I-Buttons Based Advanced Access System

Rashmi A Jain, Anand Singhai, Siddharth Jain


In Present Scenario where the knowledge become too
vast and therefore the Human working efficiency rising day to day.
There are few disadvantages like utilization of these technologies.
For example some unauthorized or illegal person can get access of
your system and they have to experience a lot.
Therefore to overcome this mentioned complexity we can build a
control system to avoid this illegal access. It called “Access
Control”, which is a scheme which enables an ability to control
access to areas and resources in a given physical facility or computer
based information system. An access control system, within the field
of physical security, is usually seen as the second layer in the
security or safety of a physical structure. And the advantage of it is
that this system contains very high end verification and
authentication technology which is unable to brake by such
unauthorized element. For this reason we will use the one of the
most recent, next generation and very advanced technology which is

Full Text:



Stallings, William, Ph.D., Data and Computer Communications.2nd ed.,

New York: Macmillan Publishing. 107-112.

Buller, Jon, “High Speed Software CRC Generation”, EDN, Volume 36,

, pg. 210.

S. Bleha, C. Slivinsky, and B. Hussien, Computer access security systems

using keystroke dynamics, IEEE Transactions on Pattern Analysis and

Machine Intelligence12 (1990), no. 12, 1217–1222. 127.

S. A. Bleha and M. S. Obaidat, Computer user verification using the

perceptron algorithm, IEEE Transactions on Systems, Man and

Cybernetics23 (1993), no. 3, 900–902. 127.

M. Brown and S. J. Rogers, User identification via keystroke

characteristics of typed names using neural networks, International Journal

of Man-Machine Studies 39 (1993), 999 – 1014. 127.

W. L. Bryan and N. Harter, Studies in the physiology and psychology of

the telegraphic language, Psychological Review4 (1897), 27–53. 125.

J. Crenshaw, Integer square roots, Embedded Systems Programming

(1998), no. 2.130, 131.

J. D. Garcia, Personal identification apparatus, US Patent 4 621 334,

November 1986. 127 .

Chirutkar harshadkumar Govindrao and Dr. H.N. Pandya “secure digital

access system using I-button”in 2010.

STMicroelectronics, L5973D up to 2 a step down switching regulator

http://www.st.com/ web/catalog/sense power/FM142/CL1854/SC1 575/

PF63225 .

Muhammad Saad Rahman, Buck Converter Design Issues - Master thesis

performed in division of Electronic Devices, Thesis No: LiTH-ISY-EX--

/3854--SE 2007.

Cercel Constantin, Grofu Florin, Nebunu Dana “Modern system for access

security” Annals of the „Constantin Brancusi” University of Tirgu Jiu,

Engineering Series, No.3/2011, pag. 66-75, ISSN 1842 – 4856.

R. Kuhn, Coyne, E. J., and Weil, T. R., "Adding Attributes to Role Based

Access Control," IEEE Computer Society, 2010.

K. Beznosov, "Requirements for access control: US Healthcare domain,"

S. Chong, K. Vikram, and A. C. Myers. Sif: Enforcing confidentiality and

integrity in web applications. Proceedings of the 16th Annual USENIX

Security Symposium, 2007.

Kenneth J. Ayala, "The 8051 Microcontroller Architecture, Programming

& Applications”.


  • There are currently no refbacks.

Copyright © IJETT, International Journal on Emerging Trends in Technology