Download as pdf or txt
Download as pdf or txt
You are on page 1of 42

A

Mini Project Report


on

DOOR LOCK SYSTEM USING RFID AND FINGERPRINT

Submitted in partial fulfillment of the requirements for the award of the degree of

BACHELOR OF TECHNOLOGY

in
ELECTRONICS AND COMMUNICATION ENGINEERING
by

BONTHALA RASHMITHA (19275A0421)


VOOKANTI VANI (18271A0485)
GOURISHETTY SUMANJALI (18271A0479)
GUNUKULA SAI KRISHNA REDDY (18271A0471)
Under the Guidance of

Dr. BURRA RAJU


Associate Professor

Department of ECE

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

JYOTHISHMATHI INSTITUTE OF TECHNOLOGY & SCIENCE


(Approved by AICTE-New Delhi, Affiliated to JNTU-Hyderabad)

Nustulapur, Karimnagar-505481

2018-2022

1
JYOTHISHMATHI INSTITUTE OF TECHNOLOGY & SCIENCE
(Approved by AICTE-New Delhi, Affiliated to JNTU-Hyderabad)

Nustulapur, Karimnagar-505481

DEPARTMENT OF ELECTRONICS & COMMUNICATION ENGINEERING

CERTIFICATE
This is to certify that the mini project work entitled “DOOR LOCK SYSTEM USING RFID AND
FINGERPRINT “is a bonafide work carried out by BONTHALA RASHMITHA (19275A0421),
VOOKANTI VANI (18271A0485), GOURISHETTY SUMANJALI (18271AO479), GUNUKULA SAI
KRISHNA REDDY (18271A0471), in partial fulfillment of the requirements for the degree of
“BACHELOR OF TECHNOLOGY” in “ELECTRONICS ANDCOMMUNICATION” by the Jawaharlal
Nehru Technological University, Hyderabad during the Academic year “2021-2022”.

Internal Guide
HOD

Dr.BURRA RAJU
Mrs. ASHOK SRINIVASAN
M.Tech
M.Tech ,MISTE
Associate Professor
Associate Professor
Department of ECE
Department of ECE

2
ACKNOWLEDGEMENT
First and foremost we would like to express our immense gratitude
towards Management and Institution Jyothishmathi Institute of
Technology & Science, which helped us to attain profound technical skills
in the field of Embedded Systems, thereby fulfilling our most cherished
goal.
We are thankful to the Principal Dr.G.LAKSHMI NARAYANA
RAO, Jyothishmathi Institute of Technology & Science, Karimnagar for giving
us permission to carry out this project.
We are highly grateful to Mrs.K.RADHIKA REDDY HOD of
Electronics and Communication Engineering for the kind support and permission
to use the facilities available in the Institute.
We thank our project guide Dr.N.UMAPATHI, Associate
Professor, Dept of ECE, Jyothishmathi Institute of Technology & Science for his
guidance and constant supervision throughout the project. We would like to thank
him for his inspiration, guidance and constructive criticism for successful
completion of our degree.
We are greatly thankful to our project coordinator
Mr.G.KARTHIK, Assoc. Prof, Dept of ECE, Jyothishmathi Institute of
Technology & Science, Karimnagar, for his encouragement and moral support
throughout the mini project.
We are obliged to all the staff members for their support and co-
operation that is difficult to express in words. The time spent with them will
remain in our memory for years to come.

We would also like to thank all staff members and our co-
students who were
BONTHALA RASHMITHA (19275A0421)
always there at the
need of the hour and VOOKANTI VANI (18271A0485)
provided with all the
GOURISHETTY SUMANJALI (18271A0479)
help and facilities,
which we required for GUNUKULA SAI KRISHNA REDDY (18271A0471)
the completion of our
thesis.

3
ABSTRACT

Wireless security-based applications have rapidly increased due to dramatic


improvement of modern technologies. Radio Frequency Identification (RFID) is a
contactless technology that is widely used in several industries for tasks like access
control system, book tracking in libraries, tollgate system, supply chain management,
and so on. In this, automatic RFID based access control system using Arduino was
designed. The system RFID technology and Arduino to accomplish the required task.
When the RFID reader installed at the entrance detects an RFID tag, the system captures
the user unique identifier (UID)and compares it with stored UID for a match. If the user
UID captured match with any of the stored UID, access is granted; otherwise, access is
denied. The results clearly show that the system is cheap, effective, and a reliable means
of granting or denying access in a secured environment.

4
CONTENTS

TITLE PAGE NO.


