Fingerprint base security system

41
FINGERPRINT BASED SECURITY SYSTEM BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 1 CHAPTER:-1 INTRODUCTION

Transcript of Fingerprint base security system

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 1

CHAPTER:-1

INTRODUCTION

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 2

INTRODUCTION

In today‘s regular life there are many problems of common companies and other

security for home application and there are also important applications of automatic control

in many applications, so we dedicate this project to this common man and other industries.

Nowadays accurate personal identification is becoming more and more important.

Currently fingerprint recognition is the most widely used technique for personal

identification. Fingerprints are made up of locally parallel ridges with singular points, and

they constitute a unique permanent universal pattern. The use of ink and paper to get an

image from a finger was used for a long time, but technological advances have enabled to

automate the acquisition stage by means of solid-state sensors.

These sensors exploit different techniques to acquire the image (pressure, electrical

field, temperature…) and require a static (matrix sensor) or mobile finger position (sweeping

mode sensor).Our project is developed to provide security for an Organization. In this project

the fingerprint sensor sense the thumb impression of the corresponding person and that image

will be compared with registered image, if the both images are unique, then the finger

print device act ivates particular task like access control to a secured area,

ident ificat ion of the employee etc.

The project contains 2 modes, the first one is master mode and the second is user

mode. The master mode is used to register the new user and gives the mode of authorization.

The master mode has the ability to create and delete the users.

The user mode is an ordinary mode used for the authentication of the employees. In

user mode of authorization, creation and deletion of a user cannot be performed. The master

mode operations are done directly through interfacing the finger print module to the com port

of the computer.

The Microcontroller 89S52 is programmed to operate under user mode.

Microcontroller is programmed using C51 cross compiler. Fingerprint image is scanned by

the fingerprint device. If the scanned image matches with the registered image then

Microcontroller sends the authorized persons Id to the computer when the person enters and

leaves the organization.

Finger print based security system can be used at many places like Industries, Offices,

and Colleges or even at our home. This project is a fine combination of ―Biometrics

technology‖ and ―Embedded system technology‖. Fingerprint sensor is the main part of this

system. It makes use of Biometric sensor to detect fingerprint. It is also called as Biometric

sensor. Fingerprint sensor uses various types of techniques like ultrasonic method, optical

method or thermal technique. In this project we have used optical fingerprint sensor.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 3

CHAPTER:-2

BLOCK DIAGRAM

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 4

2.1 BLOCK DIAGRAM

Fig. 2.1 Block Diagram

2.2 BLOCK DIAGRAM EXPLANATION

2.2.1 Display 16*2

LCD (Liquid Crystal Display) screen is an electronic display module and find

a wide range of applications.

A 16x2 LCD display is very basic module and is very commonly used in

various devices and circuits.

A 16x2 LCD means it can display 16 characters per line and there are 2 such

lines.

2.2.2 Fingerprint sensor

Here fingerprint module is used to scan the fingerprint and send to the

microcontroller and verifying the scanned fingerprint with the stored

fingerprint.

When coming fingerprint matches with the stored fingerprint Then the Relay

is complemented. Also the fingerprint ID is displayed over the LCD display.

We have used R305 Finger Print Sensor. It has an Optical biometric

fingerprint reader. It also has inbuilt flash memory. It performs the function of

image processing and gives out data on its output pin.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 5

2.2.3 Microcontroller 8051

The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller

with 8Kbytes of in-system programmable Flash memory.

The device is manufactured using Atmel‘s high-density nonvolatile memory

technology and is compatible with the industry-standard 80C51 instruction set

and pin out.

2.2.4 Relay driver

The relay is complemented and locker system is connected with relay so locker

is opened.

2.2.5 Power supply

Here in our project used 5v & 12 v supply used, 12v supply used for relay

driver and 5v used to each other components.

The microcontroller and other devices get power supply from AC TO DC

adapter through 7805, 5volts regular

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 6

CHAPTER:-3

CIRCUIT DESCRIPTION

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 7

3.1 CIRCUIT DIAGRAM

Fig.3.1 Circuit Diagram

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 8

3.2 WORKING

When a finger is kept at the finger print reader, it is scanned by the fingerprint device.

It will give the information accordingly to microcontroller if the scanned image matches with

the registered image then which is displayed on the LCD. And the locker system interfaced to

the microcontroller responds accordingly. And if the information provided by the user is

incorrect or mismatch in finger prints is detected then access is denied.

