Sign In to Follow Application
View All Documents & Correspondence

Rfid Based Vehicle Identification System And Access Control Into Parking

Abstract: Present invention revolves around the problem definition RFID Based Vehicle Identification and Access Control into parking, providing automated identification of vehicles using RFID system. It also provides an access control mechanism for the parking area by authorizing the vehicles using the RFID tags. The UID of the RFID tag will be stored in the database and will fetched every time the vehicle comes or wishes to come into the parking area. If the UID matches with the one stored against the vehicle information stored into the database, the vehicle will get an access into the parking area. We will also provide business intelligence tools such as Report Generation for making management decisions. Such reports may be used for further planning. In such way a complete Parking Identification System is proposed in the problem definition. Following invention is described in detail with the help of Figure 1 of sheet 1 showing Vehicle Check-in flowchart describing the check-in process, Figure 2 of sheet 2 showing Vehicle Check-in flowchart describing the check-in process, Figure 3 of sheet 3 showing Vehicle approaching the RFID reader antenna, Figure 4 of sheet 3 showing RFID antenna detecting the tag, Figure 5 of sheet 4 showing Vehicle Check-out flowchart describing the check-out process, Figure 6 of sheet 5 showing breakdown structure of the invention.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
21 May 2013
Publication Number
22/2013
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
sjgawande@gmail.com
Parent Application

Applicants

1. Dr. Sanjay Trymbak Gandhe
Principal, Sandip Foundation’s Sandip Institute of Technology and Research Centre, Mahiravani, Trimbak Road, Nashik

Inventors

1. Prof. Amol D. Potgantwar
Department of Computer Engineering, Sandip Foundation’s Sandip Institute of Technology and Research Centre, Mahiravani, Trimbak Road, Nashik
2. Anurag Hemant Wad
Department of Computer Engineering, Sandip Foundation’s Sandip Institute of Technology and Research Centre, Mahiravani, Trimbak Road, Nashik
3. Pranav Prakash Pandit
Department of Computer Engineering, Sandip Foundation’s Sandip Institute of Technology and Research Centre, Mahiravani, Trimbak Road, Nashik
4. Sidhesh Kumar
Department of Computer Engineering, Sandip Foundation’s Sandip Institute of Technology and Research Centre, Mahiravani, Trimbak Road, Nashik

Specification

CLIAMS:We claim:
1. RFID Based Vehicle Identification and Access Control into parking, providing automated identification of vehicles using RFID system which provides an access control mechanism for the parking area by authorizing the vehicles using the RFID tags and the UID of the RFID tag will be stored in the database and will fetched every time the vehicle comes or wishes to come into the parking area means if the UID matches with the one stored against the vehicle information stored into the database, the vehicle will get an access into the parking area.
2. In the invention as claimed in claim 1 the interaction of the modules in the system basically deals with information flow from one sub module to another through communication networks where
a) the end users (Administrator and/or other employees) interact with the RFID reader by using our parking management system;
b) interaction with the RFID reader would be provided by using communication networks;
c) the systems will also have a database which will be connected to the system for recording transactions;
d) the RFID reader will interact with the tag on the vehicle and in-turn the vehicles will interact with the RFID readers by sending acknowledgements.
3. In the registration module of the invention as claimed in claim 2 comprises of:
a) employee registration where the employee/administrator who is going to use the system will be registered with the system and all the relevant information regarding the employee will be stored into the database along with employee logins, their user-name and password will also be generated in this module and a unique employee number will also be generated and this employee number would be the username for the employee to log into the system;
b) vehicle registration module where the vehicle will be registered by the employee who has logged into the system and relevant information regarding the vehicle will be stored into the database against the tag which will be affixed to the vehicle.
c) vehicle identification module where the vehicle will be scanned by the RFID reader antenna and tag affixed on the vehicle will return the tag value and this tag value will be queried with the database where if relevant information is found, further action would be taken as required, else the vehicle would be either asked to be registered or would not gain access to the parking;
d) database management module show the database and will reveal the tables;
e) report generation/business intelligence module will help the employee of the parking system to generate reports favorable for his business development where reports regarding the following will be generated according the convenience of the system administrator all Vehicle Transactions, employee details, owner details, owner vehicle registration, vehicle’s transaction etc;
f) help module will provide help to the end user of this system means typically the help module will provide docs regarding the intended use of the system and also provide manuals such as what are the technical specifications of the system;
g) surveillance module employee will be able to survey the parking area with the help of installed cameras;

4. Structure of the invention as claimed in claim 3 comprises mainly of subordinator, gate in charge, validate, database server, RFID reader, cameras, display console, parking lot, vehicle etc.

