biometric vehicle access system using …...fingerprint recognition locking system can provide...
TRANSCRIPT
BIOMETRIC VEHICLE ACCESS SYSTEMUSING FINGER PRINT RECOGNITION
A PROJECT REPORT
Submitted by
VIMALRAJ G Reg. No.: 12BEC173 THANGARASU P Reg. No.: 12BEC232 YOGESHWARAN P Reg. No.: 12BEC239 RAVIKUMAR R Reg. No.: 12BEC241
in partial fulfillment for the award of the degree
of
BACHELOR OF ENGINEERING
IN
ELECTRONICS AND COMMUNICATION
ENGINEERING
KUMARAGURU COLLEGE OF TECHNOLOGY
COIMBATORE-641049
ANNA UNIVERSITY: CHENNAI 600 025
APRIL 2016
1
ANNA UNIVERSITY: CHENNAI 600 025
BONAFIDE CERTIFICATE
Certified that this project report “BIOMETRIC VEHICLE ACCESS
SYSTEM USING FINGER PRINT RECOGNITION” is the bonafide
work of “VIMALRAJ G [12BEC173], THANGARASU P [12BEC232],
YOGESHWARAN P [12BEC239], RAVIKUMAR R [12BEC241]” who
carried out the project work under my supervision.
SIGNATURE SIGNATURE
Dr. M. Bharathi, M.E., Ph.D,. Dr. Vasuki, M.E., Ph.D,. Assosiate Professor, Head Of The Department,Electronics & Communication Electronics & Communication Engineering, Engineering,
Kumaraguru College of Technology, Kumaraguru College of Technology,Coimbatore 641049. Coimbatore 641049.
The candidates with Register numbers 12BEC173, 12BEC232, 12BEC239and 12BEC241 are examined by us in the project viva-voce examinationheld on ………………………………..
INTERNAL EXAMINER EXTERNAL EXAMINER
ACKNOWLEDGEMENT
2
I express my sincere thanks to the management of Kumaraguru
College of Technology and Joint Correspondent Shri. Shankar Vanavarayar
for the kind support and for providing necessary facilities to carry out the
project work.
I would like to express my sincere thanks to our beloved Principal
Dr.R.S.Kumar, Ph.D., Kumaraguru College of Technology, who encouraged
me in each and every step of the project.
I would like to thank Dr.Vasuki, Ph.D., Head of the Department,
Electronics and Communication Engineering, for her kind support and for
providing necessary facilities to carry out the project work.
I wish to thank with everlasting gratitude to my Project Guide
Dr.M.Bharathi, Ph.D., Associate Professor, Department of Electronics and
Communication Engineering for her expert counseling and guidance to make
this project to a great deal of success.
I am greatly privileged to express my deep sense of gratitude and heartfelt
thanks to the Project Coordinator Mr. Karthikeyan. R, M.E, Assistant
Professor, Department of Electronics and Communication Engineering,
throughout the course of this project work and I wish to convey my deep sense
of gratitude to all teaching and non-teaching staff of ECE Department for their
help and cooperation.
Finally, I thank my parents and my family members for giving me the
moral support and abundant blessings in all of my activities and my dear
friends who helped me to endure my difficult times with their unfailing support
and warm wishes.
ABSTRACT
3
In this current world, the vehicle usage is necessity for everyone. Protecting
the vehicle against theft is also very important. Available locks in the vehicle
do not provide enough security to the vehicle owners. Traditional locks
available in the vehicle are well known to thieves and they can be easily
broken by them. Thus there is a need for more security options to be available
for the vehicle which is unique and must be different from the traditional key
locks.
Biometrics system can be used as a good and effective security option. An
important and very reliable human identification method is fingerprint
identification. As fingerprint of every person is unique thus it can be used in
various security options. The main goal of this project is to protect the vehicle
from any unauthorized access, using fingerprint recognition technique. This
vehicle security system intimates the status of the vehicle to the authoritative
person using GSM. In this project we are focusing on the use of finger print
recognition to access the vehicle against the use of conventional methods of
key locks.
TABLE OF CONTENTS
4
CHAPTER NO TITLE PAGE NO
ABSTRACT
LIST OF TABLE
LIST OF FIGURES
1 INTRODUCTION
2 HARDWARE DESCRIPTION 1
2.1Block diagram
2.2Circuit diagram
2.2.1 Finger print 12
2.2.2 GSM 13
2.2.3 RS 232 13
2.2.4 Liquid Crystal Display 13
2.2.5 Microcontroller 13
2.2.6 DC motor and Relay 13
2.3 BIOMETRIC TECHNOLOGY 14
2.3.1 Introduction 14
2.3.2 Finger print sensor 15
2.4 RELAY DRIVER CIRCUIT 16
2.4.1 Introduction 16
5
2.4.2 DPDT 16
2.4.3 Circuit description 17
2.5 DC MOTOR 21
2.5.1 Introduction 21
2.5.2 Construction and working 21
2.6 GSM 24
2.6.1 Introduction 24
2.6.2 GSM Network Areas 25
2.6.3 GSM Frequency 26
2.7 LIQUID CRYSTAL DISPLAY 28
2.7.1 Introduction 28
2.8 PIC MICROCONTROLLER 31
2.8.1 Introduction 31
2.8.2 Core Features 31
2,8.3 Peripheral Features 33
2.8.4 Pin Configuration 34
2.8.5 Pin Description 35
2.8.6 Memory Organization 39
2.9 MAX 232 COMMUNICATION 49
2.9.1 Introduction 49
6
2.9.2 Scope of the standard 49
2.9.3 Description of max 232 50
2.10 POWER SUPPLY 52
2.10.1 Introduction 52
2.10.2 Working principle 52
3 SOFTWARE TOOLS 19
3.1 KEIL C Compiler 19
3.3 Program
4 RESULT ANALYSIS AND VERIFICATION 54
5 CONCLUSION 56
APPENDIX 1- PIC 16F877A DATA SHEETS
APPENDIX 2- LCD DATA SHEETS
APPENDIX 3- R305 FINGER PRINT DATA SHEETS
APPENDIX 4- MAX 232 DATA SHEETS
APPENDIX 5- 7805 DATA SHEETS
7
LIST OF TABLES
TABLE NO TITLE PAGE NO
T 2. 8.1 Pin Description 35
T 2.8.2 Pin Description 36
T 2.8.3 Interrupts 45
8
LIST OF FIGURES
FIGURE NO TITLE PAGE NO
2.1 BASIC BLOCK DIAGRAM 12
2.2 CIRCUIT DIAGRAM 13
2.4.1 RELAY DRIVER CIRCUIT 18
2.5.1 DC MOTOR 21
2.5.2 WORKING OF DC MOTOR 22
2.6.1 SIMPLE ARCHITECTURE DIAGRAM
GSM NETWORK 25
2.6.2 GSM NETWORK ALONG WITH
ADDED ELEMENT 26
2.8.1 PIN DIAGRAM OF PIC 34
2.9.1 CIRUIT DIAGRAM OF MAX 232 49
2.10.1 BLOCK DIAGRAM OF POWER SUPPLY 52
9
10
CHAPTER 1
INTRODUCTION
Nowadays the vehicle theft has increased due to the low security in the vehicle
it needs to enhance the security level in the vehicles. Traditional and
commonly used key locks available in the vehicle are well known to the
thieves and thus it can be easily unlocked by the professional thieves. With the
help of master key it becomes very easy to unlock the lock of the vehicle by
the thieves. This creates the demand of such type of lock which is new and
provides an additional security level. The new and modern lock must be unique
in itself i.e. it must be only unlocked by special and specific key. This type of
feature is available in the biometrics locks i.e. the lock which can only be
locked and unlocked by the human body features. Biometrics can include: face
recognition, voice recognition, fingerprint recognition, eye (iris) recognition.