The output received from fingerprint sensor to Microcontroller then compares these

output data. Function of microcontroller is to turn on the respective device depending upon

the input received. In case of OK signal from fingerprint module, microcontroller turns on

Relay and a Motor. However if the error output is received then it turns on the Buzzer.

It contains all the necessary electronics to allow you to store, delete, and verify

fingerprints with just the touch of a button. Stored fingerprints are retained even in the event

of complete power failure or battery drain. This eliminates the need for keeping track of keys

or remembering a combination password. It can only be opened when an authorized user is

present, since there are no keys or combinations to be copied or stolen, or locks that can be

picked.

In this project the fingerprint module from Miaxis Biometrics is used. It can store up

to 265 finger prints on its own memory. It can be controlled through its serial port.

You can add a fingerprint, Delete a fingerprint and identify the fingerprint.

To add a fingerprint, just show the finger on the module and press the ADD key.

Now the microcontroller will send the ADD command to the module and the module

will add it into the memory.

To delete the finger follow the same as above.

To identify the finger, press the Identify button and if the finger matches then the

Relay is complemented. Also the fingerprint ID is displayed over the LCD display.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 9

3.3 COMPONENT LIST

COMPONENT NAME NUMBER OF USE

Resistor

3 R1,R2,R3-----10K

2 R4,R5-----2.2K

1 R6-----56E

1 R7-----56K

1 10k SIP

capacitor

2 C1,C2-----33p

1 C3-----1micro

Ic 1 AT89S52

Transistor 2 BC 547

Crystal 1 11.0592MHz

Fingerprint module 1 R-305

Display 1 16*2

Ic socket 1 40 pin

Buzzer 1

switch 4 Push button

Relay 1

3.1 table of component

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 10

3.4 INTEGRATED CIRCUITS (AT89S52)

FEATURES

compatible with mcs-51® products

8k bytes of in-system programmable flash memory

4.0v to 5.5v operating range

fully static operation: 0 Hz to 33 MHz

three-level program memory lock

256 x 8-bit internal ram

32 programmable i/o lines

three 16-bit timer/counters

eight interrupt sources

full duplex UART serial channel

low-power idle and power-down modes

interrupt recovery from power-down mode

watchdog timer

dual data pointer

power-off flag

DESCRIPTION

The at89s52 is a low-power, high-performance cmos 8-bit microcontroller with 8k Bytes of

in-system programmable flash memory. The device is manufactured using Atmel‘s high-

density nonvolatile memory technology and is compatible with the industry-standard 80c51

instruction set and pin out.

By combining a versatile 8-bit CPU with in-system programmable flash on A monolithic

chip, the Atmel at89s52 is a powerful microcontroller which provides a Highly-flexible and

cost-effective solution too many embedded control applications.

In addition, the at89s52 is designed with static logic for operation Down to zero frequency

and supports two software selectable power saving modes. The idle mode stops the CPU

while allowing the ram, timer/counters, serial port, and Interrupt system to continue

functioning. The power-down mode saves the ram contents but freezes the oscillator,

disabling all other chip functions until the next interrupt or hardware reset.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 11

Fig. 3.4.1 Block Diagram of IC

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 12

FIGURE 3.4.2 Pin Diagram

PIN DESCRIPTION

VCC:-Supply voltage.

GND:-Ground.

RST:-Reset input. A high on this pin for two machine cycles while the oscillator is running

resets the device. This pin drives High for 96 oscillator periods after the Watchdog times out.

The DISRTO bit in SFR AUXR (address 8EH) can be used to disable this feature. In the

default state of bit DISRTO, The RESET HIGH out feature is enabled

ALE/PROG:-Address Latch Enable (ALE) is an output pulse for latching the low byte of the

address during accesses to external memory. This pin is also the program pulse input (PROG)

during Flash programming. If desired, ALE operation can be disabled by setting bit 0 of SFR

location 8EH. With the bit set, ALE is active only during MOVX or MOVC instruction.

Otherwise, the pin is weakly pulled high. Setting the ALE-disable bit has no effect if the

microcontroller is in external execution mode.

PSEN:-Program Store Enable (PSEN) is the read strobe to external program memory. When

the AT89S52 is executing code from external program memory, PSEN is activated twice

each machine cycle, except that two PSEN activations are skipped during each access to

external data memory.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 13

3.2 Table of IC pin Descriptions

.