5. In the behavioral modeling of the invention as claimed in claim 4:
a) the RFID entry point and exit point readers are generalized as RFID readers;
b) the ENTRY point RFID reader detects the incoming vehicle willing to get parked when the same comes under the coverage range of the reader, the ETNRY point reader and the TRASNSPONDER on the wind shield of the vehicle interacts, the ENTRY point READER forwards the information to the database, where the detection event fires a validation query, if the validation is successful then the vehicle is signaled to get in;
c) at the same time the vehicle driver will check the console in order to find out a suitable place for parking;
d) the display will be displaying the engaged and unengaged places conspicuously with the help of different colour codes in a grid layout manner, so that any novice user could easily recognize the vacant place for parking;
e) in addition to that the display, will also show the details against the subjected vehicle if required and demanded by privileged authority;
f) the updating process will include the validation of the database;
g) furthermore, the cameras will provide a helping hand in surveillance of the parked vehicle thus enhancing the security related aspects, several cameras will cover the whole parking areas and would to a simultaneous surveillance so that any unexpected activity can be caught and recorded;
h) unregistered vehicles will be directed to a separate area where they could get parked themselves or if required a temporary tag will be allocated to that vehicle and it would be let in into the usual parking lot meant for registered vehicles;
i) at the exit point the EXIT point reader proves its significance, when the vehicle would go to the exit point it would come under the range of the EXIT point reader and the reader will detect the tag on the wind shield of the vehicle;
j) as soon as the vehicle will be leaving the parking area ,an exit status will be assigned to the vehicle against its entry into the database and the corresponding date and time will be saved which is the most important entry.
,TagSPECI:FORM 2
THE PATENT ACT 1970
(39 OF 1970)
AND
The patent rules, 2003
COMPLETE SPECIFICATION
(See section 10: rule 13)

1. TITLE OF INVENTION

RFID Based Vehicle Identification System and Access Control into Parking

2 APPLICANTS

Name Nationality Address
Dr. Sanjay Trymbak Gandhe Indian Principal, Sandip Foundation’s Sandip Institute of Technology and Research Centre, Mahiravani, Trimbak Road, Nashik.

3. PREAMBLE TO THE DESCRIPTION

COMPLETE

Following specification particularly describes the invention and the manner in which it is to be performed.

4. DESCRIPTION.

Technical field of invention:
Following invention in general relates to radio frequency identification technology (RFID) and in particular to implementation of RFID technology for the purpose of Vehicle Identification System and Access Control into Parking.

Prior art:
Radio Frequency Identification (RFID) is a technology that helps to identify the animate or the inanimate through radio waves. RFID is one of the most fundamental technologies enabling wireless data transmission. However, RFID is not a single, simple technology. It consists of tags, readers, computer networks, and systems including middle-ware, databases, and so forth. There has been a considerable amount of reduction in transaction costs and decrease in stock shortage with the use of RFID technology in automation. Most of the RFID networks include a wide range of automation technologies. These technologies are RFID readers, RFID writers, RFID bar-code scanners, RFID smart sensors and RFID controllers. The use of RFID technology is expanding rapidly in numerous applications such as logistics, supply chain management, transportation, healthcare and aviation. Due to the variety of the current applications, typical RFID systems use application specific hardware and proprietary protocols. The integration of business systems with factory floor automation is a challenge with many aspects to consider. However, one bright spot is clearly visible: RFID information technology, which helps bridge the gap. RFID is enabling companies to see further into the supply chain than ever before, providing more accurate real-time information and improvements in process efficiency.
Although it has been known for a long time, it has not been widely used in industry. Because it was expensive and there was no standardization among the manufacturing companies, it took it a long time to be widely utilized. RFID is becoming an important identification technology in applications such as inventory management, security access, personnel identification, factory automation, automotive toll debiting, and vehicle identification to name just a few.

