You are on page 1of 4

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)

Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 2, March April 2013 ISSN 2278-6856

LOCKER OPENING AND CLOSING SYSTEM USING RFID, FINGERPRINT, PASSWORD AND GSM
Raghu Ram.Gangi1, Subhramanya Sarma.Gollapudi2
1

M.Tech Student, ECM Department, KL University, Vijayawada, Andhra Pradesh, India.


2

Asst.Professor, ECM Department, KL University, Vijayawada, Andhra Pradesh, India.

Abstract: The main purpose of this paper is to design and


implement a locker high security system based on RFID, FINGERPRINT, PASSWORD and GSM technology which can be organized in bank, secured offices and homes. In this system only authentic person can be recovered money from locker. We have implemented a locker security system based on RFID, FINGERPRINT, PASSWORD and GSM technology containing door locking system which can activate, authenticate, and validate the user and unlock the door in real time for locker secure access. Fingerprints are one of many forms of biometrics, used to identify individuals and verify their identity. This article touches on two major classes of algorithms and four sensor designs (optical, ultrasonic, passive capacitance, and active capacitance). The main advantage of using RFID, FINGERPRINT, PASSWORD and GSM is more secure than other systems. In general terms, RFID is a means of identifying a person or object using a radio frequency transmission. In other words RFID is an electronic method of exchanging data over radio frequency waves. The technology can be used to identify, track, sort or detect a wide variety of objects.

in locked position, This system is more secure than other systems because two passwords required for verification. RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a means of identifying a person or object using a radio frequency transmission[5]. Automatic fingerprint identification system mainly involves image collection, pretreatment, feature extraction, and feature matching and so on several parts[9].

2. RELATED WORKS
In this section some related works are discussed below. The purpose of this project is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem we are implementing this project. The chip of LPC2148 is used for the core of microprocessor in ARM7, furthermore, an improved enhancement algorithm of fingerprint image increase the security that customer use the ATM machine[2]. In this paper we proposed that fingerprint verification of ATM (Automatic Teller Machine) security system using the biometric with hybridization. The fingerprint trait is chosen, because of its availability, reliability and high accuracy. The fingerprint based biometric system can be implemented easily for secure the ATM machine. In this system the working of these ATM machine is when the customer place on the fingerprint module when it access the ATM for draw the cash then, the machine wants to fingerprint of that users which use the machine. Using biometric, it verify/identify fingerprint and gives accurate result that if it valid or not valid. In this way we can try to control the crime circle of ATM and do secure it[7].

Keywords: GSM, FINGERPRINT, system, Keyboard, Microcontroller.

RFID,

locking

1. INTRODUCTION
Fingerprint verification is one of the most reliable personal identification methods in biometrics. This system consists of microcontroller, RFID reader, GSM modem, Fingerprint scanner keyboard, and LCD. In this system the RFID reader reads the id number from passive tag and sends it to the microcontroller, if the id number is valid then only it gives the access to the fingerprint scanner otherwise it stops the process, if the fingerprint is matched then microcontroller sends the password to the authenticated person mobile number then the authenticated person enters the both passwords in the keyboard which was already given by the user and received from the microcontroller. if these two passwords are matched then the locker will be opened otherwise the microcontroller sends the warning message to the authenticated person mobile number and it will be remain Volume 2, Issue 2 March April 2013

3. PROPOSED METHOD
In this proposed work, RFID reader reads the id number from passive tag and sends it to the microcontroller, if the id number is valid then only it gives the access to the Page 142

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 2, March April 2013 ISSN 2278-6856
fingerprint scanner otherwise it stops the process, if the fingerprint is matched then microcontroller sends the password to the authenticated person mobile number then the authenticated person enters the both passwords in the keyboard which was already given by the user and received from the microcontroller. if these two passwords are matched then the locker will be opened otherwise the microcontroller sends the warning message to the authenticated person mobile number and it will be remain in locked position. smart cards, working at 13.56MHz, are the most common members of this group. However, UHF tags are severely affected by fluids and metals. UHF tags are more expensive than any other tag. The typical frequency of UHF tags are 868MHz (Europe), 915MHz (USA), 950MHz (Japan), and 2.45GHz The active tag enables higher signal strength and extends communication range up to 100-200m.

