report-Microcontroller

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 32

Department of Electronics and Communication

Engineering
MICROCONTROLLERS
ELEC 20007
SPRING 2018

MINI PROJECT REPORT


ON
PASSWORD BASED SECURITY DOOR LOCK

Session A

Instructor: Mr. Satish Masthenally

Group members ID
Aiman Fatima 15f14432

Doha El Yatmi 15f14905

Sumaya Alsatmi 14S11660

Mai Al-hinai 14S11724


Contents
1. Introduction.........................................................................................................................................4
1.1 Background of the study:.............................................................................................................4
1.2 Objectives..........................................................................................................................................4
1.3 Limitations.........................................................................................................................................5
1.4 Overview of the report:......................................................................................................................5
2. Literature review.................................................................................................................................6
3. Budgeting and project management...................................................................................................10
3.1 Budget.............................................................................................................................................10
3.2 Schedule....................................................................................................................................10
3.3 Risk management............................................................................................................................11
4. Design and analysis...........................................................................................................................12
4.1 System initial design........................................................................................................................12
4.2 Technical requirements....................................................................................................................13
4.2.1 Hardware components..............................................................................................................13
4.2.2 Software requirements..............................................................................................................13
4.3 Flowchart.........................................................................................................................................14
4.4 Schematic diagram..........................................................................................................................15
4.5 Hardware components and their description....................................................................................15
4.6 Brief details of the microcontroller..................................................................................................17
4.7 Program code...................................................................................................................................18
4.7 Screen shots of software simulation.................................................................................................26
5. Sustainability.....................................................................................................................................30
6. Conclusion.........................................................................................................................................31
7. REFERENCES..................................................................................................................................31
List of Tables

Table 1: Price List.......................................................................................................................................9


Table 2: Schedule......................................................................................................................................10

List of Figures

Figure 1: System Block Diagram...............................................................................................................11


Figure 2: Flowchart...................................................................................................................................14
Figure 3: Schematic diagram.....................................................................................................................15
Figure 5: Simulation when entering the 5 digit password “12388”............................................................26
Figure 6: LCD displays message ‘Correct’................................................................................................27
Figure 7: The displays door opening message when right password is entered.........................................27
Figure 8: Simulation when a wrong password is entered...........................................................................28
Figure 9: LCD displays INCORRECT message when wrong password is given......................................28
Figure 10: Compilation successful in the MikroC.....................................................................................29
1. Introduction
1.1 Background of the study:
Nowadays, security has become something very necessary and important in our lives. People has
started to feel uncomfortable and insecure to use keys or even padlocks as a door or gate lock
anymore where, this kind of locks are easily broken and has many flaws that enables an
unwanted person to unlock the door lock and break in easily. Therefore, to increase the security
level and to provide a better security system, a door password mechanism is created and evolved.

A password-based security door lock using PIC16f877A is designed and programmed using
MikroC language and simulated by using the software Proteus 8. The main purpose of designing
this system is to enhance and develop the security system of the user where, the system will be
locking the door in case wrong password is entered. The system designed will be based on the
microcontroller PIC16f877A, a 4x3 keypad which is used for entering or keying in the password,
16x2 LCD display to show the numbers or the password that the user entered and also it will
show desired short messages on the screen which will be mentioned in the codes. This system is
designed and programmed in order to have a 5-digit password code system. The designed
security door lock circuit works by initializing each of LCD display, keypad, and the output to
different ports in the pic16f877a microcontroller and the circuit will start its operation when the
password is entered into the keypad so, the microcontroller pic16f877a will be reading the values
entered and saving them in array to convert it to be displayed on LCD then, both the password
entered and the one programmed will be compared to each other so, either the password will be
correct or incorrect. If the password entered by user is correct, the door is going to open while, in
case the password entered was incorrect, several attempts will be given and if all attempts were
entered wrong then the user will be blocked from entering any password and the door will
remain locked.