Of all these type of special biometric recognition techniques the fingerprint
recognition is the most widely used because fingerprint of every person on the
earth is unique and can provide good reliability. Also the implementation of
the fingerprint recognition system is easy and cheap than the other ones. Thus
fingerprint recognition locking system can provide better reliability than the
traditional locks and also is cheaper and easy than the other biometric locking
system. Thus here we are proposing a model which utilizes the concept of
fingerprint recognition in the motorcycles to enhance the security level of the
vehicle. Some other related work to this model is also reviewed in the next
section.
11
CHAPTER 2
BIOMETRIC VEHICLE ACCESS SYSTEM
Biometric Vehicle Access system prevents the unauthorized person accessing
the vehicle. The block diagram of this system is shown in Fig 2.1. The
components involved in hardware sections are PIC microcontroller, DC motor,
GSM modem and fingerprint module. This chapter gives detailed information
about the hardware components and their applications.
Fig 2.1 BLOCK DIAGRAM OF BIOMETRIC VEHICLE ACCESS
SYSTEM
12
PIC 16F877A
ADC
U
ART
SPI
I2C
GPIO
DAC / PWM
Power
& Reset
UART
GPIO
ROM
RAM
CLOCK
GSM Modem
UAR
T
GSM
Module
Relay
Drive
Relay
Load
Device
Finger Print Reader
UAR
T
Interface
Controller
Sensor
Module
Sensors
2.2 CIRCUIT DIAGRAM
Fig 1.2 BASIC CIRUIT DIAGRAM
2.2.1 FINGER PRINT
Fingerprint authentication refers to the automated method of verifying a match
between two human fingerprints. Fingerprints are one of many forms of
biometrics used to identify individuals and verify their identity.
2.2.2 GSM
GSM is a cellular network, which means that mobile phones connect to it by
searching for cells in the immediate vicinity. GSM is connected through 232IC
2.2.3 RS 232
13
RS-232 is a standard for serial communication transmission of data. Used to
interconnect the GSM module with the microcontroller.
2.2.4 LIQUID CRYSTAL DISPLAY
Liquid crystal display is a flat panel display, electronic visual display, or video
display that uses the light modulating properties of liquid crystals. Liquid
crystals do not emit directly. LCD is connected with the microcontroller.
2.2.5 MICROCONTROLLER
The data is given to the serial port of the PIC microcontroller. Microcontroller
is programmed to find the finger print is matched with previously stored one if
it is same it well send to the signal to the DC motor driver circuit.
2.2.6 DC MOTOR and RELAY
Signal from microcontroller is given to the driven circuit, which gives signal to
the relay to run motor in forward or reverse direction
14
2.3 BIOMETRIC TECHNOLOGY
2.3.1 INTRODUCTION
Biometric s is automated methods of recognizing a person based on a
physiological or behavioral characteristic. Among the features measured are
face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
Biometric technologies are becoming the foundation of an extensive array of
highly secure identification and personal verification solutions. As the level of
security breaches and transaction fraud increases, the need for highly secure
identification and personal verification technologies is becoming apparent.
Biometric based authentication applications include workstation, network, and
domain access, single sign-on, application logon, data protection, remote
access to resources, transaction security and web security. Utilized alone or
integrated with other technologies such as smart cards, encryption keys and
digital signatures, biometrics is set to pervade nearly all aspects of our daily
lives.
Utilizing biometrics for personal authentication is becoming convenient and
considerably more accurate than current methods. This is because biometrics
links the event to a particular individual (a password or token may be used by
someone-9-other than the authorized user), is convenient (nothing to carry or
remember), accurate(it provides for positive authentication) and cost effective.
By unequivocally linking an individual to a transaction or event, biometrics
precisely verify who did what, where, and when. The indisputable evidence of
biometrics means that they add value to time and attendance solutions by
minimizing the opportunity for ID fraud through unauthorized use of lost,
stolen or “borrowed” ID cards, PINs and passwords. Fingerprint analysis is a
15
fast and inexpensive technique of identifying a person. Even twins have
different fingerprints.
2.3.2 FINGER PRINT SENSOR
Fingerprint recognition or fingerprint authentication refers to the automated
method of verifying a match between two human fingerprints. Fingerprints are
one of many forms of biometrics used to identify an individual and verify their
identity. This article touches on two major classes of algorithm (pattern) and
four sensor designs (optical, ultrasonic, passive and active capacitance).
Fingerprint sensor is an electronic device used to capture a digital image of the
fingerprint pattern. The captured image is called a live scan. This live scan is
digitally processed to create a biometric template (a collection of extracted
features) which is stored and used for matching. This is an overview of some
of the more commonly used fingerprint sensor technologies.
Optical fingerprint imaging involves capturing a digital image of the print
using visible light. This type of sensor is, in essence, a specialized camera. The
top layer of the sensor, where the finger is placed, is known as the touch
surface. Beneath this layer is a light-emitting phosphor layer which illuminates
the surface of the finger. The light reflected from the finger passes through the
phosphor layer to an array of solid state pixels (a charge-coupled device)
which
Captures a visual image of the fingerprint. A scratched or dirty touch
surface can cause a bad image of the fingerprint. A disadvantages of this type
of sensor is the fact that the imaging capabilities are affected by the quality of
skin on the finger. For instance, a dirty or marked finger is difficult to image
properly. Also, it is possible for an individual to erode the outer layer of skin
on the fingerprints to the point where the fingerprint is no longer visible. It can
also be easily fooled by an image of a fingerprint if not coupled with a “live
16
finger” Detector. However, unlike capacitive sensors, like sensor technology is
not susceptible to electrostatic discharge damage.
2.4 RELAY DRIVER CIRCUIT
2.4.1 INTRODUCTION
A relay is a switch worked by an electromagnet. It is useful if we want a small
current in one circuit to control another circuit containing a device such as a
lamp or electric motor which requires a large current, or if we wish several
different switch contacts to be operated simultaneously.
