charge level is measured and indicated at each locking cycle. Thus, the lock cannot be locked when the batteries are flat. When used in common manner, the battery service life is 2 to 5 years. When at rest, the batteries consume no energy.
Electronic lock allows configuration both in the reserved and free locking mode. It allows support of multi-application solution and it supports the customer-assigned sector and key in the MIFARE transponder.
Electronic lock is mechanically resistant and it is ready to be applied even in the humid and demanding conditions with high load.
It allows simple and safe installation to various types of locker doors. It is supplied both in the right-hand and left-hand version.
The lock can be controlled using a multi-level MASTER key.Lock supports the organizational hierarchy of locking and creation of groups. Thus, the high data safety and quality mechanical design makes the OTS electronic lock a perfect solution for electronic locking. 
 Electronic Locks Electronic Locks Electronic Locks Electronic Locks Electronic Locks 


                                                                     Slam lockLocked by pressing the locking button on the transponder unitCan learn up to 20 transpondersSimple programming without additional softwareSet contains Optical Indicator, Programming Stick and Striker Transponder sold separately  

ELECTRONIC RFID-LOCKING-SYSTEM

The electronic RFID-locking-system IPLock Easy can be utilised for furniture made of wood and other non metallic materials which stands 
out with its features and easy appliance. The cabinet lock is suitable for revolving or sliding doors as well as drawers, which can be locked invisibly.
The surface of the furniture will not show the lock, therefore the design will not be affected. The lock can be opened by different kinds of 
transponders, like a card, a wrist band or a remote with or without combi code. The access control is possible for up to 50 users. The coding 
is possible without the help of a computer. 



               Central locking system 

  

The locking system in a vehicle must grant access only to authorised persons. It is the means via which the vehicle doors and boot lid are locked and unlocked and the engine is started.The locking system is...

Environmental protection

In the event of an accident, fuel filler caps with locks, which are also available for retrofitting, improve both safety and the protection of the environment by preventing fuel from escaping. Moreover, the valve systems installed in modern fuel filler caps reduce fuel evaporation. In the field of commercial vehicles too, locking systems make an active contribution to the protection of the environment, as they provide an assurance of safety for urea tanks. Urea is used to meet the strict environmental standards of Euro IV and V and to reduce the toxic emissions of diesel vehicles.

Function

The locking system in a vehicle must grant access only to authorised persons. It is the means via which the vehicle doors and boot lid are locked and unlocked and the engine is started.The locking system is operated with a key or remote control.
In years gone by, purely mechanical locking systems were the norm. Each door or lid had an independent mechanism which could be operated from the outside with a key or from the inside with a knob. Central locking systems, for which pneumatic drives were used originally, brought about significant improvements in comfort and convenience. These systems feature a built-in vacuum reservoir which triggers the locks on all doors when the key is turned in a lock.
Electric locking systems are commonplace in today's vehicles. Most of these combine a key with infrared or wireless remote control. This means that they can be triggered remotely, i.e. without contact between key and vehicle. Today, most vehicle manufacturers only fit a lock which can be operated with a key in one door, so the car can be unlocked in an emergency. The very latest systems enable entirely keyless vehicle access. Drivers only need to have the transmitter in their pockets, for example. The doors are then unlocked when the driver touches a door handle which has a built-in contact point.
The locking system comprises the following components:
Door handle/Handle strip
The door handle is the traditional means by which a vehicle is opened and closed from inside or outside. The external door strip usually houses the door lock. Door strips are increasingly used as design elements in modern cars. They can be chrome-plated or paint-finished in the same colour as the vehicle.
Door lock/Actuator
The latching mechanism in a vehicle is installed directly in its doors. It contains both a latch and an electric motor (actuator) which controls the central locking. The latch opens or closes the doors, whereas the door lock locks or unlocks the vehicle. Today, all door latches are powered by electric drives.
Fuel filler cap
The fuel filler cap must securely seal the fuel tank. Some fuel filler caps have locks, others do not. Fuel filler caps with locks are usually found on vehicles which have either a fuel filler flap which does not lock or no fuel filler flap at all. Fuel filler caps without locks are found on vehicles whose fuel filler flap is locked automatically via the central locking system.
Transponder
The transponder is usually integrated inside the key bow. It is the means by which the electronic immobiliser identifies that the correct key is being used. The transponder's code is read out as the key nears the ignition lock. If the code is correct, the electronic immobiliser sends the start enable to the engine.
Remote control
Remote controls are being used with increasing frequency in small cars, replacing the functions of a conventional key to all intents and purposes. A signal transmitter sends a signal or a coded order instruction to a receiver inside the vehicle, which usually controls a number of functions. Infrared remote controls have a range of up to 15 m. They rely on direct "visual" contact between transmitter and receiver. Today, infrared remote controls are only used rarely as they have been overtaken by other technologies. Wireless remote controls transmit on radio frequencies and have a range of up to approximately 100 m.
Keys
The basic function of keys and remote controls is the locking and unlocking of doors, luggage compartments, fuel filler caps, etc. they are also used to control the interior lighting and electronic immobiliser, the alarm system and the window lifters. The keys comprise two units: the milled, toothed key blade and the key bow. The latter is home to an increasing number of electronic functions such as the remote control for the central locking system or the boot lid.
Start/stop system
Traditionally, a vehicle key was needed to unlock the steering lock and to start the engine. Subsequently, the vehicle key was enhanced with the addition of a transponder-based release mechanism for the electronic immobiliser. Today, keyless systems are increasingly being used to start engines. In a keyless system, a transmitter – which usually also houses the controller for the central locking – is inserted into a reader in the vehicle and the engine is then started by pressing a button. A more recent development has seen the use of systems that work without any contact at all. Here, it is sufficient to simply "take along" the transmitter (carrying it in a trouser pocket, for example) and press the pedals before starting the engine by pressing a button.
Steering lock
Steering locks have been a mandatory requirement set by insurance companies since 1969. They provide protection against theft. They are the means by which the steering column is unlocked and the engine is started – either electrically or in by conventional mechanical means.

