Professional Documents
Culture Documents
new2
new2
CERTIFICATE
towards the partial fulfillment of the degree of Bachelor of Engineering in Electronics and
Telecommunication as awarded by the Savitribai Phule Pune University, at Pune Vidyarthi
Griha’s College of Engineering during the academic year 2023-24
Place: Pune
Date:
1
ACKNOWLEDGEMENTS
For successful completion of this project, many people have given their valuable
contribution either directly or indirectly in many ways. I would like to thank all those who are
a part of this project. We would like to thank project guide Prof. R.K Patil, and Prof.
N.Kuchekar under whose guidance we learned and explored about this project. Their
suggestions and directions have helped us complete our project successfully. We would also
like to thank all the teaching and non-teaching staff of our college for helping us in the
completion of our project work. Finally, We would like to thank my parents and friends who
have helped me with their valuable suggestions and guidance and have been very helpful in
various stages of the project completion.
2
TABLE OF CONTENTS
1.2 Aim 8
1.3 Objectives 8
1.4 Motivation 8
2 Literature Survey 10
3
4 Development of Hardware Module 18
5 Testing
5.1 Listing of All Test Parameter 21
6 Conclusions 24
7 Future Scope 25
8 References 26
10 Photographs of Certificates/Achievements
4
ABSTRACT
5
Abbreviations and Acronyms
FP Finger print
ID Identification
GSM Global System for Mobile
PCB Printed Circuit Board
List of Symbols
I Current
V Voltage
A Amperes
Ω Ohms
F Farad
T Duty Cycle
List of Figures
3.1.1 Basic block diagram of original system 12
3.1.2 Pin out diagram of the original system 12
3.4.1 Block diagram of power supply 16
3.5.1 Simulation of power supply 17
4.2.2 Implementation of system on PCB simulation 19
List of Tables
5.1.1 Testing Components 21
5.3.1 Troubleshooting of components 23
9.1.2 Bill of the components used 27
6
CHAPTER 1
INTRODUCTION
The FINGER ID ENTRY SYSTEM is an innovative access control solution leveraging
fingerprint recognition technology for secure and efficient authentication. This system
eliminates the need for traditional access methods such as keys or cards by utilizing each user's
unique fingerprint as their access credential. Through a streamlined enrollment process,
authorized users can register their fingerprints, which are securely stored in the system's
database. Upon authentication, the system grants immediate access to authorized users,
providing real-time control and enhancing security. With features such as event logging and
potential integration with other security systems, the FINGER ID ENTRY SYSTEM offers a
comprehensive solution for access management in various environments.
The FINGER ID ENTRY SYSTEM represents a cutting-edge approach to access
control, offering a seamless and secure method of authentication based on fingerprint
recognition technology. This system is designed to provide robust security for sensitive areas
or devices, eliminating the vulnerabilities associated with traditional access methods. By
enrolling users' fingerprints into its database, the system establishes a reliable means of
identification that is both highly accurate and resistant to forgery.
1.1 Back ground:
The decision to pursue the FINGER ID ENTRY SYSTEM project was driven by a
combination of security concerns, technological advancements, and user experience
considerations. In today's security landscape, traditional access control methods like keycards
or passwords are increasingly vulnerable to theft, loss, or unauthorized duplication.
Recognizing the need for a more robust solution, the project team opted for fingerprint
recognition technology, which offers a higher level of security due to the uniqueness of each
individual's fingerprint. This approach significantly reduces the risk of unauthorized access and
strengthens overall security protocols.
In summary, the selection of the FINGER ID ENTRY SYSTEM project was guided by
a strategic alignment of security needs, technological capabilities, and user experience
considerations in environments where efficiency and speed are paramount, such as workplaces
or high-traffic areas, the quick and efficient authentication process offered by the FINGER ID
ENTRY SYSTEM is particularly valuable.. By leveraging fingerprint recognition technology,
the project aims to enhance security, streamline access control processes, and provide a
seamless user experience in various environments.
7
1.2Aim:
The aim of the Finger ID Entry System project is to develop a
reliable and efficient entry - access control system based on
fingerprint recognition technology.