1.2 Objectives
From this project, the objectives which are assumed to be achieved are to simulate and build a
password based security door lock using PIC16f877A circuit, and to design and program a
circuit by using 5-digit password code by using the MikroC language.
1.3 Limitations
 In case the main builder of the circuit happens to forget the password code, there will be
no possibility to open the door, until and unless goes back to the main setting , and
making changes in the program codes.
 The circuit can’t be operated remotely since it is a low range circuit.

1.4 Overview of the report:


This project is about a security door lock circuit which was designed and programmed by using
mikroC language. This report will be introducing the concept and the working operation of the
system designed through 5 different chapters.

The first chapter, basically is introducing the project and giving an overview about the circuit
designed, also it is discussing the objectives and limitation of the circuit.

In the second chapter, a literature review is conducted based on the topic, password-based
security door lock circuit, while the budget and project management were discussed in third
chapter.

In chapter 4, the design of the security door lock circuit is discussed where, the chapter included
the program codes of the circuit designed, screenshot of software simulation, and the system
initial design. Also, this chapter is introducing the hardware components and their description, a
brief detail of the microcontroller used and finally,

Chapter 5 talks about the sustainability nature of the project. And In last chapter, the report was
summarized to give a whole idea of the project done and the results were found from the system
designed and programmed.
2. Literature review
Article 1

The article titled about "Password Protected Lock System Designed using Microcontroller"
written by Aarfin Ashraf, Deepak Rasaily and Anita Dahal implements a project for the purpose
of providing security in certain places such as ATMs, houses, offices, government and private
institutions and others, and taking advantage of the science of technology, especially electronic
technology, and building an integrated home security at reasonable cost and specialized in the
whole system (Ashraf, Dahal and Rasaily, 2016). By designing this system the user must register
and type the password they want. The information will then be stored and the password will be
recorded in the database and the control function will function when you receive the correct
password by giving the engine instructions and the door will be opened because the controller
information is sent to the DC motor. After some time again the door will closed and when
someone else comes in and writes the wrong password the door will remain closed. The user can
change the password at any time. So this password system is called a lock system designed and
protected using a microcontroller so this project is designed to open the door latch when using
the password that was typed and when it is typed several times incorrect are converted on the
Buzzer.
So 8051 is the primary component in this circuit. Also to enter the password in this project use
4*3 keypad then it will compare the specified password with the password that was entered and
when the wrong pass code will be displayed on the LCD the door will remain closed. If the
passcode is correct the door will open alternately with the motor door and it will be displayed on
the LCD and have a door condition in it. We used the keypad to enter the password. One of the
advantages of these systems is the use of the password, which is smart, and very efficient, and it
is simple. At the end of this article it was said that it could be used and innovated many of the
appropriate circuits with keyboards to implement and operate many security systems and to
protect the country, houses and others, and that these systems have the ability of high efficiency
and easy access to security. Also we will write recorded traffic codes compared with the entered
traffic codes.
Article 2

In the article “Design And Construction Of Door Locking Security System Using Gsm” it is
discussed that this project provides security for the first door by remote control through the use
of a set of GSM phones and also have been tuned to other GSM phones and transmitters and has
been connected with multi-tone DTMF through its connection to the engine door with decoding
(Ogri, Etim and Bassey, 2013). A unit of DTMF in conjunction with the stepper motor and the
control unit. This design consists of four basic operation units: the switching unit, the controller,
the decoder and the GSM module. The GSM module acts as a receiver and transmitter and is
between the users as the communication devices at the end of the door at the other end of the
receiver through the use of units used mobile phone groups. The decoders are controlled by the
use of circuit chips in the console that are modern and integrated. Security benefits protect
property and life, and chains and key locks enhance security. The security sector in our time is
also suffering from diversification, and because of this, it has brought about the need for it and
the establishment of more secure, intelligent and reliable systems.
In the above project, 8051 central control units are used for processing as a unit. Digital lock is a
small device that controls and is a control system which is only allowed to people who told them
to access it. This system is considered to be one of the best systems for homeland security, ATM
and corporate offices. It consists of a small electronic unit installed at the door entrance to
control the lock. The icon is predefined by mobile communication from the keyboard of the
universal system. After that the door can be opened for a limited time by running the coil lock.
When the code is entered or the code is entered incorrectly three times the lock will switch to ban
mode and when the user forgets the code he or she can access the lock code by typing the
password that contains 8 responsible number.

