Identifying people or objects with a computer may seem like an easy task, but, in reality, there is a lot of technology behind the devices used to accomplish this task.
In this chapter, we are going to use a smart card reader and two kinds of RFID readers (a Low Frequency or LF reader suitable for short ranges and an Ultra High Frequency or UHF reader suitable for long ranges) in order to show different possibilities to implement a minimal identifying system for access control.
Once the detection has been done, the system will send a message to our Twitter account informing our followers about what is happening (in a normal case, we may lock or unlock something, but I decided to do something different).
The smart cards and the smart card readers, for example, are complex devices that are used everywhere nowadays, from our credit cards to our smartphones. The term smart card implies a set of technologies, including integrated circuits, microprocessors, memories, antennas, and so on, in the same integrated circuit, to form a microchip that is the heart of a smart card. On the other hand, the smart card readers are complex devices that can communicate with the cards and save data on it or return data to a computer.
The reader can get more information regarding the smart card world by taking a look at https://en.wikipedia.org/wiki/Smart_card.
The evolution of smart cards are the Radio-Frequency Identification (RFID) devices that can be used to identify people or objects in a contactless form, starting from a few centimeters to several meters. The RFID readers and the corresponding tags (or transponders) are high technology radio devices that can exchange data to each other in order to accomplish identification tasks.
The reader can get more information regarding the RFID world by taking a look at https://en.wikipedia.org/wiki/Radio-frequency_identification.
This time, all the complexity of this project is inside the hardware devices (the smart card reader and the RFID readers) and their corresponding software managers, so we only have to write the code to get access to them and retrieve the data held in the smart cards or the RFID tags only.
In order to show different techniques to manage an identification device, we're going to write three programs (one per device) in three different programming languages. However, the result of all programs will be the same: when a well-defined person (or object) has been recognized, a message will be sent to our Twitter account.
To accomplish this last task, we're going to use a dedicated (and interesting) tool that allows the user to manage a Twitter account from the command line.
Every identification system has its own characteristics; however:
18.218.70.93