Safety

Modern locking systems help to increase both security and safety in vehicles. Where security is concerned, they provide protection against theft and, in conjunction with an alarm system, act as a deterrent. In terms of safety, the integrated control of lighting elements when doors are unlocked, for example, contributes to safety on the road by improving the visibility of open doors. 

Locking systems

                        
Locking systems are designed to open front and interior doors with or without electronic door release. Access can be granted either by numeric codes, transponders or also bio metrically with a finger print. For this reason, input and reader units, without any installation or overhaul efforts, are operated as small systems stand-alone or are integrated into door communication system as an extended function.
  • Door release with three different technologies
  • Transponder technology to release doors without electronic door release
  • Application for door release or for alternative release functions
  • Available as pre-fabricated small system
Three technologies enable the door release either by numeric codes, transponders or bio metrically with finger print. The function can be installed stand-alone or can also be integrated into front door stations and operated accordingly. In any case, a compact code lock can be installed at the front door but also in interior rooms being as slim as a switch. Access is granted by entering a numeric code and thus it is key-less. The core advantage is that numeric codes can be easily send out and used on site without having to present an identification badge such as transponder cards. A small system can also be equipped with a transponder reader and relevant transponder cards. The reader can either be installed surface-mount or be integrated into a knob cylinder, depending whether an electronic door release is available. In as such, interior doors can be equipped with knob cylinder-integrated transponder readers. Apart from door release by these three technologies also alternative trigger functions such as switching of light or operating a door drive.

Flexible installation and integration variants

The input and reader devices of a locking system can be separated and separately installed and thus they offer an easy to install solution which is suitable for retrofitting resp. Extensions of an existing communication system. When installing a new communication system the input and reader device can be directly integrated into front door stations.
The system can be modularly extended to the following functions:
  • Access control
  • Video surveillance
  • Telephone linking
  • LAN and WIFI as well as internet linking  
   


             Password based Digital Locking System


     This project is a password based digital locking system using a microcontroller. It is another type ...

it is  a password based digital locking system using a micro controller. It is another type of security structure that asks users to enter a predefined password before allowing access to protected appliances, doors or other systems. The circuit utilizes the dynamic series connectors from TE connectivity to provide a reliable and strong connection in between components.
The design is primarily comprised of a micro controller, an LCD interface, a matrix keypad and an electronic/electromechanical lock protected system. The dynamic series connectors provide connector solutions ranging from signal level circuitry up to power circuits. With the use of these connectors, disorganized wiring is avoided which makes circuit troubleshooting easy. In this password based digital locking system, the user is prompted to enter a password through the keypad, before allowing access. The entered password is sent to the micro controller. Then, the micro controller compares the entered password to the predefined password. If the passwords do not match, the red LED will glow and the LCD will display an error message. The user is required to press the reset button to enter a password again. If the passwords do match, the green LED will glow and the LCD will display a message "Successful Access". The micro controller will then send a logic signal to unlock the protected system.
The design is very useful disallowing unauthorized persons gain access to the users' equipment. The design is applicable, but not limited to doors, gates, turnstiles, cabinets and moneyboxes.        


                                                                                        
                                                     iButton Electronic Lock


The circuit is a type electronic lock designed to work stand-alone. It uses iButton device that ...

The circuit is a type electronic lock designed to work stand-alone. It uses iButton device that makes it a unique and durable type of access control. Unlike RF cards and other type of access control technology, the iButton is more versatile due to its size and concept of storing information. The iButton device can consider many complementary technologies, and the communication rate and product breadth of iButton devices go well beyond the simple memory products typically available with RFID.