Rapid advancements in RFID technology and ubiquitous nature of the RFID readers help to develop and deliver new system which makes life more comfortable and simple. In recent years all-most every country in this world has provided substantially in financial resources and these resources have been allocated to vehicle and auto-mobile sector. Technological development and automotive development has proven helpful in this makeshift. This tread is resulting in a greater demand for vehicle management and parking services and a greater competition among technical services providers. Achieving a high operational efficiency in the vehicle parking sector is an essential goal for a organizational performance evaluation. Efficiency and correctness used to be considered as a primary indicator of vehicle management performance. In the last few years vehicle management providers are making a concerted effort in using Information Technology for bringing down the spiraling vehicle management cost across the globe. In order to bring down the cost and improve efficiency, intelligent systems can play a significant role in providing intelligently processed and personalized information about the vehicle and the parking areas.
Although lot of work has been done with RFID in the real sectors like shopping, transportation, ticketing and entrance control, access control and asset management, but no significant work had been done in RFID in parking management along with access control.
Present invention revolves around the problem definition RFID Based Vehicle Identification and Access Control into parking, providing automated identification of vehicles using RFID system. It also provides an access control mechanism for the parking area by authorizing the vehicles using the RFID tags. The UID of the RFID tag will be stored in the database and will fetched every time the vehicle comes or wishes to come into the parking area. If the UID matches with the one stored against the vehicle information stored into the database, the vehicle will get an access into the parking area. We will also provide business intelligence tools such as Report Generation for making management decisions. Such reports may be used for further planning. In such way a complete Parking Identification System is proposed in the problem definition.

Object:
1. Primary object of this invention is to facilitate a smooth functioning of the Vehicle Parking by identifying it first and later providing access control to the parking area using RFID technology.
2. Further object of present invention is to provide more precise, easy to apply and accurate module for vehicle parking system.
3. Other object of present invention is to develop an hardware and software module for implementation of RFID technology for vehicle parking.

Further objects and features can be readily understood by any person skilled in the art by referring to the detail description and appended claims of the invention.

STATEMENT:
Following invention provides RFID Based Vehicle Identification and Access Control into parking, providing automated identification of vehicles using RFID system. It also provides an access control mechanism for the parking area by authorizing the vehicles using the RFID tags. The UID of the RFID tag will be stored in the database and will fetched every time the vehicle comes or wishes to come into the parking area. If the UID matches with the one stored against the vehicle information stored into the database, the vehicle will get an access into the parking area. We will also provide business intelligence tools such as Report Generation for making management decisions. Such reports may be used for further planning. In such way a complete Parking Identification System is proposed in the problem definition. The interaction of the modules in the system basically deals with information flow from one sub module to another through communication networks. The end users (Administrator and/or other employees) interact with the RFID reader by using our parking management system. Interaction with the RFID reader would be provided by using communication networks. The systems will also have a database which will be connected to the system for recording transactions. The RFID reader will interact with the tag on the vehicle and in-turn the vehicles will interact with the RFID readers by sending acknowledgements.

BRIEF DESCRIPTION OF DRAWING:
The invention is described by way of example with reference to the following drawings:
Figure 1 of sheet 1 showing Vehicle Check-in flowchart describing the check-in process where
1 denotes check-in point
2 denotes read vehicle ID
3 denotes is the vehicle registered?
4 denotes register the vehicle into database
5 denotes did the vehicle check-in?
6 denotes do not open the gate
7 denotes database
8 denotes read vehicle information
9 denotes store check-in information
10 denotes open the gate
11 denotes close the gate

Figure 2 of sheet 2 showing Vehicle Check-in flowchart describing the check-in process where
1 denotes check-in point
10 denotes open the gate
11 denotes close the gate
12 denotes read vehicle Id
13 denotes vehicle category same as that of section category
14 denotes inform to system administrator
15 denotes allow vehicle to park inside the assigned section
16 denotes update the section count accordingly
17 denotes database

Figure 3 of sheet 3 showing Vehicle approaching the RFID reader antenna where
18 denotes tag
19 denotes antenna
20 denotes reader system
Figure 4 of sheet 3 showing RFID antenna detecting the tag where
18 denotes tag
19 denotes antenna
20 denotes reader system