Article 3

In the article “Microprocessor Controlled Digital Lock” the security and efficient control system
is designed at a simple cost price used to achieve security and digital status (NGURE, 2009). The
user enters the secret rum by pressing the keyboard at a specified time and this system overrides
or accepts it if the secret code is entered correctly and if it is mistakenly entered, the user refuses
to secure the system to the home or the banks.
It is about the entry of data or information by pic16f690 this system is designed to be
investigated and secure digital and has been used in the micro-system control module software.
This is in the way of pressing a keyboard at a specific time. The people who are allowed to enter
are those who have the knowledge of the secret by code and in case someone who is authorized
to enter cannot know the secret code if the secret code is entered, another of three attempts, there
is the alarm bell. This bell alerts the people involved as someone who performs the entry. In this
research the user the ability to interface the keyboard to output (LCD). And can be defined by
(LCD) or clarify the information users and the time and date and documented data. This project
through surveillance staff in times of swirls. Through the introduction of both the user ID and
password, this system knowledge and access or send data to the control system and its analysis.

Article 4

Technology develops year after year and with the development of technology makes our lives
easy and easier, the door insurance system has been put in place for non-entry to unwanted or
unauthorized entry, by control of the Controller, will put on the door a keyboard to press the
secret code of the authorized persons For them to enter, this device is a place of importance and
it is very safe and it is difficult to gain access to others who are wanted, this project has been
completed to achieve security in homes or places to insure people's property (Nasiruzzaman,
2018). Just by inserting or pressing the secret code to unlock the doors, this work can diversify
into combinations with letters or numbers. Many combinations can also be placed in the word
secret code. This control makes it more secure and more efficient.
This system is based on Arduino designed to control carefully the anonymity of the doors based
on the entry of the secret code that a person can enter or exit without any help from a second
person.

The keyboard side of the gate is placed by entering the secret code based on the opening of the
gate, as the technology develops the world evolves and thus there is inventions, this design is a
way to innovate, think and make life safe in the future, secures homes and banks etc.

Effective development in the innovative Control Panel may be specifically designed to achieve
the password, which is less expensive and less powerful to work with this easy project, and it is
small in size, carrying approximately the keyboard 4x4 buttons. This project uses a 5-volt
battery, and this work is also applied to anything whether the room doors or funds the banks or
the fan are password protected.

Analysis of the review

From the literature article 1, the idea of interfacing the input and output devices is grasped. The
circuit description provided was helpful. In article 2, the security system involves GSM and the
DTMF, with their proposed flowchart, it given an idea of how the system should work
accordingly especially assigning the no. of attempts when a wrong password is given. Article 3
provided a detailed explanation of each of their circuit component used which gives an
understanding of what components could be used in a password based security circuit. The last
article used 4x4 keypad in their project which consisted of letters too in their password, but to go
for a simple circuit, only the digits 4x3 keypad was chosen to implement.
3. Budgeting and project management
3.1 Budget
The following are the price of the components that are require for the project.

Item/component Quantity Price (OMR)


16x2 LCD display 1 4.000
PIC16f877A 1 5.000
4x3 keypad 1 1.500
L293D IC 1 0.400
BUZZER 1 0.300
BC 847 transistor 1 0.050
22pf capacitors 2 0.100
20Mhz oscillator 1 0.800
Total : 12.150 OMR
Table 1: Price List

Therefore, all the components total costs OMR 12.150, making the project an affordable one to
build.

