25-06-2014, 02:06 PM
LOCKER OPENING AND CLOSING SYSTEM USING RFID, FINGERPRINT, PASSWORD AND GSM
LOCKER OPENING AND CLOSING SYSTEM.pdf (Size: 156.58 KB / Downloads: 204)
Abstract
The main purpose of this paper is to design and
implement a locker high security system based on RFID,
FINGERPRINT, PASSWORD and GSM technology which
can be organized in bank, secured offices and homes. In this
system only authentic person can be recovered money from
locker. We have implemented a locker security system based
on RFID, FINGERPRINT, PASSWORD and GSM
technology containing door locking system which can
activate, authenticate, and validate the user and unlock the
door in real time for locker secure access. Fingerprints are
one of many forms of biometrics, used to identify individuals
and verify their identity. This article touches on two major
classes of algorithms and four sensor designs (optical,
ultrasonic, passive capacitance, and active capacitance). The
main advantage of using RFID, FINGERPRINT,
PASSWORD and GSM is more secure than other systems.
In general terms, RFID is a means of identifying a person or
object using a radio frequency transmission. In other words
RFID is an electronic method of exchanging data over radio
frequency waves. The technology can be used to identify,
track, sort or detect a wide variety of objects.
Keywords: GSM, FINGERPRINT, RFID, locking
system, Keyboard, Microcontrolle
INTRODUCTION
Fingerprint verification is one of the most reliable
personal identification methods in biometrics. This
system consists of microcontroller, RFID reader, GSM
modem, Fingerprint scanner keyboard, and LCD. In this
system the RFID reader reads the id number from passive
tag and sends it to the microcontroller, if the id number is
valid then only it gives the access to the fingerprint
scanner otherwise it stops the process, if the fingerprint is
matched then microcontroller sends the password to the
authenticated person mobile number then the
authenticated person enters the both passwords in the
keyboard which was already given by the user and
received from the microcontroller. if these two passwords
are matched then the locker will be opened otherwise the
microcontroller sends the warning message to the
authenticated person mobile number and it will be remain
RELATED WORKS
In this section some related works are discussed below.
The purpose of this project is to increase the security that
customer use the ATM machine. Once user's bank card is
lost and the password is stolen, the criminal will draw all
cash in the shortest time, which will bring enormous
financial losses to customer, so to rectify this problem we
are implementing this project. The chip of LPC2148 is
used for the core of microprocessor in ARM7,
furthermore, an improved enhancement algorithm of
fingerprint image increase the security that customer use
the ATM machine[2].
In this paper we proposed that fingerprint verification of
ATM (Automatic Teller Machine) security system using
the biometric with hybridization. The fingerprint trait is
chosen, because of its availability, reliability and high
accuracy. The fingerprint based biometric system can be
implemented easily for secure the ATM machine. In this
system the working of these ATM machine is when the
customer place on the fingerprint module when it access
the ATM for draw the cash then, the machine wants to
fingerprint of that user’s which use the machine. Using
biometric, it verify/identify fingerprint and gives accurate
result that if it valid or not valid. In this way we can try to
control the crime circle of ATM and do secure
RFID FUNDAMENTALS
RFID is an effective automatic identification technology
for variety of objects. The most important functionality of
RFID is the ability to track the location of the tagged
item. Based on power source, RFID tags can be classified
into three major categories: active tags, passive tags, and
semi-passive (semi-active) tags. An active tag contains
both a radio transceiver and a battery that is used to
power the transceiver. Active tags are more powerful than
passive tags/semi-passive tags. RFID tags can also be
classified into two categories: tags with read/write
memory, and tags with read-only memory[7]. The tags
with read/write memory are more expensive than the tags
with read-only memory. RFID tags operate in three
frequency ranges: low frequency (LF, 30–500kHz), high
frequency (HF, 10–15MHz), and ultra high frequency
(UHF, 850–950MHz, 2.4–2.5GHz, 5.8GHz).20 LF tags
are less affected by the presence of fluids or metals when
compared to the higher frequency tags. RFID reader is
shown in fig
GSM
GSM (Global System for Mobile communications) is
the technology that underpins most of the world's mobile
phone networks. GSM is an open, digital cellular
technology used for transmitting mobile voice and data
services. GSM operates in the 900MHz and 1.8GHz
bands GSM supports data transfer speeds of up to 9.6
kbps, allowing the transmission of basic data services
such as SMS. The GSM standard is intended to address
these problems. In the current work, SIM300 GSM
module is used, it is shown in fig.2. The SIM300 module
is a Triband GSM/GPRS solution in a compact plug in
module featuring an industry-standard interface
FINGERPRINT
Fingerprints are one of many forms of biometrics, used to
identify individuals and verify their identity. The analysis
of fingerprints for matching purposes generally requires
the comparison of several features of the print pattern.
These include patterns, which are aggregate
characteristics of ridges, and minutia points, which are
unique features found within the patterns. It is also
necessary to know the structure and properties of human
skin in order to successfully employ some of the imaging
technologies[2].
The three basic patterns of fingerprint ridges are the arch,
loop, and whorl.
arch: The ridges enter from one side of the finger, rise
in the center forming an arc, and then exit the other side
of the finger.
loop: The ridges enter from one side of a finger, form a
curve, and then exit on that same side.
whorl: Ridges form circularly around a central point on
the finge
SOFTWARE PROGRAM TESTING
The software program is written in c or assembly
language and compiled using keil software. After
compiler operation the hex code is generated and stored
in the computer. The hex code of the program is burnt
into the LPC 2148 by using Top win Universal
programmer.
CONCLUSION
We have implemented a locker security system using
RFID, FINGERPRINT, PASSWORD and GSM. It is a
low cost, low in power conception, compact in size and
standalone system. The microcontroller compares the
passwords entered by keyboard and received through
mobile phone. If these passwords are correct the
microcontroller provides necessary control signal to open
the locker. Future work of this paper is planned to a
develop security system based on Iris scanner for visual
identification of the person.