Ajay Neginhal

The authenticated clothing dropbox was built to prevent unauthorized access to personal items in shared environments. It combines RFID access control with computer vision so that a single compromised factor does not grant access.

AcademicAug 2022 - Dec 2022Design Team Member

Authenticated Clothing Dropbox

Secure clothing dropbox that uses RFID and computer vision to authenticate the user before dispensing garments.

Figure coming soon
Prototype enclosure with authenticated dispensing mechanism (placeholder).
Computer VisionEmbeddedSecurityMechanicalProduct Design

Key Reminders

  • Explain the RFID + vision authentication flow and why two factors were needed.
  • Highlight the custom slot/magnet mechanism that releases one garment at a time.
  • Discuss safety, privacy, and failure modes for a public-facing device.

Technologies

PythonOpenCVRFIDMicrocontrollerWebcamDC MotorSolenoid3D Printing

Problem and Approach

Designed a secure clothing storage system that dispenses garments only to the authenticated user. The solution combines RFID verification with computer vision to reduce false positives while keeping the user experience fast and intuitive.

System Architecture

The device integrates RFID, a camera, and a microcontroller that coordinates the authorization workflow. A dispense routine drives a motor and solenoid to unlock the garment while logging events for auditability.

Figure coming soon
System architecture diagram placeholder.

python code

Code example forthcoming

Vision + RFID authentication pipeline.

Mechanical and Electrical Design

A custom slot and magnet mechanism isolates a single garment and prevents accidental multiple releases. The electronics coordinate the RFID reader, camera trigger, and actuation sequence.

Figure coming soon
Actuation schematic / PCB layout placeholder.

Testing and Validation

Verified the authorization flow, dispensing reliability, and error recovery behavior across repeated runs.

Figure coming soon
Test data plot placeholder.

Demo and Next Steps

Future work includes enclosure refinement, deployment monitoring, and user studies for public environments.

Figure coming soon
Demo video placeholder.