ACKNOWLEDGEMENT

ABSTRACT

INTRODUCTION 1

1.1 Introduction 1
1.2 Motivation 1
1.3 Aim of the objective 1
1.4 Organization of Documentation 2
CHAPTER 2
LITERATURE SURVEY 3
2.1 Introduction 3
2.2 Existing System 3
2.3 Proposed System 4

CHAPTER 3
EXPERIMENTAL ANALYSIS 5
3.1 Introduction 5
3.2 Software Requirement 5

3.2.1 Arduino UNO 5


3.2.2 Atmega 328P 12
3.3 Hardware Components 26
3.3.1 Battery 26

3.3.2 Resistors 30
3.3.3 Bread Board 31
3.3.4 DC Motor 34
3.3.5 IR LEDs 37

5
3.3.6 Humidity Sensors 39
3.3.7 Soil Moisture Sensor 40
3.3.8 GSM Modem 41

CHAPTER 4

DESIGN 44
4.1 Introduction 44
4.2 Circuit Diagram 44
4.2.1 Circuit Explanation 45

4.3 Block Diagram 45


CHAPTER 5
RESULTS ANALYSIS 46
5.1 Results 46

5.2 Applications 47
5.3 Advantages 47
CHAPTER 6
CONCLUSION & FUTURE SCOPE 48

6.1 Conclusion 48
6.2 Future Scope 49
REFERENCES 50

6
Page No.
Fig.3.1 Arduino Board 6
Fig:3.2 Arduino is Open-Source Hardware 7

Fig:3.3 Atmega 168 Pin Mapping 10


Fig: 3.4 Atmega8 Microcontroller 12
Fig:3.5 Crystals Oscillator 17
Fig:3.6 AVR Micro Block Diagram 17

Fig:3.7 AVR Micro Controller Internal Architecture 19


Fig: 3.8 Interfacing with Microcontroller 24
Fig: 3.9 Connecting to Blue Link 25
Fig:3.10 Battery 27
Fig:3.11 Symbol and Various Battery’s 27

Fig:3.12 Working of Battery 27


Fig:3.13 Battery 29
Fig.3.14 Resistor 31
Fig.3.15 Colour Bands In Resistor 31

Fig:3.16 Bread Board 32


Fig:3.17 Breadboard Jumper Wire Set 33
Fig:3.18 DC Motor 34
Fig:3.19 2-Pole DC Electric Motor 35

Fig:3.20 DC motors are of a Two-Pole Design 36


Fig:3.21 DC motors are of a three-pole design 36
Fig:3.22 LED 37
Fig:3.23 Lifetime Tests 38

Fig:3.24 Humidity Sensors 39

Fig: 3.25 Soil Moisture Sensor 41

Fig:3.26 GSM Modem 42


Fig:3.27 Representation of a GSM signal using TDMA & 43
FDMA with respect to the transmitted power.
Fig:4.1 Circuit Diagram of Smart Agriculture Monitoring System Using Arduino 44

7
Fig:4.2 Block Diagram 45

Fig:5.1 Result of Design of Smart Agriculture Monitoring System Using Arduino 46

8
CHAPTER 1
INTRODUCTION
1.1 INTRODUCTION
RFID and fingerprint-based door lock system is introduced for security purpose. Radio
frequency identification (RFID) is a contactless technology that is widely used in several
industries for tasks like access control system, book tracking in libraries, etc. It has an UID
(unique identifier) and compares it with stored UID with a match.

1.2 MOTIVATION

The primary motivation of implemented project is design of the RFID based


high security building lock system, fingerprint and password. In the
implemented system, only authorized person can be enter from the building
door locking by scanning his card. There will be important documents and
jewellers so that we can also use this as a security purpose .there will be
chance of missing important things from our houses.

1.3 AIM OF THE OBJECTIVE


It is impenetrable (easy to pass or enter) security system. Especially in case of medication,
jewelry, documents, and others valuable items and mandatorily in the higher intelligence
agency. Here, a developed security system with automatic sensing is introduced using both
Radio frequency identification (RFID). To provide security from hacking, passwords,
recognizing id cards. This technology provides a revolutionary automation in various
processes ranging from industrial sectors to home control.

 Automated assimilation and access control system has turned out to be important to defeat the
security dangers looked by numerous organizations. This is a time where everything is
associated with the system, where anybody can get hold of data from anyplace around the globe.

9
Therefore, hacking of one's information is a major issue. Because of these dangers, it is
imperative to have some sort of personal identification (ID) to get to one's own particular
information. Different systems are introduced at various points to track the individual's
movement and to confine their entrance to touchy zones in the secured area. Among standard
individual ID strategies, password and ID card methods are the most

observed methods. However, it is not very difficult to hack secret password now and
recognizable ID cards may get lost, hence making these techniques very questionable [1]. Again,
Radio frequency identification (RFID) is a remote innovation that can be utilized to evolve the
entrance control system. This technology provides a revolutionary automation in various
processes ranging from industrial sectors to home control [2-3]. In RFID technology, the
identification of an object automatically consists of the object, location of the object or
individual with a special identifier code contained with an RFID tag, which is somehow
connected to or implanted in the target [4]. Because of the shaky wireless channel between RFID
tag and RFID reader, security dangers against RFID system have been showing up. Numerous
RFID verification conventions against the security dangers have been studied in [5].