1.3Objectives:
1. Fingerprint Recognition Accuracy.
2. Granting access.
3. Sending messages about the entry.
4. Testing and Validation.
5. Feedback and Iteration.
1.4 Motivation:
8
1.5 Scope of Project Idea:
System Design and Development: The project aims to design and develop an
access control system based on fingerprint recognition technology. This includes
selecting appropriate hardware components, designing the system architecture,
developing the necessary software for fingerprint enrollment, verification, and
access
Prototype Implementation: The scope involves building a functional prototype
of the FINGER ID ENTRY SYSTEM, integrating hardware components such as
fingerprint sensors, microcontrollers, display modules, and actuators. The
software implementation includes coding algorithms for FP recognition and user
interface.
Testing and Optimization: Once the prototype is developed, extensive testing
is conducted to ensure the system's reliability, accuracy, and security. This
includes testing the performance of fingerprint sensors under various conditions,
verifying the effectiveness of fingerprint recognition algorithms, and evaluating
the system's response to different access scenarios.
9
CHAPTER 2
LITERATURE SURVEY
2.1 Existing issues:
Accuracy and Reliability: One of the primary challenges is ensuring the accuracy and reliability
of the fingerprint recognition system. Factors such as environmental conditions, variations in
fingerprint quality, and sensor performance can impact the system's ability to accurately
identify users. Addressing these issues requires thorough testing, optimization of algorithms,
and potentially integrating additional sensors or technologies to enhance accuracy.
Security Concerns: While fingerprint recognition offers enhanced security compared to
traditional access methods, it is not immune to vulnerabilities. Potential security concerns
include spoofing attacks, where malicious actors attempt to bypass the system using fake
fingerprints or other means.
User Privacy and Consent: Collecting and storing biometric data, such as fingerprints, raises
privacy concerns and legal considerations. Ensuring compliance with data protection
regulations, obtaining user consent for data collection and storage, and implementing secure
data encryption are essential to safeguarding user privacy and maintaining trust in the system.
Integration Challenges: Integrating the FINGER ID ENTRY SYSTEM with existing security
infrastructure or third-party systems may pose challenges due to compatibility issues,
communication protocols, and interoperability requirements
Findings in literature:
● Paper Title: “Fingerprint Biometric System”
This paper presents that Fingerprint biometric systems are smaller in size, easy
to use and has low power. It is available and deployed globally in law
enforcement, such as immigration, banking sectors, forensics, health care and
many more. Biometrics proved to be at an advantages over the conventional
ink method, password and token-based security.
● Paper Title:“ Design of a FP biometric access control system with
GSM functionality”
This paper presents that, The fingerprint biometric access control makes use
of the ESP32,
servomotor, OLED screen, buzzer and a GSM module as the main
components. In this project a GSM module is used to inform or
communicate to the home occupant when unauthorized entry occurs via an
SMS message to a cellular phone.
10
● Paper Title: " Door Security System for Home Monitoring Based on
ESP32”
In this paper, we have proposed a security monitoring system based on IoT
technology. Our proposed system consists of ESP32, PCB Board, Step Down
12V to 5V, Adaptor 12V, Button to reset, PIR Sensor, green LED, red LED,
Magnetic Sensor, Internal Touch Sensor, two MOSFET, Alarm Buzzer, and
Electric Strike door lock. The system we proposed is a system that can monitor
and control the door remotely.
● Paper Title: Comprehensive Study of Biometric Authentication
Systems, Challenges and Future Trends
Biometric technology is widely adopted and accepted everywhere to
authenticate an individual’s identity. Also the adopted technology overcomes
the limitations faced by the traditional authentication process such as
knowledge based issues including password and token for the authentication
of an individual.
This innovation may pave the way for similar systems to be implemented
in various domains such as corporate security, government facilities, or
personal devices, contributing to the evolution of security practices.
Moreover, the project's successful implementation suggests potential cost
savings in the long run by reducing the need for physical keys or regular
password resets, while also streamlining access control processes. It's crucial
to consider potential limitations such as privacy concerns regarding the
collection and storage of biometric data, as well as the system's susceptibility
to spoofing or hacking attempts. Continuous monitoring, updates, and
adherence to privacy regulations will be essential to mitigate these risks and
maintain public trust in the system.
11
CHAPTER 3
1. ESP 32:
• Single or Dual-Core 32-bit LX6 Microprocessor with clock frequency
up to 240 MHz.
• 520 KB of SRAM, 448 KB of ROM and 16 KB of RTC SRAM.
