5
RFID Toys Cool Projects for Home, Office, and Entertainment Amal Graafstra WILEY Wiley Publishing, Inc. © 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network.

DE0013E92295B1EFA8740C125729800470CB7 (1)

Embed Size (px)

Citation preview

RFID ToysCool Projects for Home, Office, and Entertainment

Amal Graafstra

WILEY

Wiley Publishing, Inc.

© 2008 AGI-Information Management Consultants

May be used for personal purporses only or by libraries associated to dandelon.com network.

rContents

Acknowledgments xi

Introduction xii

Chapter 1: Getting Started with RFID 1What Is RFID? 1

Early RFID — IFF 2RFID Tags and Interrogators 2

Contemporary Uses of RFID 3RFID Basics 4

RFID Standards 4Data Encoding and Transmission 5

Project Preparations 6Security 6Safety 7

Chapter 2: Getting in the Front Door 9Electronic Strike 9Electronic Deadbolt 10Parts and Tools 11Get Started 12

Step 1: Build the RFID Control Box 12Step 2: Prepare the Keypad Deadbolt 24Step 3: Install the RFID Control Box 29Step 4: Install the Electronic Strike and Deadbolt 33Step 5: Set Up the Software ; 37

Chapter 3: Stepping into Your Car 43Parts and Tools 44Get Started 44

Step 1: Solder Together the KL042 Circuit 45Step 2: Secure the RFID Antenna 48Step 3-A: Prepare the Keyless Entry Remote 54Step 3-B: Prepare Power Lock Actuator 58Step 4: Wire Up and Encase the KL042 59Step 5: Mount the Antenna 64Step 6: Install the RFID Control Box 65Step 7: Install the Door Lock Actuator 66

VIII Contents

Chapter 4: Logging into Windows XP Using RFID 77

Parts and Tools 78Build the Hardware 79

Step 1: Prepare the Keyboard 79Step 2: Prepare the RFID Reader JL 82Step 3: Prepare the USB Hub 83Step 4: Connect Components 86Step 5: Test Connections 90Step 6: Add More Ports (Optional) 92Step 7: Mount Components Inside the Casing 93Step 8: Reassemble the Keyboard and Test 94

Configure Your Computer for RFID Authentication 95Step 9: Replace Your Windows GINA 95Step 10: Set Up RFID Tags for Authentication 100

A Word on Security 103RFID Security 103Registry Security 103

Chapter 5: Building an RFID-Enabled Safe 105Parts andTools 107Get To It 108

Step 1: Take Apart the Electronic Safe 108Step 2: Program the BASIC Stamp 2 114Step 3: Build the Interface Circuitry 118Step 4: Mount the RFID Reader Board 126Step 5: Build the RFID Control Circuitry 127Step 6: Test and Reassemble the Safe 131

Chapter 6: Taking Inventory with an RFID-Enabled Smart Shelf 133Parts and Tools 135Build It 135

Step 1: Build the Shelf 135Step 2: Wire the Reader 139Step 3: Tag Your Inventory 143Step 4: Connect and Take Inventory 145Step 5: Build Your Own Antenna (Optional) 148

Chapter 7: Letting Fido in with an RFID Pet Door 157Parts andTools 157Build It 158

Step 1: Program the BASIC Stamp 2 158Step 2: Prepare the Stamp Board 162Step 3: Wire the SkyeTek Ml Module 168

Step 4: Put It All in a Project Box 171Step 5: Prepare the Pet Door 171Step 6: Place the Antenna 175

Chapter 8: Tracking Employees and Time with Active RFID 183Parts and Tools 184Hardware 185

Wavetrend L-RX201 Reader 185Wavetrend L Series Tags 188Where to Get This Stuff. 192

Get Started 192Step 1: Wiring the Reader 192Step 2: Time to Tag 194Step 3: Download the Software 200Step 4: Use HomeSeer 204

Chapter 9: Monitoring Assets and Sending Alerts 209Parts andTools 210Get Started 211

Step 1: Connect the Reader 211Step 2: Tag Your Assets 212Step 3: Download the Software 214Step 4: Extend the Coverage Area 217Step 5: Control Antenna Switching 236

Summing Up 240

Chapter 10: The Three R's — Reading, wRiting, and RFID 241Parts and Tools 243Working with Data 243

Data Schema — A Brewery Application 243Byte-Level Data Mapping 244Shaking Things Up 246

The Project 252Step 1: Program the BASIC Stamp 252Step 2: Prepare the Project Box 256Step 3: Prepare the Microprocessor 258Step 4: Connect the SkyeTek Ml Module 264Step 5: Fit It All In 266

Summing Up 270Data Schema 270Binary Data 270RFID Read/Write Devices 270

Chapter 11: Extreme RFID 273Home Automation 273

Interfacing with X10 273X10 Control Modules 275

What Others Are Doing JL 277Spime 277Producing Spime 278Interactive Art 279Becoming Spime: Implantable RFID Tags 279My Left Hand 281My Right Hand 282Removal and Replacement 283VeriChip Implant 284Better than aToe-tag—RFID for the Dead 284Other Implant Resources 284

Creative Uses for RFID 285Chipping Chips 285RFID Used for Positioning Systems 285Binding Physical Mediums to Relational Data 286Advances in RFID Tag Technology 286

The Bottom Line 286

Appendix A: Hardware Overview 287

Index 303