5. GSM
GSM (Global System for Mobile communications) is the technology that underpins most of the world's mobile phone networks. GSM is an open, digital cellular technology used for transmitting mobile voice and data services. GSM operates in the 900MHz and 1.8GHz bands GSM supports data transfer speeds of up to 9.6 kbps, allowing the transmission of basic data services such as SMS. The GSM standard is intended to address these problems. In the current work, SIM300 GSM module is used, it is shown in fig.2. The SIM300 module is a Triband GSM/GPRS solution in a compact plug in module featuring an industry-standard interface [6]. Features of GSM Single supply voltage 3.2v-4.5v Typical power consumption in SLEEP Mode: 2.5mA. SIM300 tri-band MT,MO,CB, text and PDU mode, SMS storage: SIM card Supported SIM Card :1.8V,3V

4. RFID FUNDAMENTALS
RFID is an effective automatic identification technology for variety of objects. The most important functionality of RFID is the ability to track the location of the tagged item. Based on power source, RFID tags can be classified into three major categories: active tags, passive tags, and semi-passive (semi-active) tags. An active tag contains both a radio transceiver and a battery that is used to power the transceiver. Active tags are more powerful than passive tags/semi-passive tags. RFID tags can also be classified into two categories: tags with read/write memory, and tags with read-only memory[7]. The tags with read/write memory are more expensive than the tags with read-only memory. RFID tags operate in three frequency ranges: low frequency (LF, 30500kHz), high frequency (HF, 1015MHz), and ultra high frequency (UHF, 850950MHz, 2.42.5GHz, 5.8GHz).20 LF tags are less affected by the presence of fluids or metals when compared to the higher frequency tags. RFID reader is shown in fig.1.

Figure 1 RFID Reader The most important functionality of RFID is the ability to track the location of the tagged item. Typical applications of HF tags are access control and smart cards. RFID Volume 2, Issue 2 March April 2013

Figure 2 GSM Modem Page 143

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 2, March April 2013 ISSN 2278-6856 6. FINGERPRINT
Fingerprints are one of many forms of biometrics, used to identify individuals and verify their identity. The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns. It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies[2]. The three basic patterns of fingerprint ridges are the arch, loop, and whorl. arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side. whorl: Ridges form circularly around a central point on the finger. In the whorl pattern, ridges form circularly around a central point on the finger Bifurcations are points at which a single ridge splits into two ridges. Minutiae and patterns are very important in the analysis of fingerprints since no two fingers have been shown to be identical [1]. Figure 4 Circuit Diagram for Locker System Circuit Diagram Description The Circuit Description of this project is Fingerprint Module has 4 pins in which 1st pin is connected to the power supply 3rd pin of the voltage regulator 7805. The 2nd pin is transmitter connected to the 12th pin of MAX232. The 3rd pin is receiver connected to the 11th pin of MAX232 and 4th pin is connected to the ground terminal. The 13th and 14th pins of MAX232 are connected to P0.1st (21st) pin and P0.0th (18th) of the LPC2148 Microcontroller for making communication. The RFID Reader has 2 pins in which 1st pin is connected to the 3rd pin of 7805 Voltage Regulator for power supply. The 2nd pin is connected to the P0.25th pin of the LPC2148 Microcontroller. The LPC2148 Microcontroller takes this digital signal and activates the required output signal. The Keypad Unit consists of 4 key switches in which these keys are connected to the P0.10, P0.11, P0.12 and P0.13 pins of LPC2148. The GSM Module consists of 2 terminals connected to the UART 1 corresponding to 34 and 35 pins of the LPC2148 Microcontroller. The Output Unit is LCD which consists of 11pins to be connected. The Register Select, Read/Write and Enable pins are connected to the P1.24, P1.25 and P1.26 pins and Data pins are connected to the PORT 1 pins. The Output coming from LM1117 Voltage Regulator which is generating +3.3 V DC is connected to the LPC2148 Microcontroller to the 43rd pin for power supply operation. Here in this project we are using DC Motor, Relay and Driver unit for opening and closing the Locker. The DC Motor operates at 12V, but our Controller operates at 3.3V, in order to driver more voltage we are using ULN2003A Driver unit. The Relay unit is an electromechanical switch used to switch the motor Page 144 sends the warning message to the authenticated person mobile number and it will be remain in locked position, The circuit is powered by regulated +5v dc.

