Post on 23-Feb-2018
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
1/30
FINGERPRINT BASED IGNITION SYSTEM
1.1 Introduction
Biometric systems have overtime served as robust security mechanisms in various
domains. Fingerprints are the oldest and most widely used form of biometric identification. A
critical step in exploring its advantages is to adopt it for use as a form of security in already
existing systems, such as vehicles.
This research work focuses on the use of fingerprints for vehicle ignition, as opposed to
the conventional method of using keys. The prototype system could be divided into the following
modules: fingerprint analysis software module that accepts finger prints images hardware
interface module and the ignition system module. The fingerprint recognition software enablesfingerprints of valid users of the vehicle to be enrolled in a database. Before any user can ignite
the vehicle, his!her fingerprint image is matched against the fingerprints in the database while
users with no match in the database are prevented from igniting the vehicle. "ontrol for the
ignition system of the vehicle is achieved by sending appropriate signals to the parallel port of
the computer andsubse#uently to the interface control circuit.
The developed prototype serves as an impetus to drive future research, gearedtowards
developing a more robust and embedded real$time fingerprint based ignitionsystems in
vehicles.Biometrics refers to the automatic identification of a living person based on
physiological or behavioural characteristics for authentication purpose. Among the existing
biometric.
Biometric technology is used for automatic personal recognition based on biological
traits%fingerprint, iris, Face, palm print, hand geometry, vascular pattern, voice%or behavioral
characteristics%gait, signature,typing pattern. Fingerprinting is the oldest of these methods and
has been utili&ed for over a century by law enforcement officials who use these distinctive
characteristics to keep track of criminals.
The 'ational (cience and Technology "ouncil provides the following overview of biometric
system components: )A typical biometric system is comprised of five integrated components: A sensor is
used to collect the data and convert the information to a digital format. (ignal processing algorithms
perform #uality control activities and develop the biometric template. A data storage component keeps
information that new biometric templates will be compared to. A matching algorithm compares the new
1
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
2/30
biometric template to one or more templates kept in data storage. Finally, a decision process *either
automated or human$assisted+ uses the results from the matching component to make a system$level
decision.
Biometric method re#uires the physical presence of the person to be identified. This
emphasi&es its preference over the traditional method of identifying -what you have such as, the
use of password, a smartcard etc. Also, it potentially prevents unauthori&ed admittance to access
control systems or fraudulent use of AT/s, Time 0 Attendance (ystems, cellular phones, smart
cards, desktop 1"s, 2orkstations , vehicles and computer networks. Biometric recognition
systems offer greater security and convenience than traditional methods of personal recognition.
Fingerprint recognition represents the oldest method of biometric identification which is
dated back to 3344 B". The use of fingerprints as a personal code has a long tradition and was
already used by the Assyrians, the Babylonians, the "hinese and the 5apanese .All human beings have uni#ue, immutable fingerprints. A fingerprint is made of a series
of ridges and furrows!valleys on the surface of the finger. The uni#ueness of a fingerprint can be
determined by the pattern of ridges and furrows as well as the minutiae points. /inutiae points
are local ridge characteristics that occur at either a ridge bifurcation or a ridge ending .
Fingerprint images are rarely of perfect #uality. They may be degraded and corrupted with
elements of noise due to many factors including variations in skin and impression conditions.
This degradation can result in a significant number of spurious minutiae being created and
genuine minutiae being ignored. Thus, it is necessary to employ image enhancement techni#ues
prior to minutiae extraction to obtain a more reliable estimate of minutiae locations.
The prices of fingerprint recognition systems compared to other biometric systems are
#uite low and the user acceptance is very high. The strength of fingerprint identification is that it
can be deployed in a varied range of environments. Also, it is a proven core technology and, the
ability of enrolling multiple fingers can increase the system accuracy and the flexibility
dramatically .
There are several concerns surrounding the use of biometrics for identification. 6f a credit
card or key is lost or stolen, the card can be cancelled, the locks can be changed and replaced.
