Académique Documents
Professionnel Documents
Culture Documents
Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 2, March April 2013 ISSN 2278-6856
LOCKER OPENING AND CLOSING SYSTEM USING RFID, FINGERPRINT, PASSWORD AND GSM
Raghu Ram.Gangi1, Subhramanya Sarma.Gollapudi2
1
in locked position, This system is more secure than other systems because two passwords required for verification. RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a means of identifying a person or object using a radio frequency transmission[5]. Automatic fingerprint identification system mainly involves image collection, pretreatment, feature extraction, and feature matching and so on several parts[9].
2. RELATED WORKS
In this section some related works are discussed below. The purpose of this project is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem we are implementing this project. The chip of LPC2148 is used for the core of microprocessor in ARM7, furthermore, an improved enhancement algorithm of fingerprint image increase the security that customer use the ATM machine[2]. In this paper we proposed that fingerprint verification of ATM (Automatic Teller Machine) security system using the biometric with hybridization. The fingerprint trait is chosen, because of its availability, reliability and high accuracy. The fingerprint based biometric system can be implemented easily for secure the ATM machine. In this system the working of these ATM machine is when the customer place on the fingerprint module when it access the ATM for draw the cash then, the machine wants to fingerprint of that users which use the machine. Using biometric, it verify/identify fingerprint and gives accurate result that if it valid or not valid. In this way we can try to control the crime circle of ATM and do secure it[7].
RFID,
locking
1. INTRODUCTION
Fingerprint verification is one of the most reliable personal identification methods in biometrics. This system consists of microcontroller, RFID reader, GSM modem, Fingerprint scanner keyboard, and LCD. In this system the RFID reader reads the id number from passive tag and sends it to the microcontroller, if the id number is valid then only it gives the access to the fingerprint scanner otherwise it stops the process, if the fingerprint is matched then microcontroller sends the password to the authenticated person mobile number then the authenticated person enters the both passwords in the keyboard which was already given by the user and received from the microcontroller. if these two passwords are matched then the locker will be opened otherwise the microcontroller sends the warning message to the authenticated person mobile number and it will be remain Volume 2, Issue 2 March April 2013
3. PROPOSED METHOD
In this proposed work, RFID reader reads the id number from passive tag and sends it to the microcontroller, if the id number is valid then only it gives the access to the Page 142
5. GSM
GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1.8GHz bands GSM supports data transfer speeds of up to 9.6 kbps, allowing the transmission of basic data services such as SMS. The GSM standard is intended to address these problems. In the current work, SIM300 GSM module is used, it is shown in fig.2. The SIM300 module is a Triband GSM/GPRS solution in a compact plug in module featuring an industry-standard interface [6]. Features of GSM Single supply voltage 3.2v-4.5v Typical power consumption in SLEEP Mode: 2.5mA. SIM300 tri-band MT,MO,CB, text and PDU mode, SMS storage: SIM card Supported SIM Card :1.8V,3V
4. RFID FUNDAMENTALS
RFID is an effective automatic identification technology for variety of objects. The most important functionality of RFID is the ability to track the location of the tagged item. Based on power source, RFID tags can be classified into three major categories: active tags, passive tags, and semi-passive (semi-active) tags. An active tag contains both a radio transceiver and a battery that is used to power the transceiver. Active tags are more powerful than passive tags/semi-passive tags. RFID tags can also be classified into two categories: tags with read/write memory, and tags with read-only memory[7]. The tags with read/write memory are more expensive than the tags with read-only memory. RFID tags operate in three frequency ranges: low frequency (LF, 30500kHz), high frequency (HF, 1015MHz), and ultra high frequency (UHF, 850950MHz, 2.42.5GHz, 5.8GHz).20 LF tags are less affected by the presence of fluids or metals when compared to the higher frequency tags. RFID reader is shown in fig.1.
Figure 1 RFID Reader The most important functionality of RFID is the ability to track the location of the tagged item. Typical applications of HF tags are access control and smart cards. RFID Volume 2, Issue 2 March April 2013
8. CIRCUIT DIAGRAM
7. BLOCK DIAGRAM
Figure 3 Block diagram of locker security The block diagram of locker system based on RFID, FINGERPRINT, PASSWORD and GSM technology is shown in the fig:3 In this system the RFID reader reads the id number from passive tag and sends it to the microcontroller, if the id number is valid then only it gives the access to the fingerprint scanner otherwise it stops the process, if the fingerprint is matched then microcontroller sends the password to the authenticated person mobile number then the authenticated person enters the both passwords in the keyboard which was already given by the user and received from the microcontroller. If these two passwords are matched then the locker will be opened otherwise the microcontroller Volume 2, Issue 2 March April 2013
[5]
[6]
[7]
[8]
10. CONCLUSION
We have implemented a locker security system using RFID, FINGERPRINT, PASSWORD and GSM. It is a low cost, low in power conception, compact in size and standalone system. The microcontroller compares the passwords entered by keyboard and received through mobile phone. If these passwords are correct the microcontroller provides necessary control signal to open the locker. Future work of this paper is planned to a develop security system based on Iris scanner for visual identification of the person. ACKNOWLEDGMENT The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation. The authors would like to thank K.L. University management for providing necessary facilities to carry out this work. [9]
[10]
REFERENCES
[1]
Mary Lourde R and Dushyant Khosla, Fingerprint Identification in Biometric Security Systems , International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010. [2] D. Vinod kumar, Prof.M R K Murthy, Fingerprint Based ATM Security by using ARM7, IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012). [3] Hugh Wimberly, Lorie M. Liebrock, Using Fingerprint Authentication to Reduce System Security: An Empirical Study, 2011 IEEE Symposium on Security and Privacy.
Page 145