The design is comprised of an 8-bit micro controller that manages the I/Os data. The ADM1232 device is a microprocessor supervisory circuit for the monitoring of the processor IC. The PCA24S08ADP device is an Electrically Erasable and Programmable Read-Only Memory (EEPROM) that stores an amount of data and saves when the power is removed. The LSHD-5601 device is a 7-segment common anode led display that produces the visual representation on the programming of additional keys. The IRF540 device is a power MOSFET that controls the solenoid. The NE202930-T1-A is an NPN epitaxial transistor that controls the IRF540 power MOSFET. The several types of diodes are used for protection and rectification. The power supply circuit is comprised of a standard power supply components with battery holder as an alternative supply of the system.




Passive Keyless entry-Transponder 

Passive Keyless entry-Transponder Passive Keyless Entry (PKE) transponder allows one to gain access by simply having ...

Passive Keyless Entry (PKE) transponder allows one to gain access by simply having a valid transponder in their possession. One prominent application of this schematic is in vehicle access wherein the person may be able to have an access to the vehicle without the need of pressing a button but only by having the valid transponder with them. 

Hands-free PKE applications require bidirectional communication between the base station and transponder units. The base unit inside the vehicle transmits a Low-Frequency (LF) command that searches for a transponder in the field. Once located, the transponder in the vehicle owner’s possession then automatically responds to the base unit. The base unit then unlocks the car doors, if a valid authentication response is received. Typical PKE applications adhere to the electromagnetic field radiation rules that are mandated by the government agencies in relation to the maximum power transmitted by the transponder and base station. 

The PIC16F639 has a digital MCU section (PIC16F639 core) and an analog front-end (AFE) section. The device can be used for various low-frequency sensing and bidirectional smart communication applications. The base station unit transmits a 125 kHz command to search for a valid transponder in the field. The PKE transponder sends back a response if the received command is valid. The PIC16F639 device has high analog input sensitivity (up to 1mVPP) and three antenna connection pins. By connecting three antennas that are positioned to x, y and z directions, the transponder can pick up signals from any direction at any given time.



This system is capable of handling high density access control which is common to train stations ...

This system is capable of handling high density access control which is common to train stations and industrial manufacturing. The circuitry uses 2x16 LCDs as the direct monitor of the system and 20x100 LCD for the main display. The system is programmable for other purposes and usages as well.

It is comprised of microcontrollers that handle data and operation of the subsystems. The 80C51 microcontroller has 128x8 RAM and 4000x8 ROM which is ideal for access control system application. The design is static, therefore the clock can be stopped without loss of user data and the execution can be resumed from the point the clock was stopped. The CLRC632 reader IC supports all MIFARE products and protocols. It is a small but fully integrated package as a reader IC for contact less communication. The PCA8539 LCD driver is also excellent for high-contrast Vertical Alignment (VA) LCD with multiplex rates up to 1:18 ratio and generates drive signals up to 1,800 elements.

It can also monitor an individual's interaction with their appropriate information. Aside from people, it is also appropriate for product inventory and other information management applications. It can handle a wide range of methods and protocols for contact less communications and can operate at high data rates. The design itself is so versatile that it could be developed for wide range of applications.

Wo kann man digitale Schließsysteme im Gebäude verwenden 
      

                                                     










transponder and wiring in electronic robotics AMNIMARJESLOW GOVERNMENT 91220017 LJBUSAF The next prog Electronics XI XA PIN PING HUNG A_C BUSY IN DOPING TRANSPONDER *


                       

                          Transponder 

                             ROBOTICS 
                                              

A transponder is short for: transmitter + responder.
The word came into use around 1944. In basic terms a transponder is a miniaturized electronic chip that has what is called nonvolatile memory. Nonvolatile memory is the type of memory that does not need constant energy for retention. Along with that electronic chip is a set of windings, very fine wire coiled around a tube.  These windings look similar to the windings you would find in a electric motor.
There are two basic types of transponders. The first are the Electric Coupled Transponder systems. Electric coupled transponder systems are not limited to small areas for transmission but can transmit messages or signals for different ranges of distance including several inches to miles, as used in Satellites and Airplanes.  These systems require large amounts of constant electricity to operate.
The second type is what automobile manufacturer’s are using and they are called Magnetic Coupled Transponder systems. Magnetic Coupled Transponder systems are passive in nature. This means they do not require constant electricity and thus do not need a power source of their own. They operate in the frequency range area of 125 KHz. Since Magnetic Coupled Transponders do not have their own power source they are very limited to range of communication and generally operate in the range of 1 cm to 15 cm. Since this is a radio frequency it can penetrate materials that would make the transponder not directly visible, such as the plastic or rubber in the bow of a key.
The process of key identification is similar in most automotive transponder systems. Once a key is inserted into the ignition lock and turned to one of the ‘on’ or ‘run’ positions, the induction coil that is mounted around the ignition lock sends out an electromagnet field of energy. The windings in the transponder chip absorb that energy and power the electronic chip to emit a signal. The signal is usually an alphanumeric set of digits which is considered the Identification Code. The induction coil reads the signal and sends it to some type of computer device to recognize the signal. If the signal is recognized as being already in the computer’s memory the signal is accepted and other electronic components in the vehicle are set into motion to allow the starting of the vehicle or the continuation of the engine running.
Transponders can be made into several different shapes and sizes and can be used in many different types of applications such as: warehouse pallets, retail clothing, animal management, and of course electronic automobile key identification.

