Manuscript Number : CSEIT11952288
Automatic Authorized Access and Unauthorized Denied Security Data Maintenance for Organization Using RFID Technology
Authors(4) :-Qutubud Din, Akhtar Sayed, Fida Husain Yousafzai, Jiong Yu Using of this latest RFID (Radio Frequency Identification) technology for an organization to improve the efficiency of organization security and maintain the record automatically. Security is the biggest challenge for everything and everywhere it’s the first priority of organization responsible authorities and they must provide the best way to deal these problems with full confidence. With help of RFID Technology it’s more easy and faster to identify the object is authorized or unauthorized to access or denied from the restricted premises. RFID Technology based on two components RFID Reader (Interrogator) & RFID Tags (Transponder). The tag contains an integrated circuit a unique number that number is assign to the object and it’s become the identification I’D of the object. This is used for processing data, modulating and demodulating the radio frequency signal that is being transmitted to RFID Reader, RFID reader read the tag and send the query to database for comparison of information which are exist in the existing database. The tag information is stored in the database the database is pass the query to micro controller the micro controller is perform operation on the base of object requirement and send back the information to database. The developed software performing functionality automatic and authentic. RFID Tags used as ID (identification number) registered in database is presenting the organization concerned object to allow access to the restricted premises otherwise denied the access inside the organization and saved all movement which pass through at the entrance and provide easily understandable, user-friendly and flexible interface for user. Maintain and update all information automatically. To minimize manually checking and record maintenance headache.
Qutubud Din Authorized Access, Unauthorized Denied, Identification I'D, RFID and RFID Tags. Publication Details Published in : Volume 5 | Issue 2 | March-April 2019 Article Preview
School of Software College, Xinjiang University, Urumqi, Xinjiang China and Computer Science and Information Technology, University of Swat, Swat, KPK, Pakistan
Akhtar Sayed
Computer Science and Information Technology, University of Swat, Swat, KPK, Pakistan
Fida Husain Yousafzai
Computer Science and Information Technology, University of Swat, Swat, KPK, Pakistan
Jiong Yu
School of Software College, Xinjiang University, Urumqi, Xinjiang China
Date of Publication : 2019-04-30
License: This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 1051-1057
Manuscript Number : CSEIT11952288
Publisher : Technoscience Academy
Journal URL : https://res.ijsrcseit.com/CSEIT11952288
Citation Detection and Elimination |
| |
BibTeX | RIS | CSV