The biometric security system is being used for a long time as a strong security system in different
spaces. Numerous strategies are accessible in biometrics like the fingerprint, eye iris, retina, voice,
confront and so forth. These distinctive strategies have certain focal points and inconveniences
which must be considered in creating the biometric system, for example, system unwavering quality,
value, adaptability, need of physical contact with the checking gadget and numerous different
parameters [6]. Fingerprints are one of the numerous types of biometrics, used to distinguish people
and check their identity. The use of fingerprint for acclimatizing has been used in law prerequisite
for about a century [7-8]. The investigation of fingerprints for matching purposes requires the
correlation of a few highlights of the print pattern. These incorporate patterns include total qualities
of edges, and minutia focuses. It is additionally important to know the structure and properties of
human skin keeping in mind the end goal to effectively utilize a portion of the imaging advancements
[9]. In this paper, efforts have been made to use both RFID and biometric formula at a time to provide
more safety and stronger security to access the automatic sensing of the entity and performing the
verification of an accessible identity of the entity and also the automatic operation of action in case
of valid access. A person must punch card with RFID tag and presses his finger on the sensor as his
fingerprint must be verified to be matched instantly to access the security system. The motivation of
this work is to create a more convenient way to unlock the door than the traditional key. In the key’s
place, an RFID tag and the fingerprint will unlock the door immediately. If somehow any trespasser
manages to have RFID tagging card, he cannot access the door with his fingerprint as it will not
match. Even fingerprint sensor will not be activated before the RFID card is punched. Therefore, it
remains

10
11
1.4 ORGANIZATION OF DOCUMENTATION

Chapter 1 Introduction: 1.1 Introduction, 1.2 Motivation, 1.3 Aim of the objective
Chapter 2 Literature survey:2.1 Introduction ,2.2 Existing System, 2.3Proposed
System

Chapter 3 Design:3.1 Introduction, 3.2 Circuit Diagram, 3.2.1 Circuit Explanation

Chapter 4 Experimental analysis :4.1 Introduction, 4.2 Hardware Components

Chapter 5 Results Analysis: 5.1 Applications, 5.2 Advantages, 5.3 Results &

Discussion

Chapter 6 Conclusion & future scope

References

12
CHAPTER 2
LITERATURE SURVEY
 Pradnya R Nehete, J P Chaudhari, S R Pachpande and K P Rane. Literature Survey on Door Lock
Security Systems. International Journal of Computer Applications 153(2):13-18, November
2016.
 There are various research done on biometric locks systems like Pradnya Nehete, R. J. P.
Chaudhari, S. R. Prachanda, K. P. Rane, (2016) [11] in their paper reviewed and concluded
various papers on upcoming smart lock technologies like biometric locks, locks with GPS, GSM
based, Bluetooth based, OTP based, RFID based locks etc. and listed out the problems with each
type of lock technology like locks with facial recognition requires more reliability etc. SALAM
ABEED DAHE, (2015) [6] in their paper studied the advantages of biometric lock technology
over other lock technologies like locks based on RFID's. He concluded that biometric lock
technology is superior among the other lock technologies. ...

2.1 Introduction

,2.2 Existing System

PROPOSED METHOD:
 Here we construct RFID and fingerprint door lock.
 We use Arduino uno(r3), fingerprint sensor, RFID reader , tags, servomotor to perform this
project.
 This method is secure for all the important documents, items, banks,. Etc.

. Working Principle of the System (TECHNOLOGY USED)


The working principle of the system is divided into three sections. They are detailed below: 5.1. RFID
Card Punching and Operating RFID is a major and modest innovation that empowers wireless
information transmission [20]. The RFID reader module is powered from the external power supply and
Arduino is powered from the 5V supply. For interfacing of RFID reader with an Arduino, five RFID wires
are connected with five digital ports of Arduino. Both of the grounds pin of Arduino and RFID reader is
connected. The RFID reader reads the RFID labels, a controller is utilized to acknowledge the information

13
from the RFID reader and control the output of the security door lock and the RGB LED. The RFID reader
is set outwardly of the entryway and it is disconnected from the controller secretly so that nobody can

break the RFID reader for avoiding the security. The controller of this task gets serial data from the RFID
reader and controls the Door bolt and the LED. 5.2. Fingerprint Installing and Sensing 5.2.1. Enrolling the
Fingerprint A pattern of interleaved ridges and valleys are the main component of a fingerprint. They
easily stream in parallel and once in a while end or bifurcate. The pattern of ridges and valleys can show
a specific shape called minutiae at a local level [21]. There are a few kinds of minutiae as shown in Figure
5, yet for pragmatic reasons, just two sorts of details are considered: ridge ending and ridge bifurcation
[6]. The terms of fingerprint structures and their definitions are depicted in Table 1

There are fundamentally two prerequisites for utilizing the optical fingerprint sensor. Firstly, the
fingerprints should be enrolled - that implies designating ID #'s to each print so that they can be checked
later. Once enlisted all prints, the sensor can easily be searched by asking which ID (assuming any) is at
present being shot. This enrollment is done by utilizing the windows programming software or with the
Arduino programming. 5.2.2. Enrolling New User The most effortless approach to do this is to associate
it

specifically to the USB/Serial converter in the Arduino. To do this, a blank sketch is uploaded using
Arduino Uno and the fingerprint sensor is directly connected to the USB/Serial. When the power supply
is provided, the red LED blink to indicate the sensor is working. 5.2.3. Wiring for Use with Arduino

After testing the sensor, it can be used to verify a fingerprint. The fingerprint is attached with Arduino
through the jumper wire. The Tx of Fingerprint sensor is connected to the digital 2 (Rx) of Arduino Uno
and both of their ground pins is connected. The RFID reader module is powered from the external power
supply and Arduino is powered from the 5V supply. So, the green and white wires are disconnected and
the green wire is plugged into digital 2 and the white wire to digital 3. Interfacing of fingerprint sensor
with Arduino is shown in following Figure 6.