in Aviation transponders work in conjunction with air traffic control (ATC) radar systems to locate and identify aircraft, facilitating airspace management. Transponders are especially important for small UAS which are too small to be seen by ATC radar unless they have a transponder. Mode 5 transponders are a militarized version of civil transponders. Mode 5 interrogations are used by fighter aircraft to electronically determine if an unidentified aircraft or “bogey” is friendly or enemy. 
It builds the world’s smallest transponder for the UAV market, and has long provided engineering and manufacturing services to the military and civilian aviation industry. Its tiny aviation transponders transformed how small unmanned aircraft are employed by making them visible to air traffic control radar .  

                                  

A self-contained direction sensing radio frequency identification (RFID) reader is developed employing a dual-directional antenna for automated target acquisition and docking of a mobile robot in indoor environments. The dual-directional antenna estimates the direction of arrival (DOA) of signals from a transponder by using the ratio of the received signal strengths between two adjacent antennas. This enables the robot to continuously monitor the changes in transponder directions and ensures reliable docking guidance to the target transponder. One of the technical challenges associated with this RFID direction finding is to sustain the accuracy of the estimated DOA that varies according to environmental conditions. It is often the case that the robot loses its way to the target in a cluttered environment. To cope with this problem, the direction correction algorithm is proposed to triangulate the location of the transponder with the most recent three DOA estimates. Theoretical simulation results verify the reliability of the proposed algorithm that quantifies the potential error in the DOA estimation. Using the algorithm, we validate mobile robot docking to an RFID transponder in an office environment occupied by obstacles. 

Introduction

Robots are confronted with many difficulties when they are deployed into a real environment. Among the difficulties encountered in an indoor environment are how to accurately and efficiently identify and approach a specific object. Over the last few decades, a considerable number of studies have been performed on both identification and localization of objects . One of the effective approaches is template-based visual recognition , but this requires optical line-of-sight and is often significantly affected by the environmental conditions such as changes in illumination. Recent advances in sensor and networking technologies have provided new approaches aimed at structuring an easy-to-understand environment with networked embedded devices such as wireless sensors and radio frequency identification (RFID) transponders . Such an environment helps the robot more easily retrieve complex information about the object, but does not usually support localization unless a GPS receiver is included in the system. The problem of location estimation thus remains a significant technical challenge in this approach. 

Robot Systems 


Robots with alternative locomotion design can assist us in observing previously inaccessible environments.
Here are some examples of our prior work. MARE: Marine Autonomous Robotic Explorer
 

MARE is a low-cost autonomous air boat made from off-the-shelf components, and is capable of exploring turbulent open water environments. It's unique air-propelled design and hydro-dynamically stable catamaran hull structure makes MARE suitable for long-term deployment in all types of water bodies. Since it has no moving parts in contact with water, MARE can explore marine ecosystems while causing minimal underwater disturbance.

Heterogeneous Robot Teams

In this work we experimented with a system for monitoring marine environments by a team of heterogeneous robots, comprising of a fixed-wing aerial vehicle, an autonomous airboat, and a legged underwater robot. The goal was to receive a region of interest from a remote human supervisor, and then using the coordinated effort of the robot team, produce a concise summary consisting of a small number of images, which capture the visual diversity of the region of interest. The summary could then be used by a human supervisor to plan for further exploration.

Aqua Amphibious Robot

Aqua is an amphibious six legged robot capable of autonomous operation. Aqua's propulsion is based on six flippers that can provide motion in five degrees of freedom, which is more suitable for tasks requiring high maneuverability, such as coral reef exploration. By using a novel combination of gaits, Aqua can move at various speeds while maintaining its orientation, despite external disturbances. Figure below shows various flipper poses for different desired swimming speeds.
Pictures showing the flippers' angle due to the action of the autopilot system, during one of the sea trials. (a) the robot is performing a heave-up maneuver to maintain depth and attitude at zero forward speed. (b) the robot is executing a combined heave up, pitch up and slow forward speed maneuver. (c) the robot is performing a pitch-up maneuver at high

             Robot Electrical Power

Robots need their batteries! Batteries provide power to the robot . use motors are 12V or 24V . If you're using small motors and don't have the robot weighted down, the motors will not draw much juice so a small mAhr battery pack should be fine. However if you are going to load the robot up and run it in thick carpet or grass, or if you just want a long run time, then the larger AHr batteries would be a better choice.

