Volume 4, No. 3, March 2013 Journal of Global Research in Computer Science CASE STUDY Available Online at www.jgrcs.info © JGRCS 2010, All Rights Reserved 83 INTEGRATING MCT WITH RFID: A CASE STUDY Majid Zaman 1 , Muheet Ahmed Butt 2 1 Scientist, Directorate of IT &SS, University of Kashmir, Srinagar 2 Scientist, PG Department of Computer Science, University of Kashmir, Srinagar, J&K, India ermuheet@gmail.com Abstract: Mobile Communication Technology (MCT) has advanced manifold over the past few years and has established as a leading wireless communication medium. It has a distinct advantage of getting integrated with existing Information Technology environments at very low system requirements. RFID (Radio Frequency Identification) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking tags attached to objects, Since RFID tags can be attached to clothing, possessions, or even implanted within people, the possibility of reading personally-linked information without consent has raised privacy concern [1]. In this paper we introduce a system where in we have proposed the integration of two technologies Mobile SMS & RFID to achieve security for inventory system which is totally independent of human intervention and does not need 24X7 human surveillance but will rely on SMS based alert as and when system security is being compromised. INTRODUCTION The term Information Communication System can technically be defined as a structure which describes the organized collection, processing, transmission, and dissemination of information in accordance with defined procedures, whether automated or manual. The purpose of developing an Information Communication System is therefore to establish a system which delivers information and communication services in an organization and the activities and management of the information systems function in planning, designing, developing, implementing, and operating the systems and providing services [4]. These systems capture, store, process, and communicate data, information, and knowledge. The system structure includes both technical components and human operators and users. The environment of the System varies from being a single organization or a combination of organizations and/or society as a whole or a section of society depending upon the nature of the Organization. Information Technology has improved manifold our intellectual and physical abilities more than anything since the development of the written word. Some of the magnificent scientific marvels such as the Internet, the global positioning system, and the human genome project became possible only with advances in information technology. It is estimated that presently there are ten billion computers in the world. Most of the products have computers embedded invisibly in them, making goods as well as services safer, more secure, flexible, and energy- efficient. The costs of the I T products have been showing a significant downward trend and as such are affordable to common man. The tremendous advances in productivity that we have witnessed in the past decade rest on this foundation. We are hard-pressed to think of change of comparable magnitude in human history. In the future, we can expect our computational infrastructure to offer an even more impressive range of social and economic benefits as it grows to include billions of people worldwide. Information technologies have the potential to reduce energy consumption, provide improved health care at lower cost, enhance security, reduce pollution, enable further creation of worldwide communities, engender new business models, and contribute to the education of people anywhere in the world. These new benefits will be facilitated by geometric advances of the technology in semiconductor and magnetic storage, as well as in electronic and optical communications. The past two decades has seen explosions in mobile technology and its applications. It has enabled new businesses and new ways to link people. The way we have moved beyond stand-alone computers or components to build large, integrated, distributed information systems that are in service to society [8] the mobile technology has also made significant progress in linking the people involving extremely low resources. RFID, the acronym refers to small electronic devices that consist of a small chip and an antenna. The chip typically is capable of carrying 2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the identifying information [2]. The RFID reader reads the id number from passive tag and send to the microcontroller, if the id number is valid then microcontroller send the SMS request to the authenticated person mobile number, for the original password to open the bank locker, if the person send the password to the microcontroller, which will verify the passwords entered by the key board and received from authenticated mobile phone. if these two passwords are matched the locker will be opened otherwise it will be remain in locked position, This system is more secure than other systems because two passwords required for verification. This system also creates a log containing check-in and check-out of each user along with basic information of user.