2.3Proposed system
The proposed security system is designed with both RFID and fingerprint sensor as an
entrance permitting key. Only RFID reader part of RFID unit and the fingerprint pressing
part of fingerprint unit is kept open before door as a locking system and both the RFID
tag and valid fingerprint is the key to permit one to access the door. The external
photographic view of the system is shown in the following Figure 1. The internal circuit
14
design includes RFID reader unit, fingerprint sensor, servo motor, Arduino UNO, power
supply, and a breadboard. All these components are connected, and the power supply is
provided through jumper wires. Arduino is powered by 5V supply and sensors, and servo
motors are provided with requisite power externally. The internal circuit diagram of the
system is shown in table below:
NO TERM DEFINITION
01 Termination Termination The location where a ridge come to an end

02 Bifurcation The process where a ridge divides into two separate ridges

03 Binarization A process to transform the image from 256 levels to two


levels (0, 1) refers to (black and white) respectively

04 Thinning The process of reducing the width of each ridge to one


pixel
05 Termination angle Considered as angle between the direction of the ridge
and the horizontal
06 Bifurcation angle Which Considered as the angle between the direction of
the valley ending between the bifurcations and the
horizontal

07 Matching Score It is the measure of similarity between the input and


template data
08 False Non-Matching Ratio The system fails to detect a match between input and
template in database

15
Chapter 3
Design

:3.1 Introduction

3.2 Circuit Diagram

16
17
3.2.1 Circuit Explanation

18
Chapter 4

Experimental analysis

:4.1 Introduction

4.2 Hardware Components


 Arduino uno R3 based on Atmega328p.
 Spark fun RFID reader breakout- RC522
 Micro-server motor-SG90
 Adafruit RGB Backlight LCD-16*2
 RFID Tag
 Bread board
 Connecting wires(jumpers)
 Fingerprint sensor- DY50/FPM10A

19
ARDUINO UNO R3 ATMEGA 328P:
As we discussed we know that Arduino Uno is the most standard board available and probably
the best choice for a beginner. We can directly connect the board to the computer via a USB Cable which
performs the function of supplying the power as well as acting as a serial port.

Arduino is an open-source venture for building computerized gadgets and intelligent items that can detect
and control physical gadgets. The UNO version of it is utilized here as a miniaturized scale controller
gadget for working the capacity of this proposed security system.

20
 Vin: This is the input voltage pin of the Arduino board used to provide input supply from an
external power source.
 5V: This pin of the Arduino board is used as a regulated power supply voltage, and it is used to
give supply to the board as well as onboard components.
 3.3V: This pin of the board is used to provide a supply of 3.3V which is generated from a voltage
regulator on the board
 GND: This pin of the board is used to ground the Arduino board.
 Reset: This pin of the board is used to reset the microcontroller. It is used to Resets the
microcontroller.
 Analog Pins: The pins A0 to A5 are used as an analog input and it is in the range of 0-5V.
 Digital Pins: The pins 0 to 13 are used as a digital input or output for the Arduino board.
 Serial Pins: These pins are also known as a UART pin. It is used for communication between
the Arduino board and a computer or other devices. The transmitter pin number 1 and receiver
pin number 0 are used to transmit and receive the data resp.
 External Interrupt Pins: This pin of the Arduino board is used to produce the External interrupt
and it is done by pin numbers 2 and 3.
 GND: This pin of the board is used to ground the Arduino board.
 Reset: This pin of the board is used to reset the microcontroller. It is used to Resets the
microcontroller.
 Analog Pins: The pins A0 to A5 are used as an analog input and it is in the range of 0-5V.
 Digital Pins: The pins 0 to 13 are used as a digital input or output for the Arduino board.
 Serial Pins: These pins are also known as a UART pin. It is used for communication between
the Arduino board and a computer or other devices. The transmitter pin number 1 and receiver
pin number 0 is used to transmit and receive the data resp.
 External Interrupt Pins: This pin of the Arduino board is used to produce the External interrupt
and it is done by pin numbers 2 and 3.
 PWM Pins: This pin of the board is used to convert the digital signal into an analog by varying
the width of the Pulse. The pin numbers 3,5,6,9,10 and 11 are used as a PWM pin.
 SPI Pins: This is the Serial Peripheral Interface pin; it is used to maintain SPI
communication with the help of the SPI library. SPI pins include:
1. SS: Pin number 10 is used as a Slave Select
2. MOSI: Pin number 11 is used as a Master Out Slave In
3. MISO: Pin number 12 is used as a Master In Slave Out
4. SCK: Pin number 13 is used as a Serial Clock

21
 LED Pin: The board has an inbuilt LED using digital pin-13. The LED glows only when
the digital pin becomes high.
 AREF Pin: This is an analog reference pin of the Arduino board. It is used to provide a
reference voltage from an external power supply.