Pin No Function Name

1

8 bit input/output port (P1) pins

P1.0

2 P1.1

3 P1.2

4 P1.3

5 P1.4

6 P1.5

7 P1.6

8 P1.7

9 Reset pin; Active high Reset

10 Input (receiver) for serial communication RxD

8 bit input/output

port (P3) pins

P3.0

11 Output (transmitter) for serial

communication TxD P3.1

12 External interrupt 1 Int0 P3.2

13 External interrupt 2 Int1 P3.3

14 Timer1 external input T0 P3.4

15 Timer2 external input T1 P3.5

16 Write to external data memory Write P3.6

17 Read from external data memory Read P3.7

18 Quartz crystal oscillator (up to 24 MHz)

Crystal 2

19 Crystal 1

20 Ground (0V) Ground

21

8 bit input/output port (P2) pins

/

High-order address bits when interfacing with external memory

P2.0/ A8

22 P2.1/ A9

23 P2.2/ A10

24 P2.3/ A11

25 P2.4/ A12

26 P2.5/ A13

27 P2.6/ A14

28 P2.7/ A15

29 Program store enable; Read from external program memory PSEN

30 Address Latch Enable ALE

Program pulse input during Flash programming Prog

31 External Access Enable; Vcc for internal program executions EA

Programming enable voltage; 12V (during Flash programming) Vpp

32

8 bit input/output port (P0) pins

Low-order address bits when interfacing with external memory

P0.7/ AD7

33 P0.6/ AD6

34 P0.5/ AD5

35 P0.4/ AD4

36 P0.3/ AD3

37 P0.2/ AD2

38 P0.1/ AD1

39 P0.0/ AD0

40 Supply voltage; 5V (up to 6.6V) Vcc

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 14

EA/VPP:-External Access Enable. EA must be strapped to GND in order to enable the

device to fetch code from external program memory locations starting at 0000H up to

FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on

reset. EA should be strapped to VCC for internal program executions. This pin also receives

the 12-volt programming enable voltage (VPP) during Flash programming.

XTAL1:-Input to the inverting oscillator amplifier and input to the internal clock operating

circuit.

XTAL2:-Output from the inverting oscillator amplifier.

PORT 0:-

Port 0 is an 8-bit open drain bidirectional I/O port. As an output port, each pin can

sink eight TTL inputs. When 1sare written to port 0 pins, the pins can be used as high

impedance inputs.

Port 0 can also be configured to be the multiplexed low order address/data bus during

accesses to external program and data memory. In this mode, P0 has internal pull-ups.

Port 0 also receives the code bytes during Flash programming and outputs the code

bytes during program verification. External pull-ups are required during program

verification.

3.3 Alternate Function of P1

PORT 1:-

Port 1 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 1 output

buffers can sink/source four TTL inputs. When 1s are written to Port 1 pins, they are

pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins

that are externally being pulled low will source current (IIL) because of the internal

pull-ups.

In addition, P1.0 and P1.1 can be configured to be the timer/counter 2 external count

input (P1.0/T2) and the timer/counter 2 trigger input (P1.1/T2EX), respectively, as

shown in the following table.

Port 1 also receives the low-order address bytes during Flash programming and

verification.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 15

PORT 2:-

Port 2 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 2 output

buffers can sink/source four TTL inputs. When 1s are written to Port 2 pins, they are

pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins

that are externally being pulled low will source current (IIL) because of the internal

pull-ups.

Port 2 emits the high-order address byte during fetches from external program

memory and during accesses to external data memory that uses 16-bit addresses

(MOVX @DPTR). In this application, Port 2 uses strong internal pull-ups when

emitting 1s. During accesses to external data memory that use 8-bit addresses

(MOVX @ RI), Port 2emits the contents of the P2 Special Function Register.

Port 2 also receives the high-order address bits and some control signals during Flash

programming and verification.

PORT 3:-

Port 3 is an 8-bit bidirectional I/O port with internal pull-ups. The Port 3 output

buffers can sink/source four TTL inputs. When 1s are written to Port 3 pins, they are

pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins

that are externally being pulled low will source current (IIL) because of the pull-ups.

Port 3 also serves the functions of various special features of the AT89S52, as shown

in the following table.