When the controlling current flow through the coil, the soft iron core is
magnetized and attracts the L-shaped soft iron armature. These rocks on its
pivot and opens, closes or changes over, the electrical contacts in the circuit
being controlled it closes the contacts. The current needed to operate a relay is
called the pull-in current and the dropout current in the coil when the relay just
stops working. Relay driver circuit is used for on / off control of relay, it acts
as a switch, normally open relay is used. Relay function is derived by
controller unit. Relay working current is 40 ma. When the controller unit
output is low relay should be in off condition. When the controller unit output
is high, relay should be in off condition. When the controller unit output is
high, relay should be ready for doing specified function.
2.4.2 DPDT :
A DPDT(double-pole double throw) relay has two pairs of contacts or
“throws” and two magnetically activated switch contacts or “poles”. A current
applied to the relay coil causes both poles to switch.
17
2.4.3 RELAY CIRCUIT DESCRIPTION:
Fig 4.1 Relay driver circuit
This circuit is designed to control the load. The load may be motor or any other
load. The load is turned ON and OFF through relay. The relay ON and OFF is
controlled by the pair of switching transistors (BC 547). The DPDT relay is
connected in the Q2 transistor collector terminal. A relay is nothing but
electromagnetic switching device which consists of six pins. They are two set
of common, normally close (NC) and normally open (NO) pin. The relay
common pin is connected to supply voltage. The normally open (NO) pin
18
connected to load. When high pulse signal to base of the Q1 transistors, the
transistor is conducting and short the collector and emitter terminal and zero
signal is given to base of the Q2 transistor. So the relay is turned OFF stat
2.5 DC MOTOR
2.5.1 INTRIODUCTION
A DC motor is a mechanically commutated electric motor powered from direct
current (DC). The stator is stationary in space by definition and therefore so is
its current. The current in the rotor is switched by the commutator to also be
stationary in space. This is how the relative angle between the stator and rotor
magnetic flux is maintained near 90 degrees, which generates the maximum
torque.
2.5.2 CONSTRUCTION and WORKING
Parts of DC Motor is shown in this figure
19
Fig 2.5.1 DC Motor
ARMATURE:
A dc motor consists of a rectangular coil made of insulated copper wire wound
on a soft iron core. This coil wound on the soft iron core forms the armature.
The coil is mounted on the axle and Is placed between the cylindrical concave
poles of a magnet.
COMMUTATOR:
A commutator is used to reverse the direction of flow of current. Commutator
is a copper ring split into two parts c1 and c2. The split rings are insulated from
each other and mounted on the axle of the motor. The two ends of the coil are
soldered to these rings. They rotate along with the coil. Commutator rings are
20
connected to a battery. The wires from the battery are not connected to the
rings but to the brushes which are in contact with the rings.
BRUSHES:
Two small strips of carbon, known as brushes press slightly against the two
split rings, and the split rings rotate between the brushes. The carbon brushes
are connected to a DC source.
2.5.2 Working of a DC Motor
Fig 2.5.2 Working of DC Motor
When the coil is powered, a magnetic field is generated around the armature.
The left side of the armature is pushed away from the left magnet and drawn
towards the right, causing rotation.
When the coil turns through 90 degree, the brushes lose contact with the
commutator and the current stops flowing through the coil. However the coil
keeps turning because of its own momentum.
Now when the coil turns through 180 degree, the sides get interchanged. As a
result the commutator ring C, is now in contact with brush B2 and commutator
21
ring C2 is in contact with brush B1. Therefore, the current continues to flow in
the same direction.
The bar magnet represents the armature and the coil of wire represents the
field. The arrow shows the direction of the armature’s rotation. Notice that the
arrow shows the armature starting to rotate in the clockwise direction. The
north pole of the field coil is repelling the north pole of the armature, and the
south pole of the field coil is repelling the south pole of the armature.
2.6 GSM
2.6.1 INTRODUCTION
GSM (Global system for mobile communications) is the most popular standard
for mobile phones in the world. Its promoter, the GSM association, estimates
that 80% of the global mobile marcket uses the standard GSM is used by over
3 billion people across more than 212 contries and teritories its ubiquity makes
international roming very common between mobile phone operators,enabling
subscribers to use their phones in many parts of the world. GSM differs from
its predecessors in that both signaling and speech channels are digital, and thus
is considered a second generation (2G) mobile phone system. This has also
meant than data communication was easy to build into the system. GSM
EDGE is a 3G verson of protocol. A GSM network consits of several
functional entities, whose functions and interfaces are defined. The GSM
network can be devided into following broad parts.
The mobile statiom (MS)
The base station subsystem (BSS)
The network switching subsystem (NSS)
The operation support subsystem (OSS)
22
Fig 2.6.1 GSM architecure
The added components of the GSM architecture include the functions of thedatabases and messaging system:
Home location register (HLR)
Visitor location register (VLR)
Equipment identity register (EIR)
Authentication center (AUC)
SMS serving center (SMS SC)
Gateway MSC (GMSC)
Chargeback center (CBC)
TRanscoder and Adaptaion Unit (TRAU)
23
Fig 2.6.2 GSM element diagram
The MS and the BSS communicate across the um interface, also known as the
air interface or radio link. The BSS communicates with the network service
switching center across the A interface.
2.6.2 GSM NETWORK AREAS
In a GSM network, the following areas are defined:
Cell: cell is the basic service area: one BTS overs one cell.Each cell is
given a cell global identity (CGI), a number that uniquely identify the
cell.
Location Area: A group of cell form a location area. This is the area
that is paged when a subscriber gets an incoming call. Each location
area is asigned a location area identity (LAI). Each location area is
served by one or more BSCs.
MSC/VLR Service Area: The area covered by one MSC is called the
MSC/VLR service area.
24
PLMN: The area covered by one network operator is called PLMN. A
PLMN contain one or more MSCs.
2.6.3 GSM FREQUENCIES
GSM network operate in a number of different frequency ranges (separated
into GSM frequency ranges for 2G and UMTS frequency bands for 3G). Most
2G GSM networks operate in the 900 MHZ or 1800MHZ bands. Some contries
in the americas(including canada and the united states) use the 850MHZ and
1900MHZ bands because the 900 and 1800MHZ frequency bands where
already alocated. Most 3G GSM network in europe operate in the 2100MHZ
frequency band. The rarer 400 and 450MHZ frequency bands or asigned in
some contries where these frequencies where previously used for first
generation systems.
GSM-900 uses 890-915MHZ to send information from the mobile station to
the base station (uplink) and 935-960MHZ for the other direction
(downlink),providing 125RF channels(channel numbers 1-124) spaced at
200KHZ dublex spacing of 45MHZ is used. In some contries the GSM-900
band has been extended to cover a lorge frequency range. This ‘extended
GSM’, E-GSM, uses 880-915MHZ (uplink) and 925-960MHZ
(downlink),adding 50 (channel numbers 975 to 1023 and 0) to the original
GSM-900 band. Time divisaion multiplexing is used to allow eight full-rate or
16 half-rate speech channel per radio frequency channel. Ther are eight radio
time slots (giving eight burst periods)grouped into what is called TDMA
frame. Half-rate channels use alternate frames in the same timeslot. The
channel data rate for all 8 channels is 270.833k bits/sec, and the frame duration
is 4.615 ms. The transmission power in the handset is limited to a maximum of
2 watts in GSM 850/900 and 1 watt in GSM1800/1900.