7owever, if biometric data is compromised, there are a finite number of replacements, as a
person has only 84 fingers, two eyes, etc. Another concern is the possibility that sensors which
re#uire contact could be unsanitary. 9nsuring the privacy and security of biometric data is also of
2
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
3/30
concern, as users will be unlikely to accept the technology if information could potentially be
tampered with, stolen or otherwise misused.
There is a present demand for robust security systems in vehicles. Therefore, the
usefulness of designing and implementing a biometric security system using fingerprint
technology, to prevent unauthori&ed vehicle ignition cannot be overemphasi&ed.
VISION & VIABILITY
3
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
4/30
Biometrics has been touted as the answer to our security authentication. 7owever, 6ve
shown hole after hole in this security )solution. Thisdoesnt mean biometrics should be tossed
out like day$old doughnuts. )5ust as a firewall does not constitute a network security solution but
rather a component ofa defensive strategy, biometrics could be viewed in the same manner.
Today,auto thieves dont try to get your car key and make a duplicate, they ;ust try to bypassthe
alarm and ignition system to get the car started. 6n the same way,biometrics cant be viewed as a
cure$all for authentication security problems. 2eneed to have security defense in depth.
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
5/30
strengthens a systems audit trail, and forces imposters tocreate data that looks like a
biometric sample to the naked eye as well asto an extraction algorithm.
'(in) muti*# %iom#tric(. /ultiple biometric authentication is oftenproposed as a
means of solving the liveness problem, as it is clearly much more difficult to spoof two
biometrics in tandem or in se#uence than tospoof one. 7owever, implementing multiple
biometrics is currently muchmore difficult than it seems. 1rocess flows for verification
are generally notcompatible with the provision of more than one biometric
characteristic,due to environmental, cost, or e#uipment limitations. 6n
certainenvironments, multiple biometric implementations can be deployedeffectively
however, it is not the cure$all that it would seem to be at firstglance.
'(in) muti+!actor aut,#ntication. ltimately, the use of multi$factorauthentication $
using biometrics with smart cards, tokens, evenpasswords $ reduces the convenience
provided by biometric systems butreduces the likelihood of biometric systems being
spoofed. An imposterwould need both the token and!or the secret along with imposter
data inorder to defeat the system. 6n certain biometric systems C identificationsystems, for
example $ this is not viable
5
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
6/30
TE-NOLOGY RE/'IREMENT 0ARDARE2
3.1 FINGER RE-OGNITION DEVI-E
2hen a user places their finger on '6T>9's Fingerprint @ecognition Device
*F@D+ for the first time, the fingerprint is scanned and a E$D fingerprint image is captured. All
fingerprints contain a number of uni#ue physical characteristics called minutiae, which includes
certain visible aspects of fingerprints such as ridges, ridge endings, and bifurcation *forking+ of
ridges. /ost of the minutiae are found in the core points of fingerprints, and the core points
themselves are found near the centre of the fingerprint on the fleshy pad. Figure shows the
positions of core points within fingerprints.
6
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
7/30
The user is enrolled, or registered, in the database after a special minutiae$based
algorithm extracts key minutiae points from the live image at the time of ac#uisition andconverts the data into a uni#ue mathematical template comparable to a 4$digit password. This
uni#ue template is then encrypted and stored C it is important to note that no actual image of the
fingerprint is stored, only the minutiae$based template. The next time a new fingerprint image for
an individual is scanned by the F@D, another template is created and the two templates are
compared to verify the users identity.
7
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
8/30
3.4 I)nition S5(t#m( o! V#,ic#(
The ignition system of an internal$combustion engine is an important part of the overall
engine systemthat provides for the timely burning of the fuel mixture within the engine. All
conventional petrol*gasoline+ engines re#uire an ignition system. The ignition system is usually
switched on!off through alock switch, operated with a key or code patch.The ignition system
works in perfect concert with therest of the engine of a vehicle. The goal is to ignite the fuel at
exactly the right time so that theexpanding gases can do the maximum amount of work that in
line with the processes to make thevehicle move. 6f the ignition system fires at the wrong time,
power will fall and gas consumption andemissions can increase .