3.2 Schedule
The following schedule was followed during the completion of the project.

SR.NO. Task name Duration Accomplished in


academic week
1 Formation of group 5 days Week 5
Selection of project title and 7 days Week 6
studying areas for the project
scope
2 Getting approval from 1 day Week 6
supervisor
3 Submission of project proposal 3 days Week 7
4 Studying different literatures on 5 days Week 8
related topics
5 Understanding working 6 days Week 9
operation
6 Drawing the circuit in Proteus 1 day Week 9
7 Understanding the codes and 14 days Week 10 - Week 11
testing of the simulation
8 Completing report work 7 days Week 12
9 Presentation 1 day Week 14
Table 2: Schedule

3.3 Risk management


This part includes the different risks that were overcome during the completion of the project.

 Firstly, though the selection of the topic was done at ease but when it came to writing the
program codes in c language, it was taking a lot of time than expected. And realized that
the team was lagging behind. It was seen that to convenience, more of codes related to
the topic were available online in mikroC language,thus it was decided to use mikroC as
the compiler.
 MikroC software had to be used for the simulation and none of the team group members
had enough knowledge about it. So, help was taken from fellow mates in order to get it
installed.
 Learning mikroC language was another task because it was totally a new programming
language and had known the only the basics of c programming. Thus, mikroC language
was learnt step by step using different sources available online.
 Also, a lot of errors were faced after writing the codes, and didn’t knew how to add
libraries to the respective program, but with a little research on using mikroc , the issue
was solved.
4. Design and analysis
4.1 System initial design

Figure 1: System Block Diagram

The password based security lock systems consists of PIC 16f877A micro controller, a keypad,
LCD , motor driver , stepper motor and the buzzer. This system provides an access to a restricted
place or area where only authorized people can enter by entering the password into this control
system.

Firstly, the LCD screen displays a heading asking to enter a password, so in order to enter the
password, a keypad is used to enter the digits. In the memory, the entered digits are matched with
stored ones and thus, a message called CORRECT is displayed on the LCD screen, and the
motor drivers the stepper motor in clockwise and anticlockwise, which basically opens and
closes the door.

If in case, the message displayed is “INCORRECT, the buzzer beeps and the no. of attempts
given decrements by one. When the number of attempts reaches to zero in the system then it
blocks the person to enter the password.
4.2 Technical requirements
4.2.1 Hardware components
1. PIC 16f877A IC
2. 16x2 LCD
3. BC 847 transistor
4. Motor driver L293D
5. Stepper motor
6. 20 MHz oscillator
7. 4x3 keypad

4.2.2 Software requirements


a) Proteus 8

For carrying out the simulation procedure, Proteus 8 was used. It is one of the best tools in order
to design and simulate circuits involving a variety of components available. Proteus is basically
used because of its availability of all the microcontrollers in it. It provides error places to debug
too, this software is also used for designing Arduinos and PCB layouts. Thus, a great tool for
testing circuits and programs virtually for electronic engineers and emerging specialists in this
field.

Versions of 8.1/10 for Windows XP/ Vista is needed In order to install the above software,
occupies space of 200 MB and for running needs about 256MB RAM minimum.

a) MikroC PRO for PIC

MikroC PRO for PIC is another software that was used to test and compile the codes. This
software is a full-featured ANSI C compiler which is used to compile and test PIC devices from
microchip. MikroC pro for pic is providing the user with lots of hardware and software libraries
(around 1000 libraries are available) so, by only selecting the libraries needed for the codes
programmed, they will be instantly included in the users codes. Also, this software is providing
lots of additional tools and a comprehensive help file to help user programming. The version was
used is 7.2.0.
4.3 Flowchart

Figure 2: Flowchart
4.4 Schematic diagram

Figure 3: Schematic diagram

4.5 Hardware components and their description


NPN transistor- It is basically a current controlling circuit consisting of the base, collector and
emitter terminals. This form of transistor is made up of N type matter sandwiched in the middle
of the P type layer. it is also called as negative – positive – negative transistor. It gives current on
it base terminal thus acting as a current source. In the project 847 npn transistor is used.

Stepper motor - A stepper motor consists of group of coils in a way called phases and these
motors move in discrete steps. When each phase is energized in an order, then at one step at a
time the motor rotates. They are used in speed controlling, precise positioning etc. these motors
come in a variety of styles and sizes. This motor is used as in to open and close the door in the
project. It will be rotating clockwise and anticlockwise respectively.

