Design And Implementation Of A Smart Door Lock System Using Finger Print
This research work on “Design And Implementation Of A Smart Door Lock System Using Finger Print” is available in PDF/DOC. Click the below button to request or download the complete material
Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There is a number of biometrics and different applications need different biometrics. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual’s unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics includes fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Project deals with Identification, Authentication and Setup of Security System using SM 630 Biometrics and 8051 Microcontroller. The main aim of this work is to build a smart door lock system using fingerprint.
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity (Engert, Gerald J., 2010).
Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their “Class Characteristics”.
Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags (Johnson, P. Lee 1973).
RFID Readers, Road Barriers, RFID Smart Card, CCTV, Metal Detectors, LED Search Lights, Fire Alarm, Finger Print Movement Control, Physical Access Control, Optical Fingerprint Scanners, Optical Sensors, Card Locks Card Access Control Systems, Fingerprint Technology, Digital Fingerprint, USB Fingerprint Reader etc.
Fingerprint System Authentication is a simpler process. It involves affirming or rejecting a claimed identity by matching a live template with an existing one. Most of these identification/ authentications are done by using Smart Card. The large growth of ID – Card based Fingerprint system security is wildly used in Public service applications (Fiebig, Tobias; Krissler, Jan; Hänsch, Ronny August 2014). These cards are used for multiple purpose applications such as Digital parking meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity, Personal Identification Verification Number etc.
Another kind of Fingerprint System is the scanner using ultrasound. The process involves high frequency sound to identify a fingerprint. An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature differences used for a variety of security and data-collection purposes, from identifying prisoners to allowing access to information or high-security areas (Ashbaugh, David R, 2010)
1.2 PROBLEM STATEMENT
The need for having a constant home protection has always been there. But in the recent times, considering a dramatic rise in petty crimes like robbery and theft, the need has been more strongly felt to have a fool proof protection of the belongings and the family members. Home security has come a long way in the last few decades. It was in the hands of a guard who manually provided surveillance during nights in the earlier days, but it was not fool proof as it was only normal for him to have momentary lapse of concentration. This device brought solution to this need. It ensures adequate protection against intruders.
1.3 OBJECTIVE OF THE PROJECT
The main aim of this project is to develop an embedded system which is used to verify an authorized person into a room. The objectives of this work are:
i. To construct a smart door that utilizes fingerprint recognition technology to allow access. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button.
ii. To reduce human labour involves in guiding our environment
iii. Replace the traditional door lock system which is using mechanical lock and key mechanism with embedded system.
iv. To produce a security system that will be simple in its operation, cost effective, durable and easily maintainable.
v. To ensures maximum and adequate security in our home and offices.
1.4 SIGNIFICANCE OF THE PROJECT
1. Fingerprint based security system is most secured system as compared to other systems. Reason is that RFID card or Keys of lock can be stolen, password may be leaked. However thumbnail of every human being is unique, so lock will not open unless the same person is present to give the impression of fingerprint.
2. No need to carry the keys to open the door lock. Or even there is no need to remember the password or any Pin number.
3. One of the main advantages is that this system remembers the stored password even if the power supply is turned off.
4. Scientific research and studies have proved that fingerprints do not change as you grow up.
5. Using Fingerprint saves time to gain access as compared to other methods like RFID card, Password or Key.
1.5 APPLICATIONS OF THE PROJECT
1. Industrial application: “Fingerprint based security system” project can be used by the employees, staff or workers in various industries like Automobile industries, manufacturing industries, Software development companies.
2. Home or domestic application: This project can be used to automate the door locking process at our home, so the user need not to carry the door lock keys along with him, he can just use his/her finger to open the door.
3. Bank Lockers or security safes: Many of the banks use key based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker system using this project.
1.6 SCOPE OF THE PROJECT
Personal Safes are revolutionary locking storage cases that open with just the touch of your finger. These products are designed as secure storage for medications, jewelry, weapons, documents, and other valuable or potentially harmful items. These utilize fingerprint recognition technology to allow access to only those whose fingerprints you choose. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked (Henry, Edward R 2010).
1.7 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and application of the study were discussed.
Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENT
CHAPTER ONE
1.0 INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
1.2 AIM/OBJECTIVE OF THE PROJECT
1.3 SIGNIFICANCE OF THE PROJECT
1.4 PURPOSE OF THE PROJECT
1.5 STATEMENT OF PPROBLEM
1.6 LIMITATION OF THE PROJECT
1.7 APPLICATION OF THE PROJECT
1.8 DEFINITION OF TERMS
1.9 PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
CHAPTER THREE
3.0 CONSTRUCTION METHODOLOGY
3.1 BLOCK DIAGRAM OF THE SYSTEM
3.2 DESCRIPTION OF SYSTEM BLOCK DIAGRAM
3.3 CIRCUIT DIAGRAM
3.3 CIRCUIT DESCRIPTION
3.4 SYSTEM OPERATION
3.5 COMPONENTS LIST
3.6 POWER SUPPLY UNIT
3.7 POWER SUPPLY CIRCUIT DSECRIPTION
3.7 DESCRIPTION OF MAJOR COMPONENTS USED
CHAPTER FOUR
4.0 RESULT ANALYSIS
4.1 CONSTRUCTION PROCEDURE AND TESTING
4.2 ASSEMBLING OF SECTIONS
4.3 CONSRUCTION OF THE CASING
4.4 ECONOMIC OF THE PROJECT
4.5 PROJECT VIABILITY
4.6 PROJECT RELIABILITY
4.7 PROJECT MAINTAINABILITY
4.8 PROJECT EVALUATION
4.9 TESTING, TROUBLESHOOTING AND REMEDY
CHAPTER FIVE
5.1 CONCLUSIONS
5.2 RECOMMENDATION
5.3 REFERENCES
Appendix A: user’s guide
Appendix B: cost analysis