Port 3 also receives some control signals for Flash programming and verification.

3.4 Alternate Function of P3

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 16

3.5 FINGERPRINT MODULE

Fig.3.5.1 Fingerprint Module

SPECIFICATIONS:

Fingerprint sensor type: Optical

Sensor Life: 100 million times

Static indicators: 15KVBacklight: bright green

Interface: USB1.1/UART(TTL logical level)

RS232 communication baud rate: 4800BPS~115200BPS changeable

Dimension: 55*32*21.5mm

Image Capture Surface 15—18(mm)

Verification Speed: 0.3 sec

Scanning Speed: 0.5 sec

Character file size: 256 bytes

Template size: 512 bytes

Storage capacity: 250

Security level: 5 (1,2,3,4,5(highest))

False Acceptance Rate (FAR) :0.0001%

False Rejection Rate (FRR): 0.1%

Resolution 500 DPI

Voltage :3.6-6.0 VDC

Working current: Typical 90 mA, Peak 150mA

Matching Method: 1: N

Operating Environment Temperature: -20 to 45° centigrade

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 17

FEATURES:

Integrated image collecting and algorithm chip together, ALL-in-One

Fingerprint reader can conduct secondary development, can be embedded into a

variety of end products

Low power consumption, low cost, small size, excellent performance

Professional optical technology, precise module manufacturing techniques

Good image processing capabilities, can successfully capture image up to resolution

500 dpi

DESCRIPTION:-

Optical biometric fingerprint reader with great features and can be embedded into a

variety of end products, such as: access control, attendance, safety deposit box, car door

locks Fingerprint processing includes two parts: fingerprint enrollment and fingerprint

matching. When enrolling, user needs to enter the finger two times. The system will

process the two times Finger images, generate a template of the finger based on

processing results and store the template.

When matching, user enters the finger through optical sensor and system will generate a

template of the finger and compare it with templates of the finger library. For 1:1

matching, system will compare the live finger with specific template designated in the

Module; for 1: N matching, or searching, system will search the whole finger library for

the matching finger. In both circumstances, system will return the matching result,

success or failure.

Fingerprint is a pattern made up of ridges and valleys on our fingertip skin. While storing

the entry in database, scanner takes an image of these patterns and stores in its own

memory. Then while performing search operation, it again takes pattern of fingerprint of

that user who needs to gain access. This pattern is compared with all patterns previously

stored in memory. In short it performs a task which is related to Digital image

processing. It performs various iterations and executes matching algorithms and if it finds

exact match then it gives out fingerprint ID number. Otherwise it gives out error signal.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 18

SERIAL COMMUNICATION:-

When the FP module communicates with user device, definition of J1 is as follows:

3.5 Table of fingerprint Module Pin Descriptions

Precautions to be taken while accessing fingerprint sensor:

Fig.3.5.2 Correct way to access Fingerprint sensor

\

Pin

Number

Name Type Function Description

1 Vin INPUT Power input

2 GND - Signal ground. Connected to

power ground

3 TD INPUT Data output. TTL logical level

4 RD OUTPUT Out Data input. TTL logical

level

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 19

3.6 TRANSISTOR (BC 547)

Fig.3.6.1 Transistor

BC547 is an NPN bi-polar junction transistor. A transistor, stands for transfer of resistance, is

commonly used to amplify current. A small current at its base controls a larger current at

collector & emitter terminals.

BC547 is mainly used for amplification and switching purposes. It has a maximum current

gain of 800. Its equivalent transistors are BC548 and BC549.

The transistor terminals require a fixed DC voltage to operate in the desired region of its

characteristic curves. This is known as the biasing. For amplification applications, the

transistor is biased such that it is partly on for all input conditions. The input signal at base is

amplified and taken at the emitter. BC547 is used in common emitter configuration for

amplifiers. The voltage divider is the commonly used biasing mode. For switching

applications, transistor is biased so that it remains fully on if there is a signal at its base. In

the absence of base signal, it gets completely off.