25
2.7 LIQUID CRYSTAL DISPLAY (LCD)
2.7.1 INTRODUCTION
Liquid crystal displays (LCD’s) have materials, which combine the properties
of both liquids and crystals. Rather than having a melting point, they have a
temperature range within which the molecules are almost as mobile as they
would be in a liquid, but are grouped together in an ordered form similar to a
crystal.
An LCD consists of two glass panels, with the liquid crystal material sand
witched in between them. The inner surface of the glass plates are coated with
transparent electrodes which define the character, symbols or patterns to be
displayed polymeric layers are present in between the electrodes and the liquid
crystal, which makes the liquid crystal molecules to maintain a defined
orientation angle.
One each polarizes are pasted outside the two glass panels. These polarizes
would rotate the light rays passing through them to a definite angle, in a
particular direction. When the LCD is in the off state, light rays are rotated by
the two polarizes and the liquid crystal, such that the light rays come out of the
LCD without any orientation, and hence the LCD appears transparent.
When sufficient voltage is applied to the electrodes, the liquid crystal
molecules would be aligned in a specific direction. The light rays passing
through the LCD would be rotated by the polarizes, which would result in
activating / highlighting the desired characters. The LCD’s are lightweight
with only a few millimeters thickness. Since the LCD’s consume less power,
they are compatible with low power electronic circuits, and can be powered for
long durations.
26
The LCD does not generate light and so light is needed to read the display. By
using backlighting, reading is possible in the dark. The LCD’s have long life
and a wide operating temperature range. Changing the display size or the
layout size is relatively simple which makes the LCD’s more customers
friendly.
The LCDs used exclusively in watches, calculators and measuring instruments
are the simple seven-segment displays, having a limited amount of numeric
data. The recent advances in technology have resulted in better legibility, more
information displaying capability and a wider temperature range. These have
resulted in the LCDs being extensively used in telecommunications and
entertainment electronics. The LCDs have even started replacing the cathode
ray tubes (CRTs) used for the display of text and graphics, and also in small
TV applications.
Crystalonics dot–matrix (alphanumeric) liquid crystal displays are available in
TN, STN types, with or without backlight. The use of C-MOS LCD controller
and driver ICs result in low power consumption. These modules can be
interfaced with a 4-bit or 8-bit microprocessor /Micro controller
The built-in controller IC has the following features:
Correspond to high speed MPU interface (2MHz)
80 x 8 bit display RAM (80 Characters max)
9,920-bit character generator ROM for a total of 240 character fonts. 208
character fonts (5 x 8 dots) 32 character fonts (5 x 10 dots)
64 x 8 bit character generator RAM 8 character generator RAM 8
character fonts (5 x 8 dots) 4 characters fonts (5 x 10 dots)
yProgrammable duty cycles
1/8 – for one line of 5 x 8 dots with cursor
1/11 – for one line of 5 x 10 dots with cursor.
27
2.8 Peripheral Interface Controller
The Components involved in hardware section are PIC16F877A, Stepper
motor, GSM. This chapter gives detailed information about the hardware
components, working principles and their applications which are used in the
biometric vechicle access system.
2.8.1 Introduction:
The microcontroller that has been used for this project is from PIC series. PIC
microcontroller is the first RISC based microcontroller fabricated in CMOS
(complimentary metal oxide semiconductor) that uses separate bus for
instruction and data allowing simultaneous access of program and data
memory.
The main advantage of CMOS and RISC combination is low power
consumption resulting in a very small chip size with a small pin count. The
main advantage of CMOS is that it has immunity to noise than other
fabrication techniques.
Various microcontrollers offer different kinds of memories. EEPROM,
EPROM, FLASH etc. are some of the memories of which FLASH is the most
recently developed. Technology that is used in PIC16F877A is flash
technology, so that data is retained even when the power is switched off. Easy
Programming and Erasing are other features of PIC 16F877A
2.8.2 Core Features
• High-performance RISC CPU
• Only 35 single word instructions to learn
28
• All single cycle instructions except for program branches which are two
cycle
• Operating speed: DC - 20 MHz clock input
DC - 200 ns instruction cycle
• Up to 8K x 14 words of Flash Program Memory,
Up to 368 x 8 bytes of Data Memory (RAM)
Up to 256 x 8 bytes of EEPROM data memory
• Pin out compatible to the PIC16C73/74/76/77
• Interrupt capability (up to 14 internal/external
• Eight level deep hardware stack
• Direct, indirect, and relative addressing modes
• Power-on Reset (POR)
• Power-up Timer (PWRT) and Oscillator Start-up Timer (OST)
• Watchdog Timer (WDT) with its own on-chip RC Oscillator for reliable
operation
• Programmable code-protection
• Power saving SLEEP mode
• Selectable oscillator options
• Low-power, high-speed CMOS EPROM/EEPROM technology
• Fully static design
• In-Circuit Serial Programming (ICSP) via two pins
29
• Only single 5V source needed for programming capability
• In-Circuit Debugging via two pins
• Processor read/write access to program memory
• Wide operating voltage range: 2.5V to 5.5V
• High Sink/Source Current: 25 mA
• Commercial and Industrial temperature ranges
• Low-power consumption:
< 2mA typical @ 5V, 4 MHz
20mA typical @ 3V, 32 kH
< 1mA typical standby current
2.8.3 Peripheral Features
• Timer0: 8-bit timer/counter with 8-bit prescaler
• Timer1: 16-bit timer/counter with prescaler, can be incremented during
sleep
Via external crystal/clock
• Timer2: 8-bit timer/counter with 8-bit period register, prescaler and
postscaler
• Two Capture, Compare, PWM modules
Capture is 16-bit, max resolution is 12.5 ns,
30
Compare is 16-bit, max resolution is 200 ns,
PWM max. resolution is 10-bit
• 10-bit multi-channel Analog-to-Digital converter
• Synchronous Serial Port (SSP) with SPI. (Master Mode) and I2C.
(Master/Slave)
• Universal Synchronous Asynchronous Receiver Transmitter (USART/SCI)
with
9- Bit addresses detection.
• Brown-out detection circuitry for Brown-out Reset (BOR)
2.8.4Pin Configuration
31
Fig 2.8.1 Pin Diagram for PIC 16f877A
2.8.5 Pin Description:
T 2.8.1
32
T 2.8.2
Legend: I = input O = output I/O = input/output P = power
= Not used TTL = TTL input ST = Schmitt Trigger input
Note :
1. This buffer is a Schmitt Trigger input when configured as an external
interrupt.