Figure 5 of sheet 4 showing Vehicle Check-out flowchart describing the check-out process where
10 denotes open the gate
11 denotes close the gate
21 denotes check-out point
22 denotes read vehicle ID
23 denotes is the vehicle registered
24 denotes do not open the gate
25 denotes did the vehicle checked in
26 denotes read the vehicle information
27 denotes database
28 denotes update checkout information

Figure 6 of sheet 5 showing breakdown structure of the invention where
29 denotes RFID based parking management system
30 denotes veh/emp registration
31 denotes master module
32 denotes configuration module
33 denotes report generation
34 denotes camera surveillance

In order that the manner in which the above-cited and other advantages and objects of the invention are obtained, a more particular description of the invention briefly described above will be referred, which are illustrated in the appended drawing. Understanding that these drawing depict only typical embodiment of the invention and therefore not to be considered limiting on its scope, the invention will be described with additional specificity and details through the use of the accompanying drawing.

Detailed description:
The interaction of the modules in the system basically deals with information flow from one sub module to another through communication networks. The end users (Administrator and/or other employees) interact with the RFID reader by using our parking management system. Interaction with the RFID reader would be provided by using communication networks. The systems will also have a database which will be connected to the system for recording transactions. The RFID reader will interact with the tag on the vehicle and in-turn the vehicles will interact with the RFID readers by sending acknowledgements.

Registration Module:

Employee Registration:
In this module the employee/administrator who is going to use the system will be registered with the system. All the relevant information regarding the employee will be stored into the database. Employee logins their user-name and password will also be generated in this module. A unique employee number will also be generated and this employee number would be the username for the employee to log into the system.

Vehicle Registration
In the vehicle registration module, the vehicle will be registered by the employee who has logged into the system. Relevant information regarding the vehicle will be stored into the database against the tag which will be affixed to the vehicle. The owner information will also be stored in the system database for business intelligence purpose. The customer will also get a unique customer id which will help us to identify the vehicle as a primary key. Further transactions related to this vehicle will also be governed by this unique key. The registration date, validity and such other parameters will also be asked for ad stored into the system.

Vehicle Identification Module
In this module the vehicle will be scanned by the RFID reader antenna and tag affixed on the vehicle will return the tag value. This tag value will be queried with the database. If relevant information is found, further action would be taken as required. Else the vehicle would be either asked to be registered or would not gain access to the parking.

Database Management Module
Database management module will like its name suggests, show the database and will reveal the tables. For confidentiality the abstraction will only show the information in administrative privileged login. The database management module will facilitate search and modify the vehicles. The search could be performed upon various parameters.

Report Generation/Business Intelligence Module
The report generation module will help the employee of the parking system to generate reports favorable for his business development. Reports regarding the following will be generated according the convenience of the system administrator.

? All Vehicle Transactions
? Employee Details
? Owner Details
? Owner Vehicle Registration
? Vehicle’s Transaction

Help Module
In this module the system will provide help to the end user of this system. Typically the help module will provide docs regarding the intended use of the system. It will also provide manuals such as what are the technical specifications of the system. This module will be highly effective for using the system in the intended way for novice users.

Surveillance Module
In this module the employee will be able to survey the parking area with the help of installed cameras.

SOFTWARE REQUIREMENT

General Aspect
The specification is intended to provide the environmental and software functional requirements for RFID based Vehicle Identification System and Access Control into Parking being developed.

Initiating the Process
The most commonly used analysis technique to bridge communication gap between customer and the developer and to get the communication process started.

Information Domain
The information domain consists of three different views of the data and control and each is processed by a computer program. Information contents and relationships For the information and relationships be collected specific needs about the requirement of the customer, noting down the field names and functionalities of the system. Information flow It represents the manner in which data and control moves through the system. This is required for the analysis of flow of control in the system giving the idea abput the different modules and parts of the software system. Information structure It represents the internal organization of various data and control items. It provides us the information about the data structure, files and tables to be used with functionalities in the system.