A BC547 transistor is a negative-positive-negative (NPN) transistor that is used for many

purposes. Together with other electronic components, such as resistors, coils, and capacitors,

it can be used as the active component for switches and amplifiers. Like all other NPN

transistors, this type has an emitter terminal, a base or control terminal, and a collector

terminal. In a typical configuration, the current flowing from the base to the emitter controls

the collector current. A short vertical line, which is the base, can indicate the transistor

schematic for an NPN transistor, and the emitter, which is a diagonal line connecting to the

base, is an arrowhead pointing away from the base.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 20

3.7 CRYSTAL (11.0592 MHZ)

Fig.3.7.1 Crystal

Crystal oscillators can be manufactured for oscillation over a wide range of frequencies, from

a few kilohertz up to several hundred megahertz. Many applications call for a crystal

oscillator frequency conveniently related to some other desired frequency, so hundreds of

standard crystal frequencies are made in large quantities and stocked by electronics

distributors. Using frequency dividers, frequency multipliers and phase locked loop circuits;

it is practical to derive a wide range of frequencies from one reference frequency.

You can use other frequencies such as 12 MHz, but according to the referenced site,

11.0592MHz is used because:

"it can be divided to give you exact clock rates for most of the common baud rates for the

UART, especially for the higher speeds (9600, 19200). Despite the "oddball" value, these

crystals are readily available and commonly used."

This is a Standard 11.0592MHz quartz crystal in HC49 casing. Every Microcontroller has

inbuilt oscillator circuit, connecting this quartz crystal with controller forms the crystal

oscillator circuit which provide the desired frequency to the processor. This odd value

11.0592 MHz crystal is perfectly divisible for generating standard baud rate for serial

communication with PC.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 21

3.8 DISPLAY

Fig.3.8.1 Display

Pin

No Function Name

1 Ground (0V) Ground

2 Supply voltage; 5V (4.7V – 5.3V) Vcc

3 Contrast adjustment; through a variable resistor VEE

4 Selects command register when low; and data register when high Register Select

5 Low to write to the register; High to read from the register Read/write

6 Sends data to data pins when a high to low pulse is given Enable

7

8-bit data pins

DB0

8 DB1

9 DB2

10 DB3

11 DB4

12 DB5

13 DB6

14 DB7

15 Backlight VCC (5V) Led+

16 Backlight Ground (0V) Led-

3.6 Pin description of Display

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 22

A 16x2 LCD means it can display 16 characters per line and there are 2 such lines. In this

LCD each character is displayed in 5x7 pixel matrix. This LCD has two registers, namely,

Command and Data.

Command register stores the command instructions given to the LCD. A command is an

instruction given to LCD to do a predefined task like initializing it, clearing its screen, setting

the cursor position, controlling display etc. The data register stores the data to be displayed

on the LCD. The data is the ASCII value of the character to be displayed on the LCD

LCDs are used in a wide range of applications including computer monitors, televisions,

instrument panels, aircraft cockpit displays, and signage. They are common in consumer

devices such as video players, gaming devices, clocks, watches, calculators, and telephones,

and have replaced cathode ray tube (CRT) displays in most applications. They are available

in a wider range of screen sizes than CRT and plasma displays.

The LCD screen is more energy efficient and can be disposed of more safely than a CRT. Its

low electrical power consumption enables it to be used in battery-powered electronic

equipment. It is an electronically modulated optical device made up of any number of

segments filled with liquid crystals and arrayed in front of a light source (backlight) or

reflector to produce images in colour or monochrome. Liquid crystals were first discovered in

1888.[2]

By 2008, annual sales of televisions LCD screens exceeded sales of CRT units

worldwide; the CRT became obsolescent for most purposes. With

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 23

3.9 BUZZER

Fig.3.9.1 Buzzer

A buzzer or beeper is an audio signalling device, which may be mechanical,

electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm

devices, timers and confirmation of user input such as a mouse click or keystroke.

Audio transducers and buzzers convert electrical energy into acoustic energy. These devices

are found in smoke detectors and other products that produce sound. Some audio transducers,

like the one in the video below, are programmable and are capable of producing a series of

multiple tones.

3.10 NETWORK RESISTOR (10K)

Fig.3.10.1 NETWORK RESISTOR

Network resistor is a passive circuit element that is a combination of multiple resistances. It

forms a convenient solution when the user needs multiple resistances while constructing a

circuit. The manner in which the constituent resistances are combined can vary according to

the circuit requirement.

Hence, this type of resistor can be used to condense the circuit with additional benefits of low

costs and improved resistance tolerance matching.