The part of the ignition system that first initiates the process of moving a vehicle is the
keysystem in con;unction with the kick starter. A wire from the battery in the vehicle connects to
the kickstarter and other wires connect the kick starter to the key system. 2hen the car key in the
ignitionsystem is turned once, two wires coming from the kick starter to the key system are
bridged. Thiscauses the engine and some other parts of the vehicle to be put in a @9AD or
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
9/30
The disadvantage of the mechanical system is the use of breaker points to interrupt the
low$voltage high$current through the primary winding of the coil the points are sub;ect to
mechanical wear where they ride the cam to open and shut, as well as oxidation and burning at
the contact surfaces from the constant sparking. They re#uire regular ad;ustment to compensate
for wear, and the opening of the contact breakers, which is responsible for spark timing, is
sub;ect to mechanical variations.
6n addition, the spark voltage is also dependent on contact effectiveness, and poor
sparking can lead to lower engine efficiency. A mechanical contact breaker system cannot control
an average ignition current of more than about E A while still giving a reasonable service life,
and this may limit the power of the spark and ultimate engine speed.
9lectronic ignition *96+ solves these problems. 6n the initial systems, points were still
used but they handled only a low current which was used to control the high primary current
through a solid state switching system. (oon, however, even these contact breaker points were
replaced by an angularsensorof some kind $ either optical, where a vaned rotor breaks a light
beam, or more commonly using a 7all effect sensor, which responds to a rotating magnet
mounted on the distributor shaft. The sensor output is shaped and processed by suitable circuitry,
then used to trigger a switching device such as a thyristor, which switches a large current through
the coil.
The first electronic ignition *a cold cathodetype+ was tested in 8JKI by Delco$@emy,
while Lucasintroduced a transistori&edignition in 8JMM, which was used on B@/and "oventry
"limaxFormula
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
10/30
9arl 2. /eyerat "hrysler worked on 96, continuing until 8J8 and resulting in use of 96
on the companys'A("A@hemisin 8JE and 8JK.
1rest$/ in 8JHM.
6n 8JH, 1rest$eneral /otors, the 7ot$(park electronic
ignition conversion kit and the aforementioned "hrysler$built electronic ignition system.
10
http://en.wikipedia.org/w/index.php?title=Earl_W._Meyer&action=edit&redlink=1http://en.wikipedia.org/wiki/NASCARhttp://en.wikipedia.org/wiki/NASCARhttp://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Prest-O-Litehttp://en.wikipedia.org/w/index.php?title=Capacitance_discharge&action=edit&redlink=1http://en.wikipedia.org/wiki/American_Motorshttp://en.wikipedia.org/wiki/American_Motorshttp://en.wikipedia.org/wiki/Oldsmobilehttp://en.wikipedia.org/wiki/GMC_(automobile)http://en.wikipedia.org/wiki/GMC_(automobile)http://en.wikipedia.org/wiki/Motorolahttp://en.wikipedia.org/wiki/Fiat_Dinohttp://en.wikipedia.org/wiki/Fiat_Dinohttp://en.wikipedia.org/wiki/Dodgehttp://en.wikipedia.org/wiki/Plymouth_(automobile)http://en.wikipedia.org/w/index.php?title=Super_Stock&action=edit&redlink=1http://en.wikipedia.org/wiki/Dodge_Coronethttp://en.wikipedia.org/wiki/Plymouth_Belvederehttp://en.wikipedia.org/wiki/Drag_racinghttp://en.wikipedia.org/w/index.php?title=Breakerless_ignition&action=edit&redlink=1http://en.wikipedia.org/wiki/Chrysler_LA_engine#340_V8http://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Carburetorhttp://en.wikipedia.org/wiki/Carburetorhttp://en.wikipedia.org/wiki/Retrofithttp://en.wikipedia.org/wiki/High_energy_ignitionhttp://en.wikipedia.org/wiki/General_Motorshttp://en.wikipedia.org/wiki/General_Motorshttp://en.wikipedia.org/w/index.php?title=Earl_W._Meyer&action=edit&redlink=1http://en.wikipedia.org/wiki/NASCARhttp://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Prest-O-Litehttp://en.wikipedia.org/w/index.php?title=Capacitance_discharge&action=edit&redlink=1http://en.wikipedia.org/wiki/American_Motorshttp://en.wikipedia.org/wiki/Oldsmobilehttp://en.wikipedia.org/wiki/GMC_(automobile)http://en.wikipedia.org/wiki/Motorolahttp://en.wikipedia.org/wiki/Fiat_Dinohttp://en.wikipedia.org/wiki/Dodgehttp://en.wikipedia.org/wiki/Plymouth_(automobile)http://en.wikipedia.org/w/index.php?title=Super_Stock&action=edit&redlink=1http://en.wikipedia.org/wiki/Dodge_Coronethttp://en.wikipedia.org/wiki/Plymouth_Belvederehttp://en.wikipedia.org/wiki/Drag_racinghttp://en.wikipedia.org/w/index.php?title=Breakerless_ignition&action=edit&redlink=1http://en.wikipedia.org/wiki/Chrysler_LA_engine#340_V8http://en.wikipedia.org/wiki/Chrysler_Hemi_engine#Hemi_design_reintroducedhttp://en.wikipedia.org/wiki/Carburetorhttp://en.wikipedia.org/wiki/Retrofithttp://en.wikipedia.org/wiki/High_energy_ignitionhttp://en.wikipedia.org/wiki/General_Motors7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
11/30
3.3 Micro+-ontro#r
A microcontro#r *sometimes abbreviated 6-, u-or M-'+ is a smallcomputeron a
single integrated circuit containing a processor core, memory, and
1rogrammable input!outputperipherals. 1rogram memory in the form of '
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
12/30
converter*AD"+, Digital to Analog converter*DA"+, everything integrated onto a single silicon
chip. Depending on the need and area of application for which it is designed, the chip on features
present in it may or may not include all the individual sections.
6n their pro;ect use Atmel ATIJ(M8 eight bit microcontroller with Kk bytes in system
programmable flash. The ATIJ(M8 is a low power, high performance "/
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
13/30
EEPROMstands for ElectricallyErasable Programmable Read$Only Memory and is a
type of non$volatile memoryused in computers and other electronic devices to store small
amounts of data that must be saved when power is removed, e.g., calibration tables or device
configuration.
nlike bytes in most other kinds of non$volatile memory, individual bytes in a traditional
991@
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
14/30
/ost common serial interface types are (16,6P", /icrowire,'6!
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
15/30
Parallel bus devices
1arallel 991@
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
16/30
AT47-84 is an electrically erasable and programmable @
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
17/30
to base of the R8 transistors, the transistor is conducting and shorts the collector and emitter
terminal and &ero signals is given to base of the R3 transistor. (o the relay is turned
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
18/30
TE-NOLOGY RE/'IREMENT 0SOFTARE2
6n order to ensure a fair comparison of various fingerprint recognition algorithms,
acommon evaluation framework has to be defined. 6n this section a reference systemthat can be
used as a baseline for future improvements and comparisons is firstdefined. The database and the
corresponding protocols are then described along withthe associated performance measures. The
benchmarking experiments presented inthis section can be easily reproduced using the material
and relevant informationprovided on the companion site
7.1 NFIS4
The reference system for the fingerprint modality in the Bio(ecure 'etwork of 9xcellence is
the minutiae$based '6(T Fingerprint 6mage (oftware *'F6(3Crel.3IC3.3+ . 'F6(3 contains
software technology, developed for the Federal Bureauof 6nvestigation *FB6+, designed to
facilitate and support the automated manipulationand processing of fingerprint images. (ource
code for over M4 different utilitiesor packages and an extensive sers >uide are distributed on
"D$@
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
19/30
/6'DT"T takes a fingerprint image and locates all minutiae in the image, assigningto
each minutia point its location, orientation, type, and #uality. The architecture of/6'DT"T is
shown in Fig
System architecture of the MINDTCT package of the NIST FingerprintImage
Software2 (NFIS2)
it can be divided in the following phases: a+ generation of image #uality map b+
binari&ation c+ minutiae detection d+ removalof false minutiae *including islands, lakes, holes,
minutiae in regions of poor image#uality, side minutiae, hooks, overlaps,minutiae that are too
wide,and minutiae thatare too narrow$pores+ e+ counting of ridges between a minutia point and
its nearest neighbours andf + minutiae #uality assessment. Additional details of these phasesare
given below.