2. This buffer is a Schmitt Trigger input when used in serial programming
mode.
33
3. This buffer is a Schmitt Trigger input when configured as general purpose
I/O and a TTL input when used in the Parallel Slave Port mode (for
interfacing to a microprocessor bus).
4. This buffer is a Schmitt Trigger input when configured in RC oscillator
mode and a
CMOS input otherwise.
I/O PORTS:
Some pins for these I/O ports are multiplexed with an alternate function for the
peripheral features on the device. In general, when a peripheral is enabled, that
pin may not be used as a general purpose I/O pin.
Additional Information on I/O ports may be found in the IC micro™
Mid-Range Reference Manual,
PORTA AND THE TRISA REGISTER:
PORTA is a 6-bit wide bi-directional port. The corresponding data direction
register is TRISA. Setting a TRISA bit (=1) will make the corresponding
PORTA pin an input, i.e., put the corresponding output driver in a Hi-
impedance mode. Clearing a TRISA bit (=0) will make the corresponding
PORTA pin an output, i.e., put the contents of the output latch on the selected
pin.
PORTB AND TRISB REGISTER:
PORTB is an 8-bit wide bi-directional port. The corresponding data
direction register is TRISB. Setting a TRISB bit (=1) will make the
corresponding PORTB pin an input, i.e., put the corresponding output driver in
a hi-impedance mode. Clearing a TRISB bit (=0) will make the corresponding
PORTB pin an output, i.e., put the contents of the output latch on the selected
34
pin. Three pins of PORTB are multiplexed with the Low Voltage
Programming function; RB3/PGM, RB6/PGC and RB7/PGD. The alternate
functions of these pins are described in the Special Features Section. Each of
the PORTB pins has a weak internal pull-up. A single control bit can turn on
all the pull-ups.
This is performed by clearing bit RBPU (OPTION_REG<7>). The weak
pull-up is automatically turned off when the port pin is configured as an
output. The pull-ups are disabled on a Power-on Reset.
PORTC AND THE TRISC REGISTER:
PORTC is an 8-bit wide bi-directional port. The corresponding data direction
register is TRISC. Setting a TRISC bit (=1) will make the corresponding
PORTC pin an input, i.e., put the corresponding output driver in a hi-
impedance mode. Clearing a TRISC bit (=0) will make the corresponding
PORTC pin an output, i.e., put the contents of the output latch on the selected
pin. PORTC is multiplexed with several peripheral functions. PORTC pins
have Schmitt Trigger input buffers.
PORTD AND TRISD REGISTERS:
This section is not applicable to the 28-pin devices. PORTD is an 8-bit port
with Schmitt Trigger input buffers. Each pin is individually configurable as an
input or output. PORTD can be configured as an 8-bit wide microprocessor
Port (parallel slave port) by setting control bit PSPMODE (TRISE<4>). In this
mode, the input buffers are TTL.
35
PORT E AND TRISE REGISTER:
PORTE has three pins RE0/RD/AN5, RE1/WR/AN6 and RE2/CS/AN7, which
are individually configurable as inputs or outputs. These pins have Schmitt
Trigger input buffers.
The PORTE pins become control inputs for the microprocessor port when bit
PSPMODE (TRISE<4>) is set. In this mode, the user must make sure that the
TRISE<2:0> bits are set (pins are configured as digital inputs). Ensure
ADCON1 is configured for digital I/O. In this mode the input buffers are TTL.
PORTE pins are multiplexed with analog inputs. When selected as an analog
input, these pins will read as '0's. TRISE controls the direction of the RE pins,
even when they are being used as analog inputs. The user must make sure to
keep the pins configured as inputs when using them as analog inputs.
2.8.6 MEMORY ORGANISATION:
There are three memory blocks in each of the PIC16F877 MUC’s. The
program memory and Data Memory have separate buses so that concurrent
access can occur.
PROGRAM MEMORY ORGANISATION:
The PIC16f877 devices have a 13-bit program counter capable of addressing
8K *14 words of FLASH program memory. Accessing a location above the
physically implemented address will cause a wraparound.
The RESET vector is at 0000h and the interrupt vector is at 0004h.
DATA MEMORY ORGANISTION:
36
The data memory is partitioned into multiple banks which contain the General
Purpose Registers and the special functions Registers. Bits RP1 (STATUS<6)
and RP0 (STATUS<5>) are the bank selected bits.
Each bank extends up to 7Fh (1238 bytes). The lower locations of each
bank are reserved for the Special Function Registers. Above the Special
Function Registers are General Purpose Registers, implemented as static RAM.
All implemented banks contain special function registers. Some frequently
used special function registers from one bank may be mirrored in another bank
for code reduction and quicker access.
EEPROM:
EEPROM (electrically erasable, programmable read only memory) technology
supplies Nonvolatile storage of variables to a PIC-controlled device or
instrument. That is variables stored in an EEPROM will remain there even
after power has been turned off and then on again. Some instruments use an
EEPROM to store calibration data during manufacture. In this way, each
instrument is actually custom built, with customization that can be easily
automated. Other instruments use and EEPROM to allow a user to store
several sets of setup information. For an instrument requiring a complicated
setup procedure, this permits a user to retrieve the setup required for any one of
several very
Different measurements. Still other devices use an EEPROM in a way that is
transparent
To a user, providing backup of setup parameters and thereby bridging overpower outages
The data EEPROM and flash program memory are readable and writable
during normal operation over the entire VDD range. A bulk erase operation
37
may not be issued from user code (which includes removing code protection.
The data memory is not directly mapped in the register file space. Instead it is
indirectly addressed through the special function registers (SFR).
There are six SFRS used to read and write the program and data EEPROMmemory.
These registers are:
EECON1
EECON2
EEDATA
EEDATH
EEADR
EEADRH
EEDATA holds the 8-bit data for read/write and EEADRR holds the address
of the EEPROM location being accessed. The 8-bit EEADR register can
access up to 256 locations of data EEPROM. The EEADR register can be
thought of as the indirect addressing register of the data EEPROM. EEcon1
contains the control bits, while eecon2 is the register used to initiate the
read/write. The EEPROM data memory allows bytes read and write. A byte
write automatically erases the location and writes the new data. The write time
is controlled by timer in-built.
38
2.9 MAX 232 COMMUNICATION
2.9.1 INTRODUCTION:
In telecommunication, MAX-232 is a standard for serial binary datainterconnection between a DTE (Data Terminal Equipment) and a DCE (DataCircuit- terminating Equipment). It is commonly used in computer serial ports.
2.9.2 SCOPE OF THE STANDARD:
The Electronic Industries Alliance(EIA) standards MAX-232-C[3] as of 1996defines:
Electrical signal characteristics such as voltage levels, signaling rate, timingand slew-rate of signals, voltage with stand level, short-circuit behavior,maximum stray capacitance and cable length.