SPARKFUN RFID READER BREAKOUT(RC522)

22
The SparkFun RFID Qwiic Reader is a simple I2C based RFID breakout board for the ID-3LA,
ID-12LA, and ID-20LA readers. 1 In Stock. My problem is this, I'm using a device (host
computer) which runs an embedded version of Linux which doesn’t contain the RS232/USB
Virtual COM Port drivers for the Spark Fun Interface board. PLN 2,99. It includes an XBee
The RC522 is a 13.56MHz RFID module that is based on the MFRC522 controller from NXP
semiconductors. The module can support I2C, SPI and UART and normally is shipped with a
RFID card and key fob. It is commonly used in attendance systems and other person/object
identification applications.

RC522 Pin Configuration


RC522 Features
• 13.56MHz RFID module
• Operating voltage: 2.5V to 3.3V
• Communication: SPI, I2C protocol, UART
• Maximum Data Rate: 10Mbps
• Read Range: 5cm
• Current Consumption: 13-26mA
Power down mode consumption: 10uA (min)
23
Pin Pin Name Description
Number

1 Vcc Used to Power the module, typically 3.3V is used

2 RST Reset pin – used to reset or power down the module

3 Ground Connected to Ground of system

4 IRQ Interrupt pin – used to wake up the module when a device comes into range

5 MISO/SCL/Tx MISO pin when used for SPI communication, acts as SCL for I2c and Tx for UART.

6 MOSI Master out slave in pin for SPI communication

7 SCK Serial Clock pin – used to provide clock source

8 SS/SDA/Rx Acts as Serial input (SS) for SPI communication, SDA for IIC and Rx during UART

 RC522 Features
• 13.56MHz RFID module
• Operating voltage: 2.5V to 3.3V
• Communication: SPI, I2C protocol, UART
• Maximum Data Rate: 10Mbps
• Read Range: 5cm
• Current Consumption: 13-26mA
• Power down mode consumption: 10uA (min)

24
Where to use RC522 RFID Module
• The RC522 is a RF Module that consists of a RFID reader, RFID card and a key chain.
The module operates 13.56MHz which is industrial (ISM) band and hence can be used
without any license problem. The module operates at 3.3V typically and hence commonly
used in 3.3V designs. It is normally used in application where certain person/object has
to be identified with a unique ID.
• The keychain has 1kB memory in it which can be used to stored unique data. The RC522
reader module can both read and write data into these memory elements. The reader can
read data only form passive tags that operate on 13.56MHz.
• How to use RC522 RFID Module
• The RC522 has an operating voltage between 2.5V to 3.3V and hence is normally
powered by 3.3V and should be used with 3.3V communication lines. But the
communication pins of this module are 5V tolerant and hence it can be used with 5V
microcontrollers also like Arduino without any additional hardware. The module supports
SPI, IIC and UART communication but out of these SPI is often used since it is the fasted
with a maximum data rate of 10Mbps.
• Since in application, most of the time reader module will be waiting for the tag to come
into proximity. The Reader can be put into power down mode to save power in battery
operated applications. This can be achieved by using the IRQ pin on the module. The
minimum current consumed by the module during power down mode will be 10uA only.
The module can be easily used with Arduino because of its readily available RC522
RFID Arduino library from Miguel Balboa. You can visit his GitHub page for more
details on how to use it with Arduino.
 Applications
• Automatic billing systems
• Attendance systems
• Verification/Identification system
• Access control systems

25
ADAFRUIT RGB BACKLIGHT LCD

Description
 This is a fancy upgrade to standard 16x2 LCDs, instead of just having blue and white, or
red and black, this LCD has black characters on a full color RGB-backlight background!
That means you can change the background color to anything you want - red, green, blue,
pink, white, purple, yellow, teal, salmon, chartreuse, or just leave it off for a neutral
background. This LCD is the most daylight readable character LCD we have and is very
beautiful and easy to read no matter what color/brightness you have for the backlight.

26
 We had these custom made to our specification so that you can use them in existing LCD
projects, and they'll still work - just that only the red LED will be used. The extra two
pins (17 and 18) are for the green and blue LEDs. The LCD has resistors on board
already so that you can drive it with 5V logic, and the current draw will be ~20mA per
LED. There's a single LED backlight for the entire display, the image above showing 3
colors at once is a composite!

Comes with a single 16x2 RGB backlight LCD, 10K necessary contrast potentiometer
and strip of header. Our tutorials and diagrams will have you up and running in no time!

Technical Details
• 16 characters wide, 2 rows
• Black text on multi-color background
• Connection port is 0.1" pitch, single row for easy breadboarding and wiring
• Pins are documented on the back of the LCD to assist in wiring it up
• Single RGB LED backlight included can be dimmed easily with a resistor or PWM and
uses much less power than LCD with EL (electroluminescent) backlights
• Each R, G, & B LED has a 200-ohm resistor in series so you can power the backlight
from 3V or 5VDC. R forward voltage is ~2.2V, G & B are ~3.4V
• Can be fully controlled with only 6 digital lines! (Any analog/digital pins can be used)
and 3 PWM pins for the backlight
• Built in character set supports English/Japanese text, see the HD44780 datasheet for the
full character set
• Up to 8 extra characters can be created for custom glyphs or 'foreign' language support
• Comes with 10K necessary contrast potentiometer and strip of header
• Screen Dimensions: 27mm x 71mm / 1.1" x 2.8"

27
MICRO SERVO MOTOR:

A servo control is a standout amongst the most essential and generally utilized as a part of the
control system. Servo instruments permit powerful gadgets to be controlled by signals from
gadgets of much lower control [13]. The movement of door bar is controlled by the servo motor
SG90. The power is provided to servomotor through an outer connector. All the gears of it are
metal. The 4.8-7.2V is considered as working voltage. Photographic view of servo motor SG90
with its distinctive parts measurement is appeared in following Figure 3.