Battery Wiring

When wiring your batteries to your robot, there are concerns you must address. Namely, what output voltage you need and how you are going to charge the batteries. When using two 12V batteries you will need to wire them in parallel to power 12V motors and in series to power 24V motors.
In a parallel setup, the positive (red) terminals are connected together and the negative terminals are connected to the chassis. In a series setup, the negative terminal of Battery1 is connected to ground and the positive terminal is connected to the negative terminal of Battery2. The positive terminal of Battery2 is then connected to your robot. The way this works, is that the electricity from Battery1 travels through Battery2 and their voltage levels are added together. In a parallel setup, both batteries will share the load of your system. Meaning your motor controller and motors will pull from both batteries equally. This will result in an approximately double the running time.
 Note: Always be sure to place a fuse after each positive battery terminal for safety. The fuse should be sized so that it is as close to the maximum current, without going under.
For charging, it is always best to be able to charge the batteries individually. Batteries should never be charged in parallel. They can be charged in series, as long as you have a balanced load. This means that your robot should only be pulling power from both batteries equally.

Electrical Battery Connectors

We typically bring out 15A connectors attached to the battery terminals to provide easy and secure way to charge the batteries on the robot. Depending on the demands of the robot, 15 amp or 30 amp connectors are used. Please see the images below as a demonstration of proper and improper connector crimps and connectors. We only offer red and black connectors for sale, but for reference (if you buy one of our assembled robots) we include a diagram showing our standard color codes for battery connectors we use during assembly to help us distinguish between the type of battery and the voltage.
How to build a Robot Image How to build a Robot Image How to build a Robot Image How to build a Robot Image How to build a Robot Image
Click on images for larger view

Typical Power Wiring a Robot

There are lots of different ways to wire up a robot.
The key things to consider are what voltages do you need and how much power the driving force for the main battery will be. We typically use 24VDC motors. They run at half the current for the same power as 12V motors so they use smaller wires, motor controllers, etc. Do you need a separate battery for the controller or on-board computer, etc? How are you going to get those voltages (multiple batteries, voltage regulators, etc.)? How much of a load will be on each voltage so your batteries and/or regulators are sized properly? This will help you size your batteries. Simple math states that if you have a 1Amp load and a 10Ahr (10,000mAhr) battery, the battery will run for 10 hours in theory.

Fuses

These are great to put in all over the place to protect components, but not always necessary. Lots of devices have built in overload protection such as switching regulators, smart battery packs, etc. If you are going to put a fuse in, it should be as close to the battery as possible.

Grounding

This is very important! Good ground is essential to protect the robots' components and for electrical noise. We typically put a single ground lug on the aluminium chassis of the robot. All ground leads come to the same point. You do not want multiple grounding locations leading to multiple ground paths/potentials. This can cause all sorts of unexplained trouble. Care must be taken to make sure multiple grounds are not run to the same piece of equipment. This is most common with the motor controller. The signal coming in is usually carrying a ground signal as is the power to the motor controller. This results in a potential ground loop. The signal's ground typically should not be used as it's getting its ground from the power.
How to build a Robot Image How to build a Robot Image How to build a Robot Image How to build a Robot Image How to build a Robot Image

Electrical Motor Hookup



Electrical noise is one of the most frustrating issues when working on robots with DC motors. The EMF coming from the motors will wreak havoc on the micro controllers, any RF equipment, or other sensitive electronic equipment. We recommend you use the following kits to wire your motors. These kits will provide the wiring from the speed/motor controller to the motors. Y

Motor Wiring


                

                      transponder 

                                                               

A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal. The term is a contraction of the words transmitter and respond er. Transponders can be either passive or active. 

A passive transponder allows a computer or robot to identify an object. Magnetic labels, such as those on credit cards and store items, are common examples. A passive transponder must be used with an active sensor that decodes and transcribes the data the transponder contains. The transponder unit can be physically tiny, and its information can be sensed up to several feet away.
Simple active transponders are employed in location, identification, and navigation systems for commercial and private aircraft. An example is an RFID (radio-frequency identification) device that transmits a coded signal when it receives a request from a monitoring or control point. The transponder output signal is tracked, so the position of the transponder can be constantly monitored. The input (receiver) and output (transmitter) frequencies are preassigned. Transponders of this type can operate over distances of thousands of miles.
Sophisticated active transponders are used in communications satellites and on board space vehicles. They receive incoming signals over a range, or band, of frequencies, and re transmit the signals on a different band at the same time. The device is similar to a repeater of the sort used in land-based cellular telephone networks. The incoming signal, usually originating from a point on the earth's surface, is called the up link. The outgoing signal, usually sent to a point or region on the surface, is the down link. These transponders sometimes operate on an interplanetary scale. 
Millions of drivers pass through toll booths every day. Traditionally, the process is to put some change in a basket, which tabulates the coins and opens a gate to allow the driver through. Today, many local and state traffic agencies have installed or are installing electronic readers that allow drivers to pass through toll stations without coming to a complete stop. The names of the systems vary, but they all work in pretty much the same way.
Here are the basic components that make the system work: 
  • Transponder
  • Antenna
  • Lane controller - This is the computer that controls the lane equipment and tracks vehicles passing through. It is networked on a Local area network (LAN).
  • Host computer system - All of the toll plaza LANs are connected to a central database via a Wide area network (WAN).
Drivers usually have to pay a deposit to obtain a transponder, which is about the size of a deck of cards. This device is placed on the inside of the car's windshield behind the rearview mirror. A transponder is a battery-operatedradio frequency identification (RFID) unit that transmits radio signals. The transponder is a two-way radio with a microprocessor, operating in the 900-MHz band. Stored in this RFID transponder is some basic account information, such as an identification number.
Antennas, or electronic readers, are positioned above each toll lane. These antennas emit radio frequencies that communicate with the transponder. The detection zone of an antenna is typically 6 to 10 feet (2 to 3 m) wide and about 10 feet long. These two devices, the transponder and the antenna, interact to complete the toll transaction.
Some electronic toll-collection systems may also include a light curtain and treadles. A light curtain is just a beam of light that is directed across the lane. When that beam of light is broken, the system knows a car has entered. Treadles are sensor strips embedded in the road that detect the number of axles a vehicle has. A three-axle vehicle is charged a higher toll than a two-axle vehicle. These two devices are safeguards to ensure that all vehicles are counted correctly. 
By installing electronic toll-collection systems, government agencies believe that traffic will move faster. The idea is that even if commuters have to slow down for the toll booths, they can get through faster with a system like E-ZPass. Motorists no longer have to worry about stopping to deposit or hand over the toll -- and there is certainly no searching the car for loose change. As long as they've paid on their E-ZPass account, they just have to rely on the lane antenna to read the signals from the transponder.
Here's how the system works:
   