Interface mechanical characteristics, pluggable connectors and pinidentification
Function of does not defines such elements as character encoding (forexample, ASCII, BAUDOT or EBCDIC),or the framinig of characters in thedata stream (bits per character, start/stop bits, parity). The standard does notdefine protocols for error detection or algorithms for data compression.
FIG 2.9.1 CIRCUIT DIAGRAM OF MAX232
39
The satandard does not define bit rates for transmission, although the standardsays it is intended for bit rates lower than 20,000 bits per second. Manymodern devices can exeeds this speed (38,400 and 57,600 bit/sec beingcommon, and 115,200 and 230,400 bit/s making occasional appearances) whilestill using MAX-232 compatible signal levels.
Details of character format and transmission bit rate are controlled by theserial port hardware, often a single integrated circuit called a UART thatconverts data from parallel to serial form. A typical serial port includesspecialized driver and receiver integrated circuits to convert between internallogic levels and MAX-232 comatible signal levels.
2.9.3 Description:
In this circuit the MAX 232 IC used as level logic converter.The MAX 232 is adual driver/receiver that includes a capacitive voltage generator to supply EIA232 voltage levels from a single 5v supply. Each receiver converts EIA-232 to5v TTL/CMOS levels. Each driver converts TTL/CMOS input levels into EIA-232 levels.
In this circuit the microcontroller transmitter pin is connected in the MAX 232T2IN pin which converts input 5v TTL/CMOS levels to RS 232 levels.ThenT2OUT pin is connected to receiver pin of 9 pin D type serial connector whichis directly connected to PC.
In PC the transmitting data is given to R2IN of MAX 232 through transmittingpin D type connector which converts the RS232 level to 5v TTL/CMOS level.The R2OUT pin is connected to receiver pin of the microcontroller. Likewisethe data is transmitted and received between the microcontroller and PC orother device vice versa. Communication as defined in the RS 232 standard inan asynchronous serial communication method.The word serial means, that theinformation is send one bit at a time. Asynchronous tells us that theinformation is not send in predefined time slots. The RS232 standard describesa communication method where information is send bit by bit on a physicalchannel. The information must be broken up in data words. The length of adata word is variable. On PC’s a length between 5&8 bits can be selected.Which synchronous communication, a clock or trigger signal must be presentwhich indicates the beginning of each transfer. The absence of a clock signalmakes an asynchronous communication channel to operate.
40
2.10 POWER SUPPLY
2.10.1 INTRODUCTION:
The ac voltage, typically 220v rms, is connected to a transformer, which stepsthat ac voltage down to the level of the desired dc output. A diode rectifier thenprovides a full-wave rectified voltage that is initially filtered by a simplecapacitor filter to produce a dc voltage. This resulting dc voltage usually hassome ripple or ac voltage variation. A regulator circuit removes the ripples andalso remains the same dc value even if the input dc voltage varies, or the loadconnected to the output dc voltage changes. This voltage regulation is usuallyobtained using one of the popular voltage regulator IC units.
Fig 2.10.1 Block Diagram of a DC power supply
2.10.2 WORKING PRINCIPLE:
TRANSFORMER:
The transformer will step down the power supply voltage (0-230v) to (0-6v)level. Then the secondary of the potential transformer will be connected to theprecision rectifier, which is constructed with the help of op-amp. Theadvantages of using precision rectifier are it will give peak voltage output asDC; rest of the circuits will give only RMS output.
41
RECTIFIER
The rectifier is the device which converts alternating current into some dcform. The output of the rectifier is in pulsated DC form. There is somesemiconductor devices used to convert AC to DC named diodes. Normally weare using PN junction diodes in rectifiers. These diodes allow the current flowto it when the incoming voltage is higher than or equal to 0.7v. Otherwise itwill act as an open circuit.
FILTER
The next section of the power supply is filter section. That is nothing butcapacitor. The capacitor is used as a filter to convert pulsated DC to pure DC.We can utilize the capacitor’s charging discharging characteristics and convertthe pulsated DC to pure DC.
VOLTAGE REGULATOR
Voltage regulators comprise a class of widely used ICs. Regulator IC unitscontain the circuitry for reference source, comparator amplifier, control device,and overload protection all in a single IC. IC units provide regulation of eithera fixed positive voltage, a fixed negative voltage, or an adjustably set voltage.The regulators can be selected for operation with load currents from hundredsof milli amperes to tens of amperes, corresponding to power ratings from milliwatts to tens of watts.
42
3 SOFTWARE TOOLS
3.1KEIL C COMPILER
Keil development tools for the PIC Microcontroller Architecture support everyLevel of software developer from the professional applications engineer to theStudent just learning about embedded software development. Theindustry – standard Keil C Compilers, Macro Assemblers, Debuggers Real-Time Kernels, Single-board Computers, and Emulators support all 8051Derivatives and help you get your projects completed on schedule.
The Keil PIC Development Tools are designed to solve the complexProblems facing embedded software developers.
When starting a ne w project, simply select the microcontroller youUse from the Device Database and the Vision IDE sets all compiler,assembler, Linker, and memory options for you.
Numerous example programs are included to help you get startedWith the most popular embedded 8051 Devices.
The Keil Vission Debugger accurately simulates on-chipPeripherals (I2C,CAN,UART,SPI,Interrupts,I/O Ports, A/DConvedrter, D/A Converter, and PWM Modules) of your 8051devices.
Simulation helps you understand hardware configurations andAvoids time wasted on setup problems. Additionally, Withsimulation, you can Write and test applications before targethardware is available.
When you are re3ady to begin testing your software applicationwith Target hardware, use the MON51,MON390,MONADI,or FlashMON51 Target Monitors, the ISD51 In-System Debugger, or theULINK USB-JTAG Adapter To download and test program codeon your target system.