A servomotor is a rotary actuator or linear actuator that allows for precise control of angular or
linear position, velocity and acceleration. [1] It consists of a suitable motor coupled to a sensor
for position feedback. It also requires a relatively sophisticated controller, often a dedicated
module designed specifically for use with servomotors

28
Jump wire
A jump wire (also known as jumper, jumper wire, jumper cable, DuPont wire or cable) is an
electrical wire, or group of them in a cable, with a connector or pin at each end (or sometimes
without them – simply "tinned"), which is normally used to interconnect the components of a
breadboard or other prototype or test circuit, internally or with other equipment or components,
without soldering.

Individual jump wires are fitted by inserting their "end connectors" into the slots provided in a
breadboard, the header connector of a circuit board, or a piece of test equipment.
There are different types of jumper wires. Some have the same type of electrical connector at
both ends, while others have different connectors. Some common connectors are: Solid tips – are
used to connect on/with a breadboard or female header connector. The arrangement of the
elements and ease of insertion on a breadboard allows increasing the mounting density of both
components and jump wires without fear of short-circuits. The jump wires vary in size and
colour to distinguish the different working signals. Crocodile clips – are used, among other

29
applications, to temporarily bridge sensors, buttons and other elements of prototypes with
components or equipment that have arbitrary connectors, wires, screw terminals, etc. Banana
connectors – are commonly used on test equipment for DC and low-frequency AC signals.
Jumper wires with crocodile clips Jump wires at the end of a multi-colored ribbon cable are used
to connect the pin header at the left side of a blue USB2Serial board to a white breadboard
below. Another jumper cable ending in a USB micro male connector mates to the right side of
the USB2Serial board. Red and black tinned jump wires can be seen on the breadboard.
Registered jack (RJnn) – are commonly used in telephone (RJ11) and computer networking
(RJ45). RCA connectors – are often used for audio, low-resolution composite video signals, or
other low-frequency applications requiring a shielded cable. RF connectors – are used to carry
radio frequency signals between circuits, test equipment, and antennas. RF jumper cables -
Jumper cables is a smaller and more bendable corrugated cable which is used to connect
antennas and other components to network cabling. Jumpers are also used in base stations to
connect antennas to radio units. Usually the most bendable jumper cable diameter is ½”.

Fingerprint scanner
Fingerprint scanners are security systems of biometrics. They are used in police stations, security
industries, smartphones, and other mobile devices.

30
Function
Everyone has patterns of friction ridges on their fingers, and it is this pattern that is called the fingerprint.
Fingerprints are uniquely detailed, durable over an individual's lifetime, and difficult to alter. Because there
are countless combinations, fingerprints have become an ideal means of identification.

Types of fingerprint scanners


There are four types of fingerprint scanner: [1] the optical scanner, the capacitance scanner, the
ultrasonic scanner, and the thermal scanner. The basic function of every type of scanner is to obtain
an image of a person's fingerprint and find a match for it in its database. The measure of the
fingerprint image quality is in dots per inch (DPI). [2]
1. Optical scanners take a visual image of the fingerprint using a digital camera.
2. Capacitive or CMOS scanners use capacitors and thus electrical current to form an image of
the fingerprint. This type of scanner tends to excel in terms of precision.
3. Ultrasonic fingerprint scanners use high frequency sound waves to penetrate the epidermal
(outer) layer of the skin
. 4. Thermal scanners sense the temperature differences on the contact surface, in between
fingerprint ridges and valleys.
All fingerprint scanners are susceptible to be fooled by a technique that involves photographing
fingerprints, processing the photographs using special software, and printing fingerprint replicas
using a 3D printer. [3]

Construction forms
There are two construction forms: the stagnant and the moving fingerprint scanner. Stagnant: The
finger must be dragged over the small scanning area. This is cheaper and less reliable than the
moving form. Imaging can be less than ideal when the finger is not dragged over the scanning area
at constant speed.
Moving: The finger lies on the scanning area while the scanner runs underneath. Because the
scanner moves at constant speed over the fingerprint, imaging is superior.
Fingerprint Unit
Fingerprint-based authentication is the most advanced and accepted biometrics technologies [16-
19]. The fingerprint validation alludes to the robotized technique for checking a match between
two human fingerprints. The processing of fingerprint has three essential functions: enrollment,
searching, and verification. Among these functions, enrollment which catches fingerprint picture
from the sensor assumes a critical part. A reason is that the way individuals put their fingerprints
on a mirror to output can influence the outcome in the searching and checking process. This unit
is utilized here to doubly secure the security system.

31
RFID Unit
The RFID gadget fills an indistinguishable need from a standardized identification or an attractive
strip on the back of a charge card or ATM card; it gives a one of a kind identifier to that protest.
Furthermore, similarly as a scanner tag or attractive strip must be checked to get the data, the RFID
gadget must be filtered to recover the recognizing data [14]. The examined data from RFID label
go to RFID per user first. At that point, it is exchanged to microcontroller framework and changed
over as database framework. This process of examining the data is used here to identify the validity
of the person who is supposed to unlock the door. A stream chart of RFID task is appeared in
following Figure 4.

32
Chapter 5
Results Analysis:

5.1 Applications
Here are the main RFID applications you can find in your daily life
• Traceability in the supply chain.
• Logistics and inventories in the retail industry.
• Security control and jewelry.
• Cosmetics and medicines.
• Control of disposals and tools in hospitals.
• Libraries.
• Files and archives.

5.2 Advantages
Security
Data on keycards is usually secure because it takes specialized equipment to read it. This
maintains the lock system security.
Convenience
It only takes a fraction of a second to put your RFID key in the proximity of the reader to open the
lock.
Size
The size of the card is almost identical to that of a regular bank or ID card, making it easy to store.
As we generally carry these cards with us most of the time, it makes it less likely that the card will
be forgotten when going to work, or anywhere else where card access is required.
Diverse
As RFID locks come with a range of different cams and spindle lengths, they can be fitted to a
wide range of doors and furniture. This makes them suitable for use in many different businesses
and applications.
Master Card Functionality
A single RFID keycard may be programmed to work with many locks, each potentially having
their own access policies, etc. This saves someone from having to carry 8 keys to have access to 8
locks, while still allowing each of those 8 locks to have independent access policies.

33
Advantages of RFID:
The biggest advantage of RFID is the visibility it provides to the operation, with reliable, accurate
tracking of materials that move in and out of the warehouse. Here are the top reasons why
customers choose RFID:
Automate Inventory Control: Real-time data is captured automatically – and accurately. It’s been
reported that RFID technology can improve inventory accuracy to nearly 95 percent.
Eliminate Errors: It’s virtually impossible to make a mistake since the reader does all the work, all
the human has to do is pass Delivery Truck at RFID portal through with tagged goods and the
reader will track material location.
Reduce Labor Costs: The time spent searching for inventory is over when you implement an RFID
solution into your warehouse. This also means cycle counts are fewer and are conducted faster
with greater accuracy.
Control Theft: RFID adds a whole new level of visibility to the supply chain by being able to
accurately identify when goods leave one location and enter the next (i.e., a receiving dock,
employee parking lot, etc.)
Honeywell RFID Smart labels offer a broad selection of products suitable for a wide range of
applications. Thermal transfer or direct thermal printing and chip encoding enable on-demand
generation of durable RFID labels and tags.

Disadvantages

Lost Keycard
Just like traditional lock and keys, you can also forget or misplace your keycard giving you the
double headache of trying to figure out how to open your locker and tracing back your step to find
the keycard.

Hacker Alert
An RFID system can be hacked or bypassed by someone who is tech-savvy, so they are not totally
foolproof.

Power Shortage Issue


One major problem is that electric RFID systems may malfunction during power outages causing
some lockers to either shut you out or worse leave the lockers open where people may try to steal
what is inside.

34
More Involved and More Expensive to Setup
Requires locks being wired to a secured “server”. This computer is where access is programmed,
controlled, and logged.
Not to Totally Hassle-Free
If the server computer is not connected to the internet, and you have time-based access restrictions,
you will need to manually change the computer’s clock twice a year when the time changes.
Lost Keycard
Just like traditional lock and keys, you can also forget or misplace your keycard giving you the
double headache of trying to figure out how to open your locker and tracing back your step to find
the keycard.
Hacker Alert
An RFID system can be hacked or bypassed by someone who is tech-savvy, so they are not totally
foolproof.
Power Shortage Issue
One major problem is that electric RFID systems may malfunction during power outages causing
some lockers to either shut you out or worse leave the lockers open where people may try to steal
what is inside.
More Involved and More Expensive to Setup
Requires locks being wired to a secured “server”. This computer is where access is programmed,
controlled, and logged.
Not to Totally Hassle-Free
If the server computer is not connected to the internet, and you have time-based access restrictions,
you will need to manually change the computer’s clock twice a year when the time changes.

5.3 Result & Discussion


Performance Test

For measuring the performance test of the system, the methodology system was continued five
times and the observation output result was shown in Table 2 as performance test data and result.
Observations . RFID Unit Fingerprint Unit Door Open Door Close
no.
01 Success Success Success Success
02 Success Success Success Success
03 Failure Success Failure Failure
04 Success Failure Failure Failure

35
05 Success Success Success Success

Chapter 6
Conclusion & future scope

https://www.adafruit.com/product/398

CODE:
#include <Adafruit_Fingerprint.h>

#define RELAY A2 //relay pin (#A2)


#define LED_G A1 // led green pin (#A1)

// Pin cofigurTION FOR THE FINGERPRINT SENSOR


// pin #2 is IN from sensor (GREEN wire)
// pin #3 is OUT from arduino (WHITE wire)
// pin 5v is for RST ( RED wire)
// pin GRD is for GND ( BLACK wire)
SoftwareSerial mySerial(2, 3);// Tx, Rx