 
  1. As a car approaches a toll plaza, the radio-frequency (RF) field emitted from the antenna activates the transponder.
  2. The transponder broadcasts a signal back to the lane antenna with some basic information.
  3. That information is transferred from the lane antenna to the central database.
  4. If the account is in good standing, a toll is deducted from the driver's prepaid account.
  5. If the toll lane has a gate, the gate opens.
  6. A green light indicates that the driver can proceed. Some lanes have text messages that inform drivers of the toll just paid and their account balance.
The entire process takes a matter of seconds to complete. The electronic system records each toll transaction, including the time, date, plaza and toll charge of each vehicle. Typically, consumers maintain prepaid accounts. A yellow light or some other signal will flash to indicate if an account is low or depleted.
The rules regarding how fast you can pass through the toll plaza vary from system to system. Some traffic agencies allow drivers to pass through the system at 55 miles per hour (86 kph). Others want you to slow down to 30 mph (48 kph), or even 5 mph (8 kph).
These lanes are monitored using video cameras. Some states allow cars to drive right through the toll plaza as the antenna detects the transponder. If you try to go through the plaza without a transponder, the camera records you and takes a snapshot of your license plate. The vehicle owner then receives a violation notice in the mail. 



                                 XXX  .  XXX   Robotic future rushes toward us 


Typical things you would need to be concerned with in electronics for robotics though (others, please feel free to suggest more) are:
  • Sensors
  • Vision systems
  • Motor driving - servos, stepper motors, BLDC, etc
  • Signal conditioning
  • Transmission and communication systems
  • Computer interface technologies
  • Power transmission and control
  • EMI hardening
  • Interlock systems
 So pretty much the entire field of electronic engineering.

micro sensors embedded in their optic nerves . And what they say will be picked up by mobile phone transmitters implanted in their shoulders.
Two years after that, the first factories will be at work in space, making high-quality microchips and pharmaceuticals from very pure crystals grown in space, and shipping the finished products back to earth in autopilot space shuttles.
This is the future, the scientists say today , they are not proposing a robot fairyland.
"We are working on many of these future technologies now .
Some of these future shocks are not just technically possible, they have already been proposed by British government foresight committees. Others are gradually being introduced by commercial groups.
By 2006, "bio metric" signatures will be commonplace. Workers will gain entry, and customers will get their credit balances, at a mere glance, after computer-based optical recognition of the unique pattern of the iris.
Stolen personal technology equipment will refuse to work because it cannot recognise the pattern of the owner's fingerprints. PIN numbers will, like pen and ink signatures, just be "old technology."
People will vote online by 2007 in local and national elections, from mobile terminals anywhere in the world, and the numbers voting will be greater, the researchers say. But the two main parties will suffer at the expense of liberals and minority candidates.