Because of the variation of image #uality within a fingerprint,'F6(3 analy&es the image
and determines areas that are degraded. (everal characteristics are measured,including regions of
low contrast, incoherent ridge flow, and high curvature. Thesethree conditions represent unstable
areas in the image where minutiae detection isunreliable, and together they are used to represent
levels of #uality in the image.An image #uality map is generated integrating these three
19
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
20/30
characteristics. 6mages are divided into non overlapping blocks, where one out of five levels of
#uality is assigned to each block.
The minutiae detection step scans the binary image of the fingerprint, identifying local
pixel patterns that indicate the ending or splitting of a ridge. A set of minutiapatterns is used to
detect candidate minutia points. (ubse#uently, false minutiaeare removed and the remaining
candidates are considered as the true minutiae ofthe image. Fingerprint minutiae marchers often
use other information in additionto ;ust the points themselves. Apart from minutias position,
direction, and type,/6'DT"T computes ridge counts between a minutia point and each of its
nearestneighbours.
6n the last step, a #uality!reliability measure is associated with each detected minutia
point. 9ven after performing the removal step, false minutiae potentially remain in the list. A
robust #uality measure can help to manage this. Two factors are combined to produce a #uality
measure for each detected minutia point. The first factor is taken directly from the location of the
minutia point within the #ualitymap described before. The second factor is based on simple pixel
intensity statistics*mean and standard deviation+ within the immediate neighbourhood of the
minutia point.A high #uality region within a fingerprint image is expected to have
significantcontrast that will cover the full grayscale spectrum
7.3 BO
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
21/30
and the intervening line between both minutiae. A comparison table is constructed for each of the
two fingerprints.
The next step is to take the 6ntraFingerprint /inutia "omparison Tables from thetwo
fingerprints and look for )compatible entries between the two tables. Table entriesare
)compatible if: a+ the corresponding distances and b+ the relative minutia angles are within a
specified tolerance. An 6nterFingerprint "ompatibility Table is generated, only including entries
that are compatible. A compatibility table entrytherefore incorporates two pairs of minutia, one
pair from the template fingerprint and one pair from the test fingerprint. Theentry into the
compatibility table indicatesthat the minutiae pair of the template fingerprint corresponds to the
minutiaepair of the test fingerprint.
At the end of the second step, we have constructed a compatibility table that consists of a
list of compatibility associations between two pairs of potentially corresponding minutiae. These
associations represent single links in a compatibility graph. The matching algorithm then
traverses and links table entries into clusters,combining compatible clusters and accumulating a
match score. The larger the number of linked compatibility associations, the higher the match
score, and the more likely the two fingerprints originate from the same person.
21
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
22/30
TE-NOLOGY DESIGN
9.1 Int#r!acin) t,rou), t,# P- Para# Port
9xternal devices *hardware+ can be controlled through the 1" parallel port. This is known
as hardwareinterfacing. 6t enables communication between a designed hardware and a digital
computer. The modesof communication and the system operation are controlled by a program or
codes that are resident onthe digital computer.The parallel port is a simple and inexpensive tool
for building computer controlled devices andpro;ects. 6t is often used in computer controlled
robots, Atmel!16" programmers, home automation etc.