Network Resistor is may used for speed up the process of Input Output ports.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 24

3.11 RELAY

Fig.3.11.1 Relay

Relays are switches that open and close circuits electromechanically or electronically. Relays

control one electrical circuit by opening and closing contacts in another circuit. As relay

diagrams show, when a relay contact is normally open (NO), there is an open contact when

the relay is not energized. When a relay contact is Normally Closed (NC), there is a closed

contact when the relay is not energized. In either case, applying electrical current to the state

contacts will change their.

Relays are generally used to switch smaller currents in a control circuit and do not usually

control power consuming devices except for small motors and Solenoids that draw low amps.

Nonetheless, relays can "control" larger voltages and amperes by having an amplifying effect

because a small voltage applied to a relays coil can result in a large voltage being switched by

the contacts.

Protective relays can prevent equipment damage by detecting electrical abnormalities,

including over current, undercurrent, overloads and reverse currents. In addition, relays are

also widely used to switch starting coils, heating elements, pilot lights and audible alarms.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 25

CHAPTER:-4

SIMULATION REPORT

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 26

4.1 SIMULATION REPORT

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 27

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 28

4.2 ADVANTAGES

Fingerprint based security system is most secured system as compared to other

systems. Reason is that RFID card or Keys of lock can be stolen, password may be

leaked. However thumbnail of every human being is unique, so lock will not open

unless the same person is present to give the impression of fingerprint.

No need to remember the password or any Pin number.

One of the main advantages is that this system remembers the stored password even

if the power supply is turned off.

Scientific research and studies have proved that fingerprints do not change as you

grow up.

Using Fingerprint saves time to gain access as compared to other methods like RFID

card, Password or Key.

It can only be opened when an authorized user is present.

most secure and accurate than traditional password

Password based security system has always the threat of being stolen and accessed by

the unauthorized user, but here It can only be opened when an authorized user is

present.

4.3 DISADVANTAGE

It‘s very costly.

4.4 APPLICATIONS

Personal computer security

Office security

Banking and financial systems

ATM, cellular phones, laptops, offices, cars etc.

Door lock system

Industrial application: ―Fingerprint based security system‖ project can be used by the

employees, staff or workers in various industries like Automobile industries,

manufacturing industries, Software development companies.

Home or domestic application: This project can be used to automate the door locking

process at our home, so the user need not to carry the door lock keys along with him,

he can just use his/her finger to open the door

Bank Lockers or security safes: Many of the banks use key based or password based

locks for their lockers or safes. We can implement Fingerprint based bank locker

system using this project.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 29

Fingerprint security system in car: - The latest in fingerprint technology can now be

seen beside your steering wheel. Read on to find out exactly why we give a 'thumbs

up' to this particular one.

4.4.1 Fingerprint car system

This gadget is an ultimate solution in car theft prevention equipped with a fingerprint

ignition lock, dual band GSM (900/1800) messaging system and standard car alarm style

audio alerts.

With the fingerprint ID scan technology, the gadget allows complete safety of your car from

any kind of theft and misuse as only the authorized drivers (registered) can start the car. So,

even if you have lost the keys, there is no need to panic.

Also, the CVKP-BG04 works as a standard car alarm, activating whenever anyone attempts

to forcibly open a door or the unit and receive SMS on your cell phone. Hits your automobile.

And if you want to catch hold of the culprit then and there, you can do so by simply installing

a GSM SIM card (compatible with 900 or 1800 band) into

Not only this, if you want to keep a track on your kids, this high-tech gadget allows you to do

so. For example, if your son says he is driving back home, you can track him by simply

sending a message to the system to see if the car is really in motion towards your home or is

still parked.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 30

CHAPTER:-5

CONCLUSION

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 31

5.1 CONCLUSION

This project mainly used in security purpose. In this project fingerprint

module is the main part of this system. It makes use of sensor to detect

fingerprint. And it compare scanned fingerprint with store fingerprint then it

display on LCD. And if fingerprint is correct then it turn on the relay otherwise

it turn on buzzer. It can store up to 256 fingerprints on its own memory.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 32

CHAPTER-6

APPENDIX

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 33

6.1 IC DATASHEET

Features

Compatible with MCS-51® Products

8K Bytes of In-System Programmable (ISP) Flash Memory

Endurance: 1000 Write/Erase Cycles

4.0V to 5.5V Operating Range

Fully Static Operation: 0 Hz to 33 MHz

Three-level Program Memory Lock

256 x 8-bit Internal RAM

32 Programmable I/O Lines

Three 16-bit Timer/Counters

Eight Interrupt Sources

Full Duplex UART Serial Channel

Low-power Idle and Power-down Modes

Interrupt Recovery from Power-down Mode

Watchdog Timer

Dual Data Pointer

Power-off Flag

Description

The at89s52 is a low-power, high-performance cmos 8-bit microcontroller with 8k Bytes of

in-system programmable flash memory. The device is manufactured using Atmel‘s high-

density nonvolatile memory technology and is compatible with the industry-standard 80c51

instruction set and pin out.