43
PROGRAM
/*use 20Mhz crystal
use HS configuration to fuse*/
#include<pic.h>
#include"pic_lcd8.h"
#include"pic_serial.h"
#define set RB0
#define mov RB1
#define inc RB2
#define dec RB3
#define ent RB4
#define f_relay RB7
#define g_relay RB6
#define object RB5
signed char count=0;
unsigned charrc=0,data_rcv[80],i=0,fp_id=0,fpid1=0,chk_sum=0,va=0,k=0,kk,ct,start;
unsigned int j,x0,x1,x2;
void display(unsigned char val);
void fpid(unsigned char val);
void result();
void ent_fpid();
void interrupt serRx()
44
{
if(RCIF)
{
data_rcv[rc]=RCREG;
rc++;
RCIF=0;
}
}
void main()
{
TRISB=0x3f;
TRISA=0X00;
TRISC=0x80;
TRISD=0x00;
PORTD=0xff;
TRISE0=0;TRISE1=0;TRISE2=0;
ADCON1=0x06;
PORTB=0xff;
g_relay=0;
Lcd8_Init();
Serial_Init(57600);
Lcd8_Display(0x80,"FINGER PRINT ",16);
Delay(65000); Delay(65000);Delay(65000);
Receive(1);
45
Lcd8_Command(0x01);
Delay(65000);
while(1)
{/*
Serial_Conout("TEST",4);
Delay(65530);Delay(65530);
*/
// if(!inc && !x0)x0=1;
if(!inc){while(!inc);count++;if(count>5){count=0;}}
// if(!dec && !x1)x1=1;
if(!dec){while(!dec);count--;if(count<0){count=5;}}
//if(!ent && !x2)x2=1;
if(!ent){while(!ent);fpid(count);}
display(count);
if(object==1) Lcd8_Write(0xcf,'Y');
else Lcd8_Write(0xcf,'N');
}
}
void display(unsigned char val)
{
switch(val)
{
case 1:
Lcd8_Display(0xC0,"ENROLLEMENT ",16);
break;
case 2:
Lcd8_Display(0xC0,"IDENTIFY FP ",16);
46
break;
case 3:
Lcd8_Display(0xC0,"DEL USR FP ",16);
break;
case 4:
Lcd8_Display(0xC0,"DEL ALL FP ",16);
break;
case 5:
Lcd8_Display(0xC0,"VERIFY FP ",16);
break;
default:
Lcd8_Display(0x80,"select option ",16);
Lcd8_Display(0xC0," ",16);
break;
}
}
void fpid(unsigned char val)
{
Lcd8_Command(0x01);
for(rc=0;rc<50;rc++)data_rcv[rc]=0;
rc=0;
switch(val)
{
case 1:
ent_fpid();
47
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x01\x00\x08",13);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x02\x00\x09",13);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x05\x00\x09",12);
Delay(5000); Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x06\x06\x02",11);
Serial_Out(0);
Serial_Out(fp_id);
chk_sum=fp_id+15;
Serial_Out(0);
Serial_Out(chk_sum);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);
i=1;
48
result();
break;
case 2:
Lcd8_Display(0xc0,"--Processing.---",16);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);
Delay(65000);Delay(65000);Delay(40000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x01\x00\x08",13);
Delay(40000);Delay(20000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x08\x1b\x01\x00\x00\x01\x01\x00\x27",17);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);i=2;Delay(65000);
result();
break;
case 3:
ent_fpid();
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x07\x0C",10);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Out(0);
49
Delay(65000);
Serial_Out(fp_id);
Serial_Out(0);
Serial_Out(0x01);
chk_sum=fp_id+21;
Serial_Out(0);
Serial_Out(chk_sum);Delay(65000);Delay(65000); i=3;
result();
break;
case 4:
Lcd8_Display(0xc0,"--Processing.---",16);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x0D\x00\x11",12);
Delay(65000);Delay(65000);
i=4;
result();
break;
case 5:
ent_fpid();
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x06\x07\x02",11);
Serial_Out(0x00);
Serial_Out(fp_id);
chk_sum=fp_id+16;
Serial_Out(0x00);
Serial_Out(chk_sum);
50
Delay(65000);Delay(65000);Delay(65000) ;Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x01\x00\x08",13);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x03\x00\x07",12);
i=5;
result();
Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);
break;
default:
break;
}
}
void ent_fpid()
51
{
while(!ent);Delay(65000);
Lcd8_Display(0x80,"Enter ID No: 000",16);
fp_id=0;
while(ent)
{
if(!inc){while(!inc);fp_id++;if(fp_id>=255)fp_id=0;Lcd8_Decimal3(0x8D,fp_id);}
if(!dec){while(!dec);fp_id--;if(fp_id>=255)fp_id=255;Lcd8_Decimal3(0x8D,fp_id);}
}
Lcd8_Display(0xc0,"--Processing.---",16);
ct++;
}
void result()
{
Lcd8_Command(0x01);
if(i==1)
{
if((data_rcv[69]==0x00)&&(rc>70))
{
Lcd8_Display(0x80," Enrollment ",16);
Lcd8_Display(0xC0," Success ",16);
52
}
else if(data_rcv[69]==0x02)
{
Lcd8_Display(0x80," No Finger ",16);
}
else
{
Lcd8_Display(0x80," Enrollment ",16);
Lcd8_Display(0xC0," Not Success ",16);
}
i=0;
Delay(65000);Delay(65000);Delay(65000);
Lcd8_Command(0x01);
}
else if(i==2)
{
if(data_rcv[33]==0x00)
{
if(data_rcv[35]==0) {Lcd8_Display(0x80,"Keepfng proper ",16); goto down;}
Lcd8_Display(0x80," Success ",16);
Lcd8_Display(0xc0," Finger ID: ",16);
Lcd8_Decimal3(0xcb,data_rcv[35]);
Delay(65000);Delay(65000);
Lcd8_Command(0x01);
53
Delay(65000);Delay(65000);
f_relay=1;
if(data_rcv[35]==1)
{
if(object==1)
{
Lcd8_Write(0xcf,'Y');
g_relay=1;
Lcd8_Display(0x80,"AUTHORIZED USER ",16);
Lcd8_Display(0xc0,"",15);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
//Lcd8_Display(0x80,"messagesending ",16);
Serial_Conout("AT+CMGS=\"8760494899\"\r",21);
Delay(65000);
Serial_Conout("AUTHORIZEDUSER\r",16);
Delay(65000);
Serial_Out(0x0D);
Delay(65000);Delay(65000);
Serial_Out(0x1A);
Delay(65000);Delay(65000);Delay(65000);
// g_relay=0;
}
54
else
{
Lcd8_Write(0xcf,'N');
Lcd8_Display(0x80,"UNAUTHORIZED USR",16);
Lcd8_Display(0xc0,"",15);
Delay(65000);Delay(65000);Delay(65000);Delay(65000);
Lcd8_Display(0x80,"messagesending ",16);
Serial_Conout("AT+CMGS=\"8760494899\"\r",21);
Delay(65000);
Serial_Conout("UNAUTHORIZED USER\r",18);
Delay(65000);
Serial_Out(0x0D);
Delay(65000);Delay(65000);
Serial_Out(0x1A);
Delay(65000);Delay(65000);Delay(65000);
}
}
else if(data_rcv[35]==2)
{
if(object==1)
{
55
g_relay=1;
Lcd8_Write(0xcf,'Y');
Lcd8_Display(0x80,"AUTHORIZED USER ",16);
Lcd8_Display(0xc0,"",15);
Delay(65000);Delay(65000);
//Lcd8_Display(0x80,"messagesending ",16);