The primary use of a parallel port is to connect printers to computers but many other
types of hardwarefor that port is available today. Thus it is often called the printer port or
centronics port *after a popular printer manufacturing company -centronics who devised some
standards for the parallel port+
The parallel port connector is located in the rear panel of a 1". 6t is a 3Mpin D$shaped
*DB3M+ female connector to which the printer or other devices may be connected. 'ot all3M pins
are needed always. sually only I output pins *data lines+ and signal ground are used. Theparallel port data pins are TTL outputs, that can both sink and source current. 6n ordinary parallel
port implementations the data outputs are HKL(EHK 6" totem$pole TTL outputs which can source
3./aand sink 3KmA *9ngdahl, 344M+.
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
23/30
connected internally to theData, "ontrol and (tatus registers internally. By manipulating these
registers in program, the parallelport can easily be read to or written from with programming
languages like Delphi, Gisual basic, "," and BA(6". The word connection does not mean that
there is some physical connection betweendata!control!status lines. The registers are virtually
connected to the corresponding lines such thatwhatever is written to these registers appear in
corresponding lines as voltages, which can be measuredwith a voltmeter. 2hatever is given to
the parallel port as voltages can be read from these registers. Forinstance, if a -8 is written to the
data register, the data line D4 will be driven to Mv. 6n the same way,the data lines and the
control lines can be programmatically turned on and off.
6n most 1"s, the aforementioned registers are input!output mapped and will therefore
haveuni#ue addresses. These addresses work with the parallel port. For a typical 1", the base
address of theprinter port L1T8 is 4xEHI and L1T3 is 4x3HI. The data register resides at this
base address, statusregister at base address 8 and the control register at base address 3.2ith
the base address, theaddress of each address of each register can be calculated.
9.4 Para# Port Pro)rammin)
1rogramming languages like Gisual Basic, Gisual ", Gisual ", "U, Delphi etc are fast
and easy tools for developing user friendly applications. They however lack importantfunctionalities like direct access to the parallel port. 2riting programs that communicate with the
parallel port is easier withoperating systems such as D
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
24/30
stated above is to write a kernel mode device driver capable of reading and writing to the parallel
port. The user mode program is then made to communicate with the written device driver. (ome
of these kernel mode drivers are already written and available as share ware and they include
hwintaface.dll, io.dll, 6
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
25/30
9.7 Fin)#r*rint Ba(#d I)nition S5(t#m D#(i)n
The program codes driving the fingerprint recognition software for ignition system
control was writtenin visual basic .4 9nterprise 9dition and ran on a 1". 6t uses a set of
fingerprint images stored in animage folder in its directory. The test images can be enrolled into
its database after it has gone through the stages of image enhancement, minutiae extraction and
image post$processing *eliminates falseminutiae+. An image to be recogni&ed is loaded into the
image area and its extracted minutiae is compared with all the images in the database in the case
of a 8 to many match, and with ;ust a particular image in the case of a 8 to 8 match. A sufficient
number of similar minutiae points between the two images compared, indicates that the input
fingerprint image has a match which exists in thedatabase. An insufficient number of similar
minutiae points between the two images compared implythat the input fingerprint image has no
match which exists in the database.
The results from the matching process are communicated to a section of the recognition
software which manipulates two data pins of the parallel port. A fingerprint match causes the
data pinsto be in a high logic level and ideally output about Mvolts while a fingerprint mismatch
makes the datapins to be in a low logic level and ideally output 4volts.
An interface control circuit was constructed to link the 1" parallel port to the ignition system ofa
vehicle. This circuit provides a high degree of electrical isolation between the 1" and the
ignition system which operate at different voltage levels, through the use of components called
optocouplers.
The circuit also provides capabilities for the controlling the ignition system via the
interconnection of electronic components such as relays, bipolar ;unction transistors, resistors
and diodes.Three wires from the ignition system of a vehicle are re#uired to be connected to the
interface circuit. 2hen the parallel port data pins which form part of the connection to the
interface circuit are in a 76>7 logic level, the interface circuit is triggered to ignite the vehicle.