Process Model
The process model is an approach to the development of any application for the customer. The goal of system design is to produce a model or representation that exhibit, commodity and delight. It provides information about the application domain for the software to be built. It fully describes the internal details of each software. The spiral model combines the idea of iterative development (prototyping) with the systematic, controlled aspects of the waterfall model. It allows for incremental releases of the product, or incremental refinement through each time around the spiral. The spiral model also explicitly includes risk management within software development. Identifying major risks, both technical and managerial, and determining how to lessen the risk helps keep the software development process under control. The spiral model is based on continuous refinement of key products for requirements definition and analysis, system and software design, and implementation (the code). At each iteration around the cycle, the products are extensions of an earlier product. This model uses many of the same phases as the waterfall model, in essentially the same order, separated by planning, risk assessment, and the building of prototypes and simulations. Documents are produced when they are required, and the content reflects the information necessary at that point in the process. All documents will not be created at the beginning of the process, nor All at the end (hopefully). Like the product they define, the documents are works in progress. The idea is to have a continuous stream of products produced and available for user review. The spiral life-cycle model allows for elements of the product to be added in when they become available or known. This assures that there is no conflict with previous requirements and design. This method is consistent with approaches that have multiple software builds and releases and allows for making an orderly transition to a maintenance activity. Another positive aspect is that the spiral model forces early user involvement in the system development effort. For projects with heavy user interfacing, such as user application programs or instrument interface applications, such involvement is helpful.

Starting at the center, each turn around the spiral goes through several task regions
Determine the objectives, alternatives, and constraints on the new iteration.
Evaluate alternatives and identify and resolve risk issues.
Develop and verify the product for this iteration.
Plan the next iteration.

Note that the requirements activity takes place in multiple sections and in multiple iterations, just as planning and risk analysis occur in multiple places. Final design, implementation, integration, and test occur in iteration 4. The spiral can be repeated multiple times for multiple builds. Using this method of development, some functionality can be delivered to the user faster than the waterfall method. The spiral method also helps manage risk and uncertainty by allowing multiple decision points and by explicitly admitting that all of anything cannot be known before the subsequent activity starts.

Breakdown Structure (Modules)

The system is further divided into sub-modules for convince of the end user. The modules are broken down and described as follows.

Registration
The Registration module covers the Registration of the Vehicle as well as the employees regarding the vehicle. The registration process is further divided into 2 sub modules. The modules are as follows:

Vehicle Registration
The Vehicle Registration module covers the Registration of vehicles in the system as if the vehicle is to be given registration for a certain period. The registration module also provides access to the database making suitable procedures for the database.
Employee Registration
The Employee registration module covers the registration of the employees regarding the working of the system. The employee registration also covers the registration of the employees and provides access to the database using the procedures. This module also provides username and password access to the system for the new users to the system.

Master Module
The vehicle identification module covers the identification of the vehicle by use of RFID. The master module covers the identification of the vehicle and also displays the IN gate and OUT gate information of the parking lot. IN and Out gates have antennas installed over the gate. The antennas send information regarding the vehicle tag to the server computer. The server also makes relevant entry to the system and makes entry into the database using stored procedures and functions. This module also covers the information regarding the vacancy in the parking lots of the system. The Master Module also covers the display of information of vehicles in the parking area. Relevant tables also display the information regarding the information of the vehicles parked in the parking area.

Configuration Module
The configuration module is usually used for the configuration for the proposed system. The configuration module is further used for basic settings of the system and making some typical settings of the reader and the antennas. The configuration module can be further divided into two parts.
The hardware configuration module and
the settings module.

Hardware Configuration Sub-Module
The Hardware configuration module is basically meant for the basic configuration of the proposed system hardware. The hardware includes the RFID reader, its antennas, the cameras to be installed for the system and so on. The basic intention of the module is to save the hardware configuration of the intended and installed software into the system. This hardware databases is also used for further configuration so as to make the system as dynamic as possible.
Properties Sub-Module The properties sub module is designed to set the basic properties of the system. The properties pertaining to the system include the system characteristics such as the area of the parking, its total vacancies and so on. But the basic intent of this sub-module is again to make suitable properties embedded into the database.

Camera Surveillance
The camera surveillance module includes the surveillance of the proposed system at strategic locations such as ’entry’ gate, the ’exit’ gate the inside parking category entrances and so on. The basic intent of dividing this functionality into a sub-module is to make a clear distinction between camera and the RFID system. This will provide better user functionality and will make surveillance easier.