By 2005 viewers "going out" will be a matter of staying in: people will download films, live concerts and football matches to watch at any time, and work on the move with their slimline digital communications devices.
If people do go to the cinema or the supermarket, they will do so without credit cards or cash: the vendor's till will negotiate with customer's "mobile phone wallet", deducting money which will be topped up by automatic wireless contact with the banks. Children won't carry bulging satchels, because all their school textbooks will be available at the touch of a screen.
There will be problems in this electronic, bionic nirvana. Implants will help foreign correspondents get the story swiftly and discreetly - but there won't be many who will go for an optic nerve camera fitment. It could go expensively wrong, and it will raise huge surveillance and civil liberties problems.
Robot taxis, responding to electronic signals from navigation beacons, should be safer, cheaper and more fuel efficient - but their use will become part of a status symbol package, which should drive the price up.
In a cashless, automatically-deducted world, spending money will become alarmingly easy. But internet trading across national boundaries will make tax collection accordingly difficult.
The space factory is, paradoxically, one of the oldest prophecies. Sixties seers confidently expected huge settlements of 10,000 people living and working in vast, wheeling space stations by 2001.
In fact, the International Space Station now being assembled in orbit is behind schedule - but there is increasing pressure from entrepreneurs who want space factories and businesses to grow up around the space station like traders around a western frontier fort.
Some of the Siemens projections are quite conservative. There are probably more than a million industrial robots in the world already. Ian Pearson, employed as a futurologist by BT, several years ago predicted robots will rescue people from burning buildings by 2009 at the latest, followed swiftly by household domestic robots to fetch and tidy, with robot mail delivery and robot personal trainers arriving by 2015.
Advertisement
By 2030 at the latest, he says, there will be more robots than people in developed countries.
Kevin Warwick, professor of cybernetics at Reading University, long ago predicted takeover by machines. Three years ago, he implanted an identification chip and transponder in his arm to make doors open and machines switch on, and introduced himself to the world as "Kevin Warwick, part man, part cyborg."
Meaningful glances
• Bank customers will get their credit balances at a glance as machines recognise unique iris patterns by 2006.
• People will vote online in elections from mobile terminals by 2007.
• Robot controlled taxis will be in use by 2007.
• TV journalists will be able to transmit what they see using sensors in their optic nerves by 2010.
• By 2030, there will be more robots than people in developed countries.



                                XXX  .  XXX  4 zero  The Cyborg Scientist 


Much of the physical world remains invisible to our traditional senses: We must use machines to see ultraviolet light, view infrared radiation, or detect magnetic fields. But “Project Cyborg,” — a research project that has led its brainchild to have implants surgically inserted into his arm — aims to blur the lines between human and machine.

Extending Senses

Extending our senses is nothing new. Magnifying glasses and microscopes have revealed a tiny world teeming with activity invisible to the naked eye. Telescopes help us see things that are too far away to see with our own eyes. Microphones, speakers, and amplifiers help us hear things that are too quiet to detect with our ears. People can certainly detect and measure electromagnetic fields, but this requires instruments outside the person, which then interacts with the person’s senses.
So what’s new with “Project Cyborg”? Implanting a device inside a human, so the device can interact with the human nervous system and brain directly.
Professor Kevin Warwick, University of Reading in the United Kingdom, creates, studies and tries these devices. He even has implants already! In 1998, Professor Warwick began the first phase of what is known as “Project Cyborg”.1 To test out implants, he had an electronic transponder chip implanted in his arm . A transponder is a wireless device that will send out a set of information based on the question it receives.
Project Cyborg Transponder
The photograph on the left is of Professor Warwick holding the transponder, and the right image is a close up of the transponder. Image Credit: The University of Reading.
For example, highway toll booths use this method for fast pass lanes. As you drive through the special toll booth, a computer sends out a query for your name and the account to charge the toll to. The transponder chip, perhaps on a sticker on your car window, sends out your name and your account information. Transponders can also resend a set of information received.
Professor Warwick’s transponder chip allowed the computers in his work building to directly gather information from his chip. When he came near the building, doors would open, lights would turn on, and the speaker system in the building would sound out a greeting to him. The transponder chip was not rejected by his body, signaling a successful first stage of the project.

Phase Two

In 2002, Dr. Warwick started the second phase of his “Project Cyborg” having a new transponder implanted and a neuronal implant. The neuronal implant was a chip with a 4x4 mm array containing one hundred, 1.5 mm long electrodes that went directly into the median nerve of his left forearm.2 The chip was also connected to a connector pad.
Project Cyborg Surgery and Chip
The photograph on the left is of Professor Warwick during surgery implanting the array chip shown on the left. Image CreditThe University of Reading
The connector pad could be hardwired to a computer or connect wirelessly with a digital radio transmitter.2 In this way, Professor Warwick could use his nervous system to link his brain and hand movements to the computer. The neuronal implant was able to send electrical impulses to Professor Warwick’s nervous system, and receive electrical impulses from his nervous system.
The electrical impulses he sent to the array had to be mapped out so that the information could be utilized. For example, when Professor Warwick moved one of the fingers on his left hand, a unique type of electrical impulse was received by the neuronal implant.
By knowing this unique impulse, they could use it as a command to control a device. Similarly, when an external factor sent an electrical impulse through the neuronal implant to his nervous system and brain, Warwick had to figure out what that signal was.2