By combining a versatile 8-bit CPU with in-system programmable flash on A monolithic

chip, the Atmel at89s52 is a powerful microcontroller which provides a Highly-flexible and

cost-effective solution too many embedded control applications.

In addition, the at89s52 is designed with static logic for operation Down to zero frequency

and supports two software selectable power saving modes. The idle mode stops the CPU

while allowing the ram, timer/counters, serial port, and Interrupt system to continue

functioning. The power-down mode saves the ram contents but freezes the oscillator,

disabling all other chip functions until the next interrupt or hardware reset.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 34

Pin Configurations

TQFP

PLCC

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 35

PROGRAM MEMORY

If the EA pin is connected to GND, all program fetches are directed to external memory. On

the AT89S52, if EA is connected to VCC, program fetches to addresses 0000H through

1FFFH are directed to internal memory and fetches to addresses 2000H through FFFFH are

to external memory.

DATA MEMORY

The AT89S52 implements 256 bytes of on-chip RAM. The upper 128 bytes occupy a parallel

address space to the Special Function Registers. This means that the upper 128 bytes have the

same addresses as the SFR space but are physically separate from SFR space.

When an instruction accesses an internal location above address 7FH, the address mode used

in the instruction specifies whether the CPU accesses the upper 128 bytes of RAM or the SFR

space. Instructions which use direct addressing access of the SFR space.

For example, the following direct addressing instruction accesses the SFR at location 0A0H

MOV 0A0H, #data

Instructions that use indirect addressing access the upper 128 bytes of RAM. For example,

the following indirect addressing instruction, where R0 contains 0A0H, accesses the data byte

at address 0A0H, rather than P2 (whose address is 0A0H).

MOV @R0, #data

Note that stack operations are examples of indirect addressing, so the upper 128 bytes of data

RAM are available as stack space.

UART

The UART in the AT89S52 operates the same way as the UART in the AT89C51 and

AT89C52. For further information on the UART operation, refer to the ATMEL Web site

(http://www.atmel.com). From the home page, select ‗Products‘, then ‗8051-Architecture

Flash Microcontroller‘, then ‗Product Overview‘.

Timer 0 and 1

Timer 0 and Timer 1 in the AT89S52 operate the same way as Timer 0 and Timer 1 in the

AT89C51 and AT89C52. For further information on the timers‘ operation, refer to the

ATMEL Web site (http://www.atmel.com). From the home page, select ‗Products‘, then

‗8051-Architecture Flash Microcontroller‘, then ‗Product Overview‘.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 36

Timer 2

Timer 2 is a 16-bit Timer/Counter that can operate as either a timer or an event counter. The

type of operation is selected by bit C/T2 in the SFR T2CON (shown in Table 2). Timer 2 has

three operating modes: capture, auto-reload (up or down counting), and baud rate generator.

The modes are selected by bits in T2CON, as shown in Table 3. Timer 2 consists of two 8-bit

registers, TH2 and TL2. In the Timer function, the TL2 register is incremented every

machine cycle. Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12

of the oscillator frequency.

Idle Mode

In idle mode, the CPU puts itself to sleep while all the on chip peripherals remain active. The

mode is invoked by software. The content of the on-chip RAM and all the special functions

registers remain unchanged during this mode. The idle mode can be terminated by any

enabled interrupt or by a hardware reset. Note that when idle mode is terminated by a

hardware reset, the device normally resumes program execution from where it left off, up to

two machine cycles before the internal reset algorithm takes control. On-chip hardware

inhibits access to internal RAM in this event, but access to the port pins is not inhibited. To

eliminate the possibility of an unexpected write to a port pin when idle mode is terminated by

a reset, the instruction following the one that invokes idle mode should not write to a port pin

or to external memory.