Report Generation/Business Intelligence
Business intelligence is one of the basic needs of an enterprise. Thus this task is for user convince divided into a sub-module. The report generation module will help the system administrator extract typical information from the system which will make changes in the business strategies for the system. One of the basic assets for the proposed system are the vehicles that are registered with the system and outsource the employees that will work along with the system. Thus we would be providing reports that will contain the basic information for the system. Such reports will also be useful in making vital business decisions. Vehicle Reports The system will provide vehicle reports to the system administrator. Such vehicle reports may be such as when n which vehicle was registered with the system, when will the registration expire what was the registration date, who was responsible for the registration and so on. The system will also generate reports such as all vehicle transactions, vehicle transactions of some special dates, vehicle transactions for a date range and so on.
Employee Reports
Employee reports will typically help the system personnel department. Reports having information such as which employee logged into the system and when and so on. It will also generate reports of the employee regarding their user name and passwords for logging into the system. Of-course such information will only be accessible to certain employees as this is very vital information.

Behavioural Modelling
The use case describes the dynamic behaviour of the system and supporting the flow of the system as well. It is describing all the possible actors and their interaction with the other static and dynamic components of this RFID based system. Here the RFID entry point and exit point readers are generalized as RFID readers. The ENTRY point RFID reader detects the incoming vehicle willing to get parked when the same comes under the coverage range of the reader, the ETNRY point reader and the TRASNSPONDER on the wind shield of the vehicle interacts, the ENTRY point READER forwards the information to the database, where the detection event fires a validation query, if the validation is successful then the vehicle is signalled to get in. At the same time the vehicle driver will check the console in order to find out a suitable place for parking. The display will be displaying the engaged and unengaged places conspicuously with the help of different colour codes in a grid layout manner, so that any novice user could easily recognize the vacant place for parking, in addition to that the display, will also show the details against the subjected vehicle if required and demanded by privileged authority. The updating process will include the validation of the database. Furthermore, the cameras will provide a helping hand in surveillance of the parked vehicle thus enhancing the security related aspects, several cameras will cover the whole parking areas and would to a simultaneous surveillance so that any unexpected activity can be caught and recorded. Unregistered vehicles will be directed to a separate area where they could get parked themselves or if required a temporary tag will be allocated to that vehicle and it would be let in into the usual parking lot meant for registered vehicles .At the exit point the EXIT point reader proves its significance, when the vehicle would go to the exit point it would come under the range of the EXIT point reader and the reader will detect the tag on the wind shield of the vehicle , as soon as the vehicle will be leaving the parking area ,an exit status will be assigned to the vehicle against its entry into the database and the corresponding date and time will be saved which is the most important entry.

Class diagram is helpful in describing the structural behaviour of the system. It rather shows how the real time entities of the system can interact with each other.
To specify the structural behaviour of our system we have 11 classes as follows:

? Subordinator
? Gate in charge
? Validate
? Database Server
? RFID reader
? Cameras
? Display Console
? Parking lot
? Vehicle

Method of working:

The proposed system can be roughly divided into 4 parts viz. registration, check-in, parking verification, check-out. The following section describes the detailed working of the proposed system.

1 Vehicle Registration
The system begins with the registration of the basic employees. The employee registration can be performed for both the normal employees as well as the administrators. For registration purpose, a Administrator will be pre registered with the system. With the pre-registered administrator account, the administrator will register the willing vehicles in to the system. A tag will be affixed onto the windscreen of the vehicle. While the tag is affixed the corresponding information regarding the vehicle will also be enrolled into the system and will be stored into the database in the respective tables. In such a way the registration process will be carried out.

2 Vehicle Check-In
When an RFID-labeled vehicle attempts to check-in to a parking-lot, the system queries whether the vehicle is registered to the database or not? This can be done by scanning the RFID tag affixed in the registration process by the antennas that is mounted at the entry gate. If it is a registered vehicle and it has not checked out of an unauthorized RFID-enabled parking-lot, the system will allow the vehicle to enter into the parking area through its entrance. Upon the entrance, the vehicles identification information, entrance date and time and current parking-lot title are recorded RFID Based Vehicle Identification and Access Control into Parking 11 in vehicle transaction table in the database of the system. The check-in information carries great importance since it will be compared to the check-out information of the vehicle. If a vehicle has made an unauthorized check-out of a parking-lot, the vehicle will not be able to check-in to any of the RFID-enabled parking-lots. Upon receiving the approval, the barrier lifts up and initiates the check-in process.