Motor driver L293D- This IC is used for driving the motors on either directions. It basically
works on the concept of H – bridge. In a H – bridge circuit, the voltage is allowed to flow in
either of the directions.in order for the motor turn clockwise and anticlockwise, the voltage needs
to change the direction. This L293D has 16 pins and it consists of 2 H Bridge circuits’ helps the
external motor to rotate. So this IC is basically use to drive the stepper motor.

Liquid Crystal Display (LCD): is an optical device that gets a matrix of crystals on thin surfaces
that are divided into many pixel and have aback light.in this project we will used a numerical
alphabet in the liquid screen for 16*2 crystal and can side by side display the alphabets in
addition to the numbers and the screen consists of 2 lines which is able to hold up to 16
characters. One LCD is used in the project to display the digits entered for the password, and to
show different messages according to the requirement.

4x3 keypad- Keypads are generally used as input devices in many applications. The 4*3 keypad
contains 12 button and is arranged and has 7 pins. The keys are connected to matrix in the form
of 4x3 where it contain 4 rows and 3 columns. This keypad is being used to enter digits, and so
that the micron roller reads it and sends respective signals to get the require output.

Crystal oscillator – it is basically an electronic circuit where it utilizes the mechanical resonance
of a crystal vibrator made up of material of piezoelectric in order to produce electric signal
having frequency in precision. This oscillator is connected to give the needed frequency input in
order to perform the functions to the system.
4.6 Brief details of the microcontroller

Figure 4: IC diagram (Microchip, 2018)

This PIC microcontroller is widely used in so many applications nowadays. The programming
and coding for this micro controller is very convenient and easy. In this it is possible to write and
erase as much many time needed, becoming one of the greatest advantage of using this
microcontroller because it has the technology of FLASH memory.

This is an 8 bit micro controller, based on CMOS FLASH technology. It consists of 40 pins in
total. It involves a number of applications like in industrial, automatic devices, home automation,
safety and security devices etc. this micro controller can be purchased at an affordable rate and is
easy to handle.

Features are as follows

 Self programmable
 33 pins are for the output and input
 There are 5 I/O ports
 Instructions – 35 single word
 Consists EEPROM data memory of 256bytes
 368 RAM bytes
 Provides range of external oscillator upto 20Mhz
 Has 2 comparators
 Its operating voltage is from 2V till 5.5V
 Consists of FLASH type program memory
 14KB program memory

About pins

- Pin1 – MCLR- This is a active low rest pin which rests the whole IC. Since it is active
low, 5v is provided throughout. In the circuit this pin is assigned to VDD.
- Pin 2 to Pin 10 - These pins are for PORTA. They are bidirectional in nature that is
output as well as input. Some of them can also be used as analog pins. Since this port
isn’t required for its purpose, it is not been used.
- Pin 11 and pin 32 - They are the VDD. They are connected to the positive supply 5v.
- Pin 12 and Pin 31- They are the VSS, for grounding purpose. These pins are grounded.
- Pin 13 and pin 14 - They are the input and output pins for the external oscillator. A
crystal oscillator is been connected with the help of these pins to the controller.
- Pin 15 to pin 18 and pin23, 24,25 - These pins come under PORTC. Out of it, 3 of the
pins are used. The first pins are for the input pins required to drive the motor driver IC.
The third pin of the PORTC is used for driving the transistor.
- Pin 19, 20,21,22,27,28,29,30 - These pins come under PORTD. And they are ben used
for the interfacing of the keypad to the controller.
- Pin 33 till pin 40- All those pins come under PORTB. They are used for interfacing the
LCD to the micro controller.