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
26/30
The principal components of the prototype system are the fingerprint recognition software andthe
interface control circuit which are to form a continuous connection with a vehicles ignition
system.
The block diagram of the system architecture is shown below
9.9 T,# Para# Port Int#r!ac# -ontro -ircuit
The circuit was constructed using two optocouplers, two relays, four resistors, two diode,
two '1' transistors, and ;umper wires. They components were connected together on a circuit
board accordingto the arrangement shown in the diagram below
26
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
27/30
-ontroin) t,# I)nition S5(t#m
The mechanism of the ignition system comprise amongst other things, three wires that are
connected to the key system and used with the keys to ignite the vehicle. Two of these wires are
bridged when the key is turned first, causing current to flow from the car batteries to all parts of
the car re#uiring some form of electricity for operation. 2hen the key is turned again, the third
wire bridges momentarily with the two wires already connected. This causes the cranking of the
engine, which ignites the vehicle.
For the purpose of this research work, the three wires were disconnected from the key
system. The first two wires were connected to the first relay, and the third wire was connected to
the second relay. This was done to simulate the action of bridging two of the wires together when
the first relay is activated. Activating the second relay for a short time causes a temporary
connection between the two relays. This connects all three wires together, thus igniting the
vehicle. The relays were activated or deactivated by sending appropriate control signals from the
fingerprint recognition software, via the parallel port to the interface circuit. A correctly
identified or verified image causes the parallel port control codes in the fingerprint recognition
software to send about Mvolts to pin 3 of the parallel port. This voltage passes on to the interface
control circuit and subse#uently activates the first relay. After five seconds, about Mvolts is sent
again to the pin E of the parallel port for three seconds. This activates the second relay for five
27
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
28/30
seconds and deactivates it. The continuous activation of the first relay and the momentary
activation ofthe second relay cause the vehicle to be ignited.
"onversely, an incorrectly identified image causes the parallel port control codes in
thefingerprint recognition software to send about 4volts to pin 3 and pin E of the parallel port.
Thus, no voltage passes on to the interface control circuit and the two relays remain deactivated.
This preventsthe vehicle from being ignited.
SOT ANALYSIS
STRENGT
Girtually eliminates unauthori&ed access @educes possibility of auto$theft
Foolproof means of restricting the ignition of vehicles
Authorised users can only ignite the vehicle.
Authentication through the fingerprint images to ignite the Gehicle
9asy to use
"ompactable in any model vehicle
(mall storage space is re#uired
Fingerprint is most economical biometric technology
EA=ENESS
6ntrusive
28
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
29/30
/istakes may happen because of dry and dirt skin
'ot applicable for children
Authorised users can only ignite the Gehicle
Average acceptance
"ost
"hances for hacking
'ot always accurate
OPPORT'NITIES
Appeals to security$conscious customers
Appeals to tech$savvy customers
sefull to 1olice Department
sefull for 6ndustrial purpose
sefull for Banks Less completion
TREATS
"hances of hacking
>uessing
29
7/24/2019 FINGERPRINT BASED IGNITION SYSTEM 01.docx
30/30
-ON-L'SION
'ow a days theft of a vehicles are increasing. To prevent from this problem -The
Fingerprint 6gnition (ystem is used. The theft is controlled by the Finger print matching process.
Thus fingerprint identification enhances the security of a vehicle and makes it possible only for
some selected people to start the car. By using the Fingerprint 6gnition (ystem the can enter and
start the vehicle without the use of keys. This system will provide a uni#ue type of security for
the customers. The Fingerprint based ignition system will be very usefull to Banks and Finance
based companies where security for the highly confidential vehicles and for the vehicles
carrying money are very important. This system can be used by the public too. 6t will appealing
to the (ecurity "onscious and Tech$(avvy customers. Like the positives ,the system is also
having its own negatives. There are some chances for hacking of the system,and the people who
are authorised can only use the system.