3. Parking Verification:
Once the vehicle has moved inside the parking area, the vehicle is supposed to move to its correct allocated location (based upon its vehicle category). Thus in order to verify if the vehicle moves in its correct location, we will check its tag and query the database with the tag allocated to it. If the vehicle is entering in correct location, the vehicle will be allowed to park, otherwise if the vehicle is not supposed to enter that particular area, the system will alarm the manager/administrator by simply making an alarm or showing a predefined signal. By doing this, we will make the parking system employee aware about the miss happenings in the parking area.

4 Vehicle Check-out
When a vehicle drives into the exit area of the parking-lot to check-out, its identification information is queried again on the database. If the vehicle is registered to the system and it has not made an unauthorized entry to the parking-lot the check-out process is initiated. The vehicle’s check-out date and time is taken into consideration. Upon the check-out, the check-in information of a vehicle is found and updated with check-out information. The check-out information means check-out date, time. When the exit is authorized, the barrier is lifted again and the vehicle is allowed to move out. Also A corresponding entry is made in the vehicle parking lot table and such a vacancy is shown in the table of available parking areas.

Additional advantages and modification will readily occur to those skilled in art. Therefore, the invention in its broader aspect is not limited to specific details and representative compositions described herein. Accordingly various modifications may be made without departing from the spirit or scope of the general invention concept as defined by the appended claims and their equivalents.

CLAIMS:
We claim:
1. RFID Based Vehicle Identification and Access Control into parking, providing automated identification of vehicles using RFID system which provides an access control mechanism for the parking area by authorizing the vehicles using the RFID tags and the UID of the RFID tag will be stored in the database and will fetched every time the vehicle comes or wishes to come into the parking area means if the UID matches with the one stored against the vehicle information stored into the database, the vehicle will get an access into the parking area.
2. In the invention as claimed in claim 1 the interaction of the modules in the system basically deals with information flow from one sub module to another through communication networks where
a) the end users (Administrator and/or other employees) interact with the RFID reader by using our parking management system;
b) interaction with the RFID reader would be provided by using communication networks;
c) the systems will also have a database which will be connected to the system for recording transactions;
d) the RFID reader will interact with the tag on the vehicle and in-turn the vehicles will interact with the RFID readers by sending acknowledgements.
3. In the registration module of the invention as claimed in claim 2 comprises of:
a) employee registration where the employee/administrator who is going to use the system will be registered with the system and all the relevant information regarding the employee will be stored into the database along with employee logins, their user-name and password will also be generated in this module and a unique employee number will also be generated and this employee number would be the username for the employee to log into the system;
b) vehicle registration module where the vehicle will be registered by the employee who has logged into the system and relevant information regarding the vehicle will be stored into the database against the tag which will be affixed to the vehicle.
c) vehicle identification module where the vehicle will be scanned by the RFID reader antenna and tag affixed on the vehicle will return the tag value and this tag value will be queried with the database where if relevant information is found, further action would be taken as required, else the vehicle would be either asked to be registered or would not gain access to the parking;
d) database management module show the database and will reveal the tables;
e) report generation/business intelligence module will help the employee of the parking system to generate reports favorable for his business development where reports regarding the following will be generated according the convenience of the system administrator all Vehicle Transactions, employee details, owner details, owner vehicle registration, vehicle’s transaction etc;
f) help module will provide help to the end user of this system means typically the help module will provide docs regarding the intended use of the system and also provide manuals such as what are the technical specifications of the system;
g) surveillance module employee will be able to survey the parking area with the help of installed cameras;

4. Structure of the invention as claimed in claim 3 comprises mainly of subordinator, gate in charge, validate, database server, RFID reader, cameras, display console, parking lot, vehicle etc.