Power-down Mode

In the Power-down mode, the oscillator is stopped, and the instruction that invokes Power-

down is the last instruction executed. The on-chip RAM and Special Function Registers

retain their values until the Power-down mode is terminated. Exit from Power-down mode

can be initiated either by a hardware reset or by an enabled external interrupt. Reset redefines

the SFRs but does not change the on-chip RAM. The reset should not be activated before

VCC is restored to its normal operating level and must be held active long enough to allow

the oscillator to restart and stabilize.

Interrupts

The AT89S52 has a total of six interrupt vectors: two external interrupts (INT0 and INT1),

three timer interrupts (Timers 0, 1, and 2), and the serial port interrupt. These interrupts are

all shown in Figure 10. Each of these interrupt sources can be individually enabled or

disabled by setting or clearing a bit in Special Function Register IE. IE also contains a global

disable bit, EA, which disables all interrupts at once.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 37

Timer 2 interrupt is generated by the logical OR of bits TF2 and EXF2 in register T2CON.

Neither of these flags is cleared by hardware when the service routine is vectored to. In fact,

the service routine may have to determine whether it was TF2 or EXF2 that generated the

interrupt, and that bit will have to be cleared in software. The Timer 0 and Timer 1 flags, TF0

and TF1, are set at S5P2 of the cycle in which the timers overflow. The values are then polled

by the circuitry in the next cycle. However, the Timer 2 flag, TF2, is set at S2P2 and is polled

in the same cycle in which the timer overflows.

Oscillator Characteristics

XTAL1 and XTAL2 are the input and output, respectively, of an inverting amplifier that can

be configured for use as an on-chip oscillator, as shown in Figure. Either a quartz crystal or

ceramic resonator may be used. To drive the device from an external clock source, XTAL2

should be left unconnected while XTAL1 is driven, as shown in Figure There are no

requirements on the duty cycle of the external clock signal, since the input to the internal

clocking circuitry is through a divide-by-two flip-flop, but minimum and maximum voltage

high and low time specifications must be observed.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 38

6.2 Fingetrprint module datasheet

Introduction

Operation Principle

Fingerprint processing includes two parts: fingerprint enrollment and fingerprint matching

(the matching can be 1:1 or 1: N). When enrolling, user needs to enter the finger two times.

The system will process the two time finger images, generate a template of the finger based

on processing results and store the template. When matching, user enters the finger through

optical sensor and system will generate a template of the finger and compare it with templates

of the finger library. For 1:1 matching, system will compare the live finger with specific

template designated in the Module; for 1: N matching, or searching, system will search the

whole finger library for the matching finger. In both circumstances, system will return the

matching result, success or failure.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 39

Serial communication protocol

The mode is semi duplex synchronism serial communication. And the default baud rate is

57600bps. User may set the baud rate in 9600-115200bps Transferring frame format is 10 bit:

the low-level starting bit, 8-bit data with the LSB first, and an ending bit. There is no check

bit.

Reset time

At power on, it takes about 500ms for initialization. During this period, the Module can‘t

accept commands for upper computer.

Data package format

When communicating, the transferring and receiving of command/data/result are all wrapped

in data package format.

Data package format

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 40

Definition of Data package

Module address

Each module has an identifying address. When communicating with upper computer, each

instruction/data is transferred in data package form, which contains the address item. Module

system only responds to data package whose address item value is the same with its

identifying address. The address length is 4 bytes, and its default factory value is

0xFFFFFFFF. User may modify the address via instruction Set Adder. The new modified

address remains at power off.

Module password

At power-on reset, system first checks whether the handshaking password has been modified.

If not, system deems upper computer has no requirement of verifying password and will enter

into normal operation mode. That‘s, when Module password remains the default, verifying

process can be jumped. The password length is 4 bytes, and its default factory value is 0FFH,

0FFH, 0FFH, 0FFH. Should the password have be modified, refer to instruction Set Pwd, and

then Module (or device) handshaking password must be verified before the system enter into

normal operation mode. Or else, system will refuse to execute and command. The new

modified password is stored in Flash and remains at power off.

FINGERPRINT BASED SECURITY SYSTEM

BALAJI INSTITUTE OF ENGINEERING & TECHNOLOGY PAGE 41

REFERENCE

http://www.8051projects.info

http://www.slideshare.net

http://www.projectsof8051.com

http://link.springer.com