4.7 Program code

//LCD Connection

sbit lcd_rs at RB2_bit;

sbit lcd_en at RB3_bit;

sbit lcd_d7 at RB7_bit;


sbit lcd_d6 at RB6_bit;

sbit lcd_d5 at rb5_bit;

sbit lcd_d4 at rb4_bit;

//LCD Pin Direction

sbit lcd_rs_direction at trisb2_bit;

sbit lcd_en_direction at trisb3_bit;

sbit lcd_d7_direction at trisb7_bit;

sbit lcd_d6_direction at trisb6_bit;

sbit lcd_d5_direction at trisb5_bit;

sbit lcd_d4_direction at trisb4_bit;

//Keypad Port

char keypadport at portD;

// Declaring Variables

unsigned short kp,digit=0, attempt=3, isopened=0;

short saved_pass[5]={1,2,3,8,8};

short user_pass[5]={' ',' ',' ',' ',' '};

int i;

void check_password();

void door_open();

void door_close();

void halt_block();
void buzzer_beep();

void buzzer_warning();

void main() {

lcd_init();

keypad_init();

lcd_out(1,1,"WELCOME");

delay_ms(3000);

lcd_cmd(_lcd_clear);

lcd_out(1,1,"PASSWORD:");

TRISC = 0; // PORT C as output port

PORTC = 0; // Set RC0 to high

do {

kp = 0; // Reset key code variable

// Wait for key to be pressed and released

do

kp = Keypad_Key_Click(); // Store key code in kp variable

while (!kp);

// Prepare value for output, transform key to it's ASCII value

switch (kp) {

case 1: kp = 49; break; // 1

case 2: kp = 50; break; // 2


case 3: kp = 51; break; // 3

case 4: break;

case 5: kp = 52; break; // 4

case 6: kp = 53; break; // 5

case 7: kp = 54; break; // 6

case 8: break;

case 9: kp = 55; break; // 7

case 10: kp = 56; break; // 8

case 11: kp = 57; break; // 9

case 12: break;

case 13: kp = 42; break; // C

case 14: kp = 48; break; // 0

case 15: kp = 35; break; // OK

case 16: break;

if(kp!=42 & kp!=35 & digit<=4){ //enter numeric value

user_pass[digit]=kp-48;

lcd_chr_cp(kp);

digit++;

}else if(kp==35){ // Ok button pressed (# button on hardware)

check_password();

if(kp==42){ // * button to reset the blocked password

digit=0;

attempt=3;

lcd_cmd(_lcd_clear);
lcd_out(1,1,"PASSWORD:");

if(kp==49 & isopened==1){ // to close the door

door_close();

if(kp!=0){

buzzer_beep();

}while(1);

void check_password(){

if(saved_pass[0]==user_pass[0]&

saved_pass[1]==user_pass[1]&

saved_pass[2]==user_pass[2]&

saved_pass[3]==user_pass[3]&

saved_pass[4]==user_pass[4]){

attempt=3;

delay_ms(2000);

door_open();

} else{

halt_block();

}
}

void halt_block(){

if(attempt>0){

attempt--;

lcd_cmd(_lcd_clear);

lcd_out(1,1,"INCORRECT");

buzzer_warning();

delay_ms(3000);

lcd_out(2,1,"ATTEMPT LEFT: ");

lcd_chr_cp(attempt+48);

delay_ms(3000);

digit=0;

lcd_cmd(_lcd_clear);

lcd_out(1,1,"PASSWORD:");

}else{

lcd_cmd(_lcd_clear);

lcd_out(1,1,"BLOCKED");

digit=4;

void door_open(){

user_pass[2]=' ';

lcd_cmd(_lcd_clear);

lcd_out(2,5,"CORRECT");

delay_ms(4000);
lcd_cmd(_lcd_clear);

lcd_out(1,8,"DOOR");

lcd_out(2,6,"OPENING");

//To turn motor clockwise

PORTC.F0 = 1;

Delay_ms(2000);