5. In the behavioral modeling of the invention as claimed in claim 4:
a) the RFID entry point and exit point readers are generalized as RFID readers;
b) the ENTRY point RFID reader detects the incoming vehicle willing to get parked when the same comes under the coverage range of the reader, the ETNRY point reader and the TRASNSPONDER on the wind shield of the vehicle interacts, the ENTRY point READER forwards the information to the database, where the detection event fires a validation query, if the validation is successful then the vehicle is signaled to get in;
c) at the same time the vehicle driver will check the console in order to find out a suitable place for parking;
d) the display will be displaying the engaged and unengaged places conspicuously with the help of different colour codes in a grid layout manner, so that any novice user could easily recognize the vacant place for parking;
e) in addition to that the display, will also show the details against the subjected vehicle if required and demanded by privileged authority;
f) the updating process will include the validation of the database;
g) furthermore, the cameras will provide a helping hand in surveillance of the parked vehicle thus enhancing the security related aspects, several cameras will cover the whole parking areas and would to a simultaneous surveillance so that any unexpected activity can be caught and recorded;
h) unregistered vehicles will be directed to a separate area where they could get parked themselves or if required a temporary tag will be allocated to that vehicle and it would be let in into the usual parking lot meant for registered vehicles;
i) at the exit point the EXIT point reader proves its significance, when the vehicle would go to the exit point it would come under the range of the EXIT point reader and the reader will detect the tag on the wind shield of the vehicle;
j) as soon as the vehicle will be leaving the parking area ,an exit status will be assigned to the vehicle against its entry into the database and the corresponding date and time will be saved which is the most important entry.

ABSTRACT
Present invention revolves around the problem definition RFID Based Vehicle Identification and Access Control into parking, providing automated identification of vehicles using RFID system. It also provides an access control mechanism for the parking area by authorizing the vehicles using the RFID tags. The UID of the RFID tag will be stored in the database and will fetched every time the vehicle comes or wishes to come into the parking area. If the UID matches with the one stored against the vehicle information stored into the database, the vehicle will get an access into the parking area. We will also provide business intelligence tools such as Report Generation for making management decisions. Such reports may be used for further planning. In such way a complete Parking Identification System is proposed in the problem definition. Following invention is described in detail with the help of Figure 1 of sheet 1 showing Vehicle Check-in flowchart describing the check-in process, Figure 2 of sheet 2 showing Vehicle Check-in flowchart describing the check-in process, Figure 3 of sheet 3 showing Vehicle approaching the RFID reader antenna, Figure 4 of sheet 3 showing RFID antenna detecting the tag, Figure 5 of sheet 4 showing Vehicle Check-out flowchart describing the check-out process, Figure 6 of sheet 5 showing breakdown structure of the invention.

Dr. Sanjay Trymbak Gandhe Sheet 5/1

Figure 1

Dr. Sanjay Trymbak Gandhe Sheet 5/2


Figure 2

Dr. Sanjay Trymbak Gandhe Sheet 5/3


Figure 3


Figure 4
Dr. Sanjay Trymbak Gandhe Sheet 5/4

Figure 5

Dr. Sanjay Trymbak Gandhe Sheet 5/5

Figure 6

Documents

Application Documents

# Name Date
1 1790-MUM-2013-AbandonedLetter.pdf 2018-10-31
1 notary sandip fdn.pdf 2018-08-11
2 form 6 sandip fdn.pdf 2018-08-11
2 1790-MUM-2013-CORRESPONDENCE(16-6-2014).pdf 2018-08-11
3 form 5.pdf 2018-08-11
3 1790-MUM-2013-FER.pdf 2018-08-11
4 1790-MUM-2013-FORM 18.pdf 2018-08-11
4 form 3.pdf 2018-08-11
5 form 26.pdf 2018-08-11
5 ABSTRACT1.jpg 2018-08-11
6 form 26 sitrc.pdf 2018-08-11
6 FIGURE.pdf 2018-08-11
7 FORM 2.pdf 2018-08-11
8 form 26 sitrc.pdf 2018-08-11
8 FIGURE.pdf 2018-08-11
9 form 26.pdf 2018-08-11
9 ABSTRACT1.jpg 2018-08-11
10 1790-MUM-2013-FORM 18.pdf 2018-08-11
10 form 3.pdf 2018-08-11
11 1790-MUM-2013-FER.pdf 2018-08-11
11 form 5.pdf 2018-08-11
12 form 6 sandip fdn.pdf 2018-08-11
12 1790-MUM-2013-CORRESPONDENCE(16-6-2014).pdf 2018-08-11
13 notary sandip fdn.pdf 2018-08-11
13 1790-MUM-2013-AbandonedLetter.pdf 2018-10-31

Search Strategy

1 1790mum2013_24-01-2018.pdf