• Supports 802.11 b/g/n
• Wi-Fi connectivity with speeds up to 150 Mbps.
• Support for both Classic Bluetooth v4.2 and BLE specifications.
• 34 Programmable GPIOs.
• Up to 18 channels of 12-bit SAR ADC and 2 channels of 8-bit DAC
• Serial Connectivity include 4 x SPI, 2 x I2C, 2 x I2S, 3 x UART.
• 1 Host controller for SD/SDIO/MMC and 1 Slave controller for
SDIO/SPI.
• Motor PWM and up to 16-channels of LED PWM.
13
3.R307 FP Module:
• Relative humidity: <90% H (no condensation).
• Optical module (C3) overall dimensions (L × W × H): 47.65mm x
20.50mm x 21.20mm
• Capacitive module dimensions: Main control board (L × W × H): 35mm
x 28mm x 7mm
• Sensors (L × W): 33.4mm x 20.4mm
• Scratch-type module dimensions: Main control board (L×W× H):
35mm x 28mm x 7mm.
• Sensor board (L × W × H): 24mm x 20mm x 5mm.
4. OLED Display:
• Monochrome 7-pin SSD1306 0.96” OLED display.
• 128×64 pixel resolution with 160° viewing angle.
• Supply voltage 3V – 5V
• (supports both 5V and 3.31v logic devices).
• Uses SSD1306 for interfacing hence can communicate through SPI or IIC.
• Multiple SPI or IIC devices are supported
• Can be easily interfaced with Arduino (Library available).
14
5. Servo Motor :
• Operating Voltage is +5V typically
• Torque: 2.5kg/cm
• Operating speed is 0.1s/60°
• Gear Type: Plastic
• Rotation : 0°-180°
• Weight of motor : 9gm
• Package includes gear horns and screws.
15
3.4 Power Supply Design and Calculation:
Design
16
3.5 Simulation and Implementation of Power Supply
17
CHAPTER 4
18
Fig 4.2.2 Implementation of System on PCB Simulation
19
4.3 Printed Circuit Board implementation Process:
i) Go to Easy EDA online site and create an account.
ii) Search the required components.
iii) Check footprints and custom properties of each component.
iv) Mount the components on schematic.v) Decide and mention the size of PCB.
vi) Make the connections.
20
CHAPTER 5
TESTING
5..1 Listing of all test Parameter :
2 ESP 32
3 OLED Display
4 Servo Motor
21
5.2 Working Model
22
4)Serial ESP32 has 3 UART The FP module could not be
Communication communication (1,3) UART operated on UART 0, hence we
error 0 (16,17) UART 2 connect it to UART 2 (16,17)
UART 1 cannot be used
5)GSM/ hardware GSM required serial port We sed software serial ports using
(1,3),but no response due to software serial library that makes
hardware serial port any UART i.e. GPIO port for serial
communication. We connect to
GPIO 26 & 27 to GSM.
23
CHAPTER 6
CONCLUSIONS
24
CHAPTER 7
FUTURE SCOPE
Integration with IoT and Smart Home Systems: Integration with Internet of
Things (IoT) platforms and smart home systems could enable seamless
integration with other devices and systems within a premises. For instance, the
system could automatically adjust lighting, temperature, and other environmental
settings upon user authentication.
Mobile App Integration: Developing a companion mobile application would
enable users to manage access permissions, receive real-time notifications, and
remotely monitor the system from their smartphones. This would add an
additional layer of convenience and control for users and administrators
Biometric Data Analysis and Insights: Utilizing data analytics techniques, the
system could provide insights into access patterns, user behavior, and security
incidents. This information could be leveraged to optimize access control
policies, identify anomalies, and proactively mitigate security risks.
Adaptation to Emerging Technologies: Continuous monitoring of technological
advancements, such as advancements in biometric sensors or communication
protocols, would allow the system to evolve and remain at the forefront of
security innovations.
Integration with Blockchain: Leveraging blockchain technology could provide an
immutable and decentralized method for storing access logs and biometric data,
enhancing security and auditability.
Cross-Industry Applications: Beyond traditional security applications, the system
could find utility in various industries such as healthcare (patient records access),
finance (ATM authentication), and transportation (vehicle access control), among
others.
25
CHAPTER 8
REFERENCES
26
CHAPTER 9
● BILL OF MATERIAL :
27