Chip Control

After six weeks of electric pulses and practice, Professor Warwick was able to use this chip hooked to an ultrasonic detector to determine when objects were getting closer or further away. He could detect the frequency change with his brain when these impulses entered into his nervous system.
He also learned to control a robotic hand using movements of his own hand and receiving a feedback signal from the robotic hand directly into his median nerve. He not only controlled the robot hand wirelessly but also controlled it from overseas via the Internet! While visiting NY, he connected the chip in his median nerve to a computer and sent his brain waves through the Internet to the robotic hand in his lab in England. In turn, he received feedback from the robotic hand through the Internet to his brain!
Robotic Hands
Photos of Professor Warwick controlling a robotic hand, and Prof. Warwick in NY controlling a robotic hand in England by sending his brain waves through the Internet. Image CreditThe University of Reading
Using this same technology, Professor Warwick controlled an electric wheelchair with only hand movements. Within a few hours, he learned to control the speed, turning, and stopping of the chair.
He also had direct brain-to-brain (or nervous system to nervous system) communication with his wife by connecting a chip to her nervous system and hardwiring their nervous systems together. When his wife moved her hand, he received an electrical impulse into his nervous system through the chip in his arm. His nervous system was directly receiving information from her nervous system, and he felt this in his brain in the same way he felt other electrical impulses he had received from the neuronal implant.

A Magnetic Connection

Professor Warwick’s students have implanted small magnets, the size of sesame seeds, into their fingertips. These magnets interact with other magnetic fields, and can cause a vibrating sensation in the magnet-bearing fingers. This is not a direct signal into the nervous system, like the array chip Professor Warwick had implanted into his median nerve. Rather, the movement of the magnet stimulates the nerves in the fingertip.
The magnetic force between two magnetic fields increases as the strength of the magnets increases and as the distance between the two magnets decreases. However, the vibrating sensation the students experience is most likely due to a changing magnetic field.
A fixed magnetic field gives a constant pull on the magnet inside the finger. Similarly, magnetic compasses get pulled to align themselves with Earth’s magnetic field before resting in place. When a magnetic compass interacts with a changing magnetic field, you can see the compass needle spin around rapidly.
Magnetic fields are created by moving charges. Some atoms have their electrons lined up in such a way that create an overall magnetic field. Magnets like the one attached to your fridge are composed of a bunch of such atoms aligned in the right way. Electrical current — or just moving charges — produce magnetic fields, allowing the implants to detect electronic devices.
As an example, consider the magnet (the needle) in a magnetic compass pointing toward Earth’s North Pole. The compass’ magnetic strength is much weaker than the implant but follows the same physical laws.
When another magnet is brought nearby (say from the west), it changes the direction of the magnetic compass needle. Moving around the magnet gives a pronounced movement of the compass needle. The effect of electronic devices, such as cell phones, on the compass needle .
More importantly, just about everything we can measure can be transformed into an electrical signal — sound, light, temperature, distance, speed. These magnetic implants can be used to measure a number of things, if they are coupled to other sensors.
Professor Warwick’s students, in 20108, hooked up ultrasonic or infrared detectors, worn on a hat, and connected the circuitry to a metallic ring that can be worn around the finger with the magnetic implant. Using the ultrasonic detectors, radio waves or sound waves are sent out and received by the electronic sensor.
As the sensor gets closer to an object it receives waves at a higher rate (increased frequency), and as the sensor gets further from an object, the frequency decreases. The overall delay time between the wave sent and received gives information about the location of the object. The implantee feels a vibration in her/his finger with the magnetic implant. As an object gets closer, the vibration in the finger increases. Moving the object further away decreases the vibration.
For temperature detection, one can place circuitry with infrared sensors on a cap and detect temperature differences between objects. These detections are then converted to an electrical signal and felt as a change in the vibration of the implant in the finger.
Again, this magnetic implant does not lead to information being directly input into one’s nervous system and processed by the brain. The array chip implanted into the median nerve requires the brain to learn what the electrical pulses it is receiving mean, process them, and send back a response stimulus. The magnetic implants provide extra input into the sense of touch, extending our senses much like a microscope enhances the use of our eyes.

Future Research
Transponder implants might be used in the future for whatever information you might want to share, such as passport information, credit cards, and medical records. However, care would have to be given to ensure that the data could not be changed or stolen. Continuous discussion goes on about “chipping” children due to fears of kidnapping amidst privacy concerns. This technology has become popular with pet owners.
The idea of using an array chip implant has many applications for people who have lost mobility and may need prosthetics (neuroprosthetics), wheelchairs, or other devices to assist their quality of life.
The magnetic implants or chip arrays may also have many applications in new ways making physical measurements using sensory enhancements.

Research robotics : 

A new human-following robot with a tether steering mechanism is proposed that could be useful in the case of carrying luggage or as a jogging companion. In a crowded or cluttered environment, tether steering has certain advantages over non-contact methods using a camera, laser range finder, or ultrasonic transponder. The proposed robot has a modular architecture that consists of a steering module and two driving modules that communicate with each other using Zig bee wireless communication technology. In addition, motion control algorithms are introduced to provide effortless maneuverability when using the tether steering. A human adaptive algorithm is proposed that estimates the user’s walking velocity to allow the robot to keep pace, while an environment adaptive algorithm performs semi-autonomous navigation to avoid collision with corner shaped obstacles. Experimental results demonstrate the effectiveness of the proposed human following robot.