Serial_Conout("AT+CMGS=\"8760494899\"\r",21);
Delay(65000);
Serial_Conout("AUTHORIZEDUSER\r",16);
Delay(65000);
Serial_Out(0x0D);
Delay(65000);Delay(65000);
Serial_Out(0x1A);
Delay(65000);Delay(65000);Delay(65000);
// g_relay=0;
}
else
{
Lcd8_Write(0xcf,'N');
Lcd8_Display(0x80,"UNAUTHORIZED USR",16);
Lcd8_Display(0xc0,"",15);
56
Delay(65000);Delay(65000);
Lcd8_Display(0x80,"messagesending ",16);
Serial_Conout("AT+CMGS=\"8760494899\"\r",21);
Delay(65000);
Serial_Conout("UNAUTHORIZED USER\r",18);
Delay(65000);
Serial_Out(0x0D);
Delay(65000);Delay(65000);
Serial_Out(0x1A);
Delay(65000);Delay(65000);Delay(65000);
}
}
else
{
Lcd8_Display(0x80,"UNAUTHORIZED USR",16);
Lcd8_Display(0xc0," ",15);
Delay(65000);Delay(65000);
Lcd8_Display(0x80,"message sending",16);
Serial_Conout("AT+CMGS=\"9486144582\"\r",21);
Delay(65000);
Serial_Conout("INDRUTERDETECT\r",18);
Delay(65000);
57
Serial_Out(0x0D);
Delay(65000);Delay(65000);
Serial_Out(0x1A);
Delay(65000);Delay(65000);Delay(65000);
}
f_relay=0;
}
else if(data_rcv[33]==0x09)
{Lcd8_Display(0x80,"UNAUTHORIZED USR",16);
Lcd8_Display(0xc0," ",16);
// Delay(65000);Delay(65000);
Lcd8_Display(0xC0,"messagesending ",16);
}
/* else if(data_rcv[33]==0x24)
{
Lcd8_Display(0x80,"UNAUTHORIZED USR",16);
Lcd8_Display(0xc0,"",16);
// Delay(65000);Delay(65000);
Lcd8_Display(0xC0,"messagesending ",16);
} */
// Serial_Init(9600);
i=0;
58
for(start=0;start<10;start++)
{
Delay(65000);
}
Lcd8_Command(0x01);
}
else if(i==3)
{
if(data_rcv[9]==0x00)
{
Lcd8_Display(0x80," Finger Id ",16);
Lcd8_Display(0xc0," Deleted ",16);
}
else if(data_rcv[9]==0x10)
{
Lcd8_Display(0x80,"Fail To delete ",16);
Lcd8_Display(0xc0," Finger Id ",16);
}
else if(data_rcv[9]==0x01)
{
Lcd8_Display(0x80,"Receiving ",16);
Lcd8_Display(0xc0," Error ",16);
}
i=0;
Delay(65000);Delay(65000);Delay(65000);
Lcd8_Command(0x01);
}
59
else if(i==4)
{
if(data_rcv[9]==0x00)
{
Lcd8_Display(0x80," Finger id's ",16);
Lcd8_Display(0xc0," Deleted ",16);
kk=0;Delay(65000);
}
else if(data_rcv[9]==0x11)
{
Lcd8_Display(0x80,"Fail To delete ",16);
Lcd8_Display(0xc0,"Finger Id's ",16);
}
else if(data_rcv[9]==0x01)
{
Lcd8_Display(0x80,"Receiving ",16);
Lcd8_Display(0xc0," Error ",16);
}
i=0;
Delay(65000);Delay(65000);Delay(65000);
Lcd8_Command(0x01);
}
else if(i==5)
{
va=data_rcv[49]-data_rcv[47];
Lcd8_Decimal3(0xcA,va);
60
Delay(65000);Delay(65000);
if(data_rcv[45]==0x00&&va==12)
{
Lcd8_Display(0x80,"Matching ",16);
Lcd8_Display(0xc0," Success ",16);
}
else if(va==13)
{
Lcd8_Display(0x80,"Receiving ",16);
Lcd8_Display(0xc0," Error ",16);
}
else
{
Lcd8_Display(0x80,"Matching ",16);
Lcd8_Display(0xc0," Not Success ",16);
} i=0;
Delay(65000);Delay(65000);Delay(65000);
Lcd8_Command(0x01);
}
Delay(65000);Delay(65000);Delay(65000);
down:;
}
61
RESULT ANALYSIS AND VERIFICATION
The result which we expect from our project is that the vehicle will be ignitedonly when the authorized person scans his/her finger on the fingerprintmodule. The fingerprints of the authorized persons are stored in the fingerprintmodule. When any person put his/her finger on the fingerprint module then thedata of the placed finger is matched with the stored data in the module. If thefingerprint data is found in the module then match condition occurs and themicrocontroller ignites the vehicle otherwise vehicle will not start.
62
CONCLUSION
Fingerprint identification enhances the security of a vehicle and makes it
possible only for some selected people to start the vehicle. The expected result
by implementing this model on the vehicle is that only the authorized person
will be able to ignite the vehicle. Not every person with the key will be able to
start the vehicle. There will be matching of the person’s data with the stored
one and only in the case of match the vehicle will start otherwise not. Thus by
implementing this relatively cheap and easily available system on a vehicle one
can ensure much greater security and exclusivity than that offered by a
conventional lock and key. The thief would have to do a great deal of
homework to steal the vehicle, and it is unlikely that they have the fingerprint
technology needed to fake your fingerprint.
63
REFERENCES
[1] Omidiora E. O.(2011) “A Prototype of a Fingerprint Based Ignition
Systems in Vehicles” Published in European Journal of Scientific Research
ISSN 1450-216X Vol.62 No.2 (2011), pp. 164-171 © EuroJournals Publishing,
Inc. 2011 http://www.eurojournals.com/ejsr.htm
[2] Karthikeyan.a “ Fingerprint Based Ignition System” Published in
Karthikeyan.a, Sowndharya.j /International Journal Of Computational
Engineering Research / ISSN: 2250–3005
[3] Prashantkumar R.(2013) “Two Wheeler Vehicle Security System”
Published in International Journal of Engineering Sciences & Emerging
Technologies, Dec. 2013. ISSN: 2231 – 6604 Volume 6, Issue 3, pp: 324-334
©IJESET
[4] Visa M. Ibrahim “Microcontroller Based Anti-theft Security System Using
GSM Networks with Text Message as Feedback” Published in International
Journal of Engineering Research and Development e-ISSN: 2278-067X, p-
ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 10 (August 2012), PP. 18-
22
[5] Lin Hong. "Automatic Personal Identification Using Fingerprints", Ph.D.
Thesis, 1998.
64
[6] Yang S. and Verbauwhede I. (2003) “A Secure Fingerprint Matching
Technique”, http://www.emsec.ee.ucla.edu./pdf/2003acm.pdf
[7] http://auto.howstuffworks.com/ignitionsystem.htm, “How Automobile
Ignition Systems Work “
[8] http://www.biometricinfo.org/fingerprintrecognition.htm,“Biometrics
Information Resource”
[9] http://www.crimtrac.gov.au/fingerprintanalysis.htm, “Fingerprint Analysis
– The Basics”
[10] R. K. Singh, “Crime in India 2011 - Statistics”, for National Crime
Records Bureau 2011.
65