36
Adafruit_Fingerprint finger = Adafruit_Fingerprint(&mySerial);

void setup()
{

digitalWrite(RELAY, HIGH);
digitalWrite(LED_G, LOW);
pinMode(A2, OUTPUT);
pinMode(A1, OUTPUT);
Serial.begin(9600);
while (!Serial);
delay(50);
// set the data rate for the sensor serial port
finger.begin(57600);

if (finger.verifyPassword()) {
Serial.println("Found fingerprint sensor");
} else {
Serial.println("Did not find fingerprint sensor");
while (1) { delay(1); }
}

finger.getTemplateCount();
Serial.print("Sensor contains ");
Serial.print(finger.templateCount); Serial.println(" template(s)");
Serial.println("Waiting for valid finger...");
}

void loop() // run over and over again


{
getFingerprintIDez();
delay(50); //( TIPS YOU DONT NEED TO RUN AT FULL SPEED)
SYSTEM MAY MALFUNCTION
}

int getFingerprintIDez() {
uint8_t p = finger.getImage();
if (p != FINGERPRINT_OK) return -1;

p = finger.image2Tz();
if (p != FINGERPRINT_OK) return -1;

p = finger.fingerFastSearch();
if (p != FINGERPRINT_OK) return -1;

// found a match!
Serial.print("Found ID #"); Serial.print(finger.fingerID);
Serial.print(" with confidence of ");
Serial.println(finger.confidence);
digitalWrite(RELAY, LOW);
delay(1000); // IF YOU WANT TO CHANCE THE
DELAY ( TIPS YOU DONT NEED TO RUN AT FULL SPEED)

37
digitalWrite(RELAY, HIGH);
Serial.println("Unlocked");
return finger.fingerID;
}
void readprint() // run over and over again
{
getFingerprintIDez();
delay(50); //( TIPS YOU DONT NEED TO RUN AT FULL SPEED)
SYSTEM MAY MALFUNCTION
}

int getFingerprintID()
{
uint8_t p = finger.getImage();
if (p != FINGERPRINT_OK) return -1;

p = finger.image2Tz();
if (p != FINGERPRINT_OK) return -1;

p = finger.fingerFastSearch();
if (p != FINGERPRINT_OK) return -1;

// found a match!
Serial.print("Found ID #"); Serial.print(finger.fingerID);
Serial.print(" with confidence of ");
Serial.println(finger.confidence);
digitalWrite(RELAY, LOW);
digitalWrite(LED_G, HIGH);
delay(500); // IF YOU WANT TO CHANCE THE
DELAY ( TIPS YOU DONT NEED TO RUN AT FULL SPEED)
digitalWrite(RELAY, HIGH);
digitalWrite(LED_G, LOW);
Serial.println("Unlocked");
return finger.fingerID;
}

RFID
#include<MFRC522.h>

#include<LiquidCrystal.h>

#include<SPI.h>

#include<Servo.h>

38
#define rs 2

#define en 3

#define d4 4

#define d5 5

#define d6 6

#define d7 7

MFRC522 mfrc522(10,9);

LiquidCrystal lcd(rs,en,d4,d5,d6,d7);

Servo myservo;

void setup()

Serial.begin(9600);

SPI.begin();

lcd.begin(16,2);

myservo.attach(8);

myservo.write(170);

lcd.print("#ACCESS CONTROL#");

lcd.setCursor(0,1);

lcd.print(" Scan Tag");

mfrc522.PCD_Init();

Serial.println("Scan Tag");

void loop()

if(!mfrc522.PICC_IsNewCardPresent())

return;

if(!mfrc522.PICC_ReadCardSerial())

39
{

return;

String uid="";

Serial.println();

Serial.print("UID=");

for(int i=0;i<mfrc522.uid.size;i++)

Serial.print(mfrc522.uid.uidByte[i]<0x10 ? "0" : "");

Serial.print(mfrc522.uid.uidByte[i],HEX);

uid.concat(String(mfrc522.uid.uidByte[i]<0x10 ? "0" : ""));

uid.concat(String(mfrc522.uid.uidByte[i],HEX));

uid.toUpperCase();

if(uid=="9BCB0C99")

Serial.print(":Dwij Patel");

lcd.clear();

lcd.print(" ACCESS GRANTED");

lcd.setCursor(0,1);

lcd.print(" Dwij Patel");

myservo.write(10);

else if(uid=="D0693C1B")

Serial.print(":Paarth");

lcd.clear();

lcd.print(" ACCESS DENIED");

lcd.setCursor(0,1);

lcd.print(" Paarth");

myservo.write(170);

40
else if(uid=="6B42EB66")

Serial.print(":Maneen");

lcd.clear();

lcd.print(" ACCESS DENIED");

lcd.setCursor(0,1);

lcd.print(" Maneen");

myservo.write(170);

else if(uid=="15AE1CC3")

Serial.print(":Smit");

lcd.clear();

lcd.print(" ACCESS GRANTED");

lcd.setCursor(0,1);

lcd.print(" Smit");

myservo.write(10);

else

Serial.print("ACCESS DENIED");

lcd.clear();

lcd.print(" ACCESS DENIED");

myservo.write(170);

delay(5000);

myservo.write(170);

lcd.clear();

lcd.print(" Scan Tag");

return;

41
SIMULATION:

42

You might also like