//To Stop motor

PORTC.f0 = 0;

lcd_cmd(_lcd_clear);

lcd_out(1,7,"DOOR");

lcd_out(2,6,"OPENED");

isopened=1;

delay_ms(1500);

lcd_cmd(_lcd_clear);

lcd_out(1,1,"TO CLOSE THE");

lcd_out(2,1,"DOOR PRESS: 1");

void door_close(){

isopened=0;

lcd_cmd(_lcd_clear);

lcd_out(1,8,"DOOR");
lcd_out(2,6,"CLOSING");

//To turn motor anticlockwise

PORTC.F1 = 1;

Delay_ms(2000);//2 seconds delay

//To Stop motor

PORTC.f1 = 0;

lcd_cmd(_lcd_clear);

lcd_out(1,7,"DOOR");

lcd_out(2,6,"CLOSED");

delay_ms(3000);

void buzzer_beep(){

PORTC.F2 = 1;

Delay_ms(100);

//To Stop buzzer

PORTC.f2 = 0;

void buzzer_warning(){

PORTC.F2 = 1;

Delay_ms(200);

PORTC.f2 = 0;

delay_ms(50);

PORTC.F2 = 1;

Delay_ms(200);
PORTC.F2 = 1;

Delay_ms(800);

PORTC.f2 = 0;

PORTC.f2 = 0;

4.7 Screen shots of software simulation

Figure 5: Simulation when entering the 5 digit password “12388”


Figure 6: LCD displays message ‘Correct’

Figure 7: The displays door opening message when right password is entered
Figure 8: Simulation when a wrong password is entered

Figure 9: LCD displays INCORRECT message when wrong password is given


Figure 10: Compilation successful in the MikroC
5. Sustainability

In order to benefit any society or company in some way, a project is done. The need to build and
implement a project is when there are gaps or some sort of weaknesses in the current system. For
any project to bring either immense or a small improvement and changes in the society it needs
to be sustainable, perhaps successful.

Any kind of project could end up effecting the society positively or negatively in some or the
other way. The main social benefit of this password based security door look project is that this
system can be installed at a restricted place where only authorized people can enter the place
through the entry door. The favorable factors is that for the implementation it is cost friendly,
thus affordable and the operators can use it effectively and efficiently. The proposed project has
the potential to add on more functionalities to provide more advantages. Firstly, this is was only
based on 5 digits. In order to be a strong password, it should consists of digits, characters and
symbols, thus other complex keypads can be interfaced and programmed accordingly. Then it
could be based on finger print sensor locker making it more effective. And this system can even
be taken to a higher level where when an unauthorized person tries to access, it sends a warning
signal to the main control room so that necessary action can be taken.
6. Conclusion
In today’s time there is a need for having password base security systems to protect important
data, papers and information from unknown people at a room, office etc. A basic password based
door lock was successfully made. This system could allow only authorized people to enter the
place require that they remember the saved password. During the completion of this project, it
has inculcated a lot of knowledge within. Many literature articles were reviewed to enhance
understanding. It was learnt to interface LCD, keypad and other components to the PIC
controller. The function and the features of the PIC was learnt. It was learnt to perform
simulation in the proteus and for coding in the mikroC. Thus, the main system was successful by
building and simulating a 5 digit password based security door lock, meeting the objectives of
this project.

7. REFERENCES

Ashraf, A., Dahal, A. and Rasaily, D. (2016). Password Protected Lock System Desgined using
Microcontroller. International Journal of Engineering Trends and Technology (IJETT),
32(4), pp.180-183.

Microchip (2018). Pin Description. [online] Microchip. Available at:


https://www.microchip.com/wwwproducts/en/PIC16F877A [Accessed 31 May 2018].

Nasiruzzaman, M. (2018). Microcontroller Based Efficient Door Lock System. Dhaka: East West
University.

NGURE, M. (2009). MICROPROCESSOR CONTROLLED DIGITAL LOCK. Nairobi:


UNIVERSITY OF NAIROBI.

Ogri, U., Etim, A. and Bassey, D. (2013). DESIGN AND CONSTRUCTION OF DOOR
LOCKING SECURITY SYSTEM USING GSM. International Journal Of Engineering And
Computer Science ISSN:2319-7242, 2(7), pp.2235-2257.

You might also like