8. CIRCUIT DIAGRAM

7. BLOCK DIAGRAM

Figure 3 Block diagram of locker security The block diagram of locker system based on RFID, FINGERPRINT, PASSWORD and GSM technology is shown in the fig:3 In this system the RFID reader reads the id number from passive tag and sends it to the microcontroller, if the id number is valid then only it gives the access to the fingerprint scanner otherwise it stops the process, if the fingerprint is matched then microcontroller sends the password to the authenticated person mobile number then the authenticated person enters the both passwords in the keyboard which was already given by the user and received from the microcontroller. If these two passwords are matched then the locker will be opened otherwise the microcontroller Volume 2, Issue 2 March April 2013

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)


Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com Volume 2, Issue 2, March April 2013 ISSN 2278-6856
automatically. The ULN2003A is 16-pin IC, in which 1 to 7 pins are inputs, 8th pin is ground, 9th pin is +12V Power Supply and 10 to 16 pins are output pins. The 1st and 2nd pins from the left side (inductor) of the relay1 are connected to the ULN2003A output pins (1C, COM). The Motor has two terminals in which A pin is connected to the Relay1 contact pins. The 1st and 2nd pins from the left side(inductor) of the relay2 is connected to the ULN2003A output pins(2C,COM).The B pin of the 1st wheel(Motor) is connected to the Relay2 contact pins. By using this DC Motor, we can open the lock by switching ON the motor and close by switching OFF the motor. [4] Kumar Chaturvedula, RFID Based Embedded System for Vehicle Tracking and Prevention of Road Accidents, International Journal of Engineering Research & Technology (IJERT), Vol. 1 Issue 6, August 2012. Gangi.Raghu Ram, N.Rajesh Babu, Tracking objects using RFID and Wireless Sensor Networks ijesat] International Journal Of Engineering science & Advanced technology Volume-2, Issue-3. Vishy Karri1, Daniel J.S. Lim2, Method and Device to Communicate via SMS After a Security Intrusion, 1st International Conference on Sensing Technology November 21-23, 2005 Palmerston North, New Zealand. Pramila D. Kamble, Dr.Bharti, W. Gawali, Fingerprint Verification of ATM Security System by Using Biometric and Hybridization, International Journal of Scientific and Research Publications, Volume 2, Issue 11, November 2012. Art Conklin1, Glenn Dietrich2, Diane Walz3, Password-Based Authentication: A System Perspective, Proceedings of the 37th Hawaii International Conference on System Sciences 2004. Zhang Jinhai, Liu Xinjian, Chen Bo, The design and implementation of ID Authentication System Based on Fingerprint Identification, 2011 Fourth International Conference on Intelligent Computation Technology and Automation. V.Ramya1, B. Palaniappan, V.Sumathi, Gsm Based Embedded System For Remote Laboratory Safety Monitoring And Alerting, International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.6, November 2012.

[5]

[6]

9. SOFTWARE PROGRAM TESTING


The software program is written in c or assembly language and compiled using keil software. After compiler operation the hex code is generated and stored in the computer. The hex code of the program is burnt into the LPC 2148 by using Top win Universal programmer.

[7]

[8]

10. CONCLUSION
We have implemented a locker security system using RFID, FINGERPRINT, PASSWORD and GSM. It is a low cost, low in power conception, compact in size and standalone system. The microcontroller compares the passwords entered by keyboard and received through mobile phone. If these passwords are correct the microcontroller provides necessary control signal to open the locker. Future work of this paper is planned to a develop security system based on Iris scanner for visual identification of the person. ACKNOWLEDGMENT The authors would like to thank everyone, whoever remained a great source of help and inspirations in this humble presentation. The authors would like to thank K.L. University management for providing necessary facilities to carry out this work. [9]

[10]

REFERENCES
[1]

Mary Lourde R and Dushyant Khosla, Fingerprint Identification in Biometric Security Systems , International Journal of Computer and Electrical Engineering, Vol. 2, No. 5, October, 2010. [2] D. Vinod kumar, Prof.M R K Murthy, Fingerprint Based ATM Security by using ARM7, IOSR Journal of Electronics and Communication Engineering (IOSRJECE) ISSN : 2278-2834 Volume 2, Issue 5 (Sep-Oct 2012). [3] Hugh Wimberly, Lorie M. Liebrock, Using Fingerprint Authentication to Reduce System Security: An Empirical Study, 2011 IEEE Symposium on Security and Privacy.

Volume 2, Issue 2 March April 2013

Page 145