biometric vehicle access system using …...fingerprint recognition locking system can provide...

65
BIOMETRIC VEHICLE ACCESS SYSTEM USING FINGER PRINT RECOGNITION A PROJECT REPORT Submitted by VIMALRAJ G Reg. No.: 12BEC173 THANGARASU P Reg. No.: 12BEC232 YOGESHWARAN P Reg. No.: 12BEC239 RAVIKUMAR R Reg. No.: 12BEC241 in partial fulfillment for the award of the degree of BACHELOR OF ENGINEERING IN ELECTRONICS AND COMMUNICATION ENGINEERING KUMARAGURU COLLEGE OF TECHNOLOGY COIMBATORE-641049 ANNA UNIVERSITY: CHENNAI 600 025 APRIL 2016 1

Upload: others

Post on 26-Apr-2020

17 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

BIOMETRIC VEHICLE ACCESS SYSTEMUSING FINGER PRINT RECOGNITION

A PROJECT REPORT

Submitted by

VIMALRAJ G Reg. No.: 12BEC173 THANGARASU P Reg. No.: 12BEC232 YOGESHWARAN P Reg. No.: 12BEC239 RAVIKUMAR R Reg. No.: 12BEC241

in partial fulfillment for the award of the degree

of

BACHELOR OF ENGINEERING

IN

ELECTRONICS AND COMMUNICATION

ENGINEERING

KUMARAGURU COLLEGE OF TECHNOLOGY

COIMBATORE-641049

ANNA UNIVERSITY: CHENNAI 600 025

APRIL 2016

1

Page 2: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

ANNA UNIVERSITY: CHENNAI 600 025

BONAFIDE CERTIFICATE

Certified that this project report “BIOMETRIC VEHICLE ACCESS

SYSTEM USING FINGER PRINT RECOGNITION” is the bonafide

work of “VIMALRAJ G [12BEC173], THANGARASU P [12BEC232],

YOGESHWARAN P [12BEC239], RAVIKUMAR R [12BEC241]” who

carried out the project work under my supervision.

SIGNATURE SIGNATURE

Dr. M. Bharathi, M.E., Ph.D,. Dr. Vasuki, M.E., Ph.D,. Assosiate Professor, Head Of The Department,Electronics & Communication Electronics & Communication Engineering, Engineering,

Kumaraguru College of Technology, Kumaraguru College of Technology,Coimbatore 641049. Coimbatore 641049.

The candidates with Register numbers 12BEC173, 12BEC232, 12BEC239and 12BEC241 are examined by us in the project viva-voce examinationheld on ………………………………..

INTERNAL EXAMINER EXTERNAL EXAMINER

ACKNOWLEDGEMENT

2

Page 3: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

I express my sincere thanks to the management of Kumaraguru

College of Technology and Joint Correspondent Shri. Shankar Vanavarayar

for the kind support and for providing necessary facilities to carry out the

project work.

I would like to express my sincere thanks to our beloved Principal

Dr.R.S.Kumar, Ph.D., Kumaraguru College of Technology, who encouraged

me in each and every step of the project.

I would like to thank Dr.Vasuki, Ph.D., Head of the Department,

Electronics and Communication Engineering, for her kind support and for

providing necessary facilities to carry out the project work.

I wish to thank with everlasting gratitude to my Project Guide

Dr.M.Bharathi, Ph.D., Associate Professor, Department of Electronics and

Communication Engineering for her expert counseling and guidance to make

this project to a great deal of success.

I am greatly privileged to express my deep sense of gratitude and heartfelt

thanks to the Project Coordinator Mr. Karthikeyan. R, M.E, Assistant

Professor, Department of Electronics and Communication Engineering,

throughout the course of this project work and I wish to convey my deep sense

of gratitude to all teaching and non-teaching staff of ECE Department for their

help and cooperation.

Finally, I thank my parents and my family members for giving me the

moral support and abundant blessings in all of my activities and my dear

friends who helped me to endure my difficult times with their unfailing support

and warm wishes.

ABSTRACT

3

Page 4: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

In this current world, the vehicle usage is necessity for everyone. Protecting

the vehicle against theft is also very important. Available locks in the vehicle

do not provide enough security to the vehicle owners. Traditional locks

available in the vehicle are well known to thieves and they can be easily

broken by them. Thus there is a need for more security options to be available

for the vehicle which is unique and must be different from the traditional key

locks.

Biometrics system can be used as a good and effective security option. An

important and very reliable human identification method is fingerprint

identification. As fingerprint of every person is unique thus it can be used in

various security options. The main goal of this project is to protect the vehicle

from any unauthorized access, using fingerprint recognition technique. This

vehicle security system intimates the status of the vehicle to the authoritative

person using GSM. In this project we are focusing on the use of finger print

recognition to access the vehicle against the use of conventional methods of

key locks.

TABLE OF CONTENTS

4

Page 5: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

CHAPTER NO TITLE PAGE NO

ABSTRACT

LIST OF TABLE

LIST OF FIGURES

1 INTRODUCTION

2 HARDWARE DESCRIPTION 1

2.1Block diagram

2.2Circuit diagram

2.2.1 Finger print 12

2.2.2 GSM 13

2.2.3 RS 232 13

2.2.4 Liquid Crystal Display 13

2.2.5 Microcontroller 13

2.2.6 DC motor and Relay 13

2.3 BIOMETRIC TECHNOLOGY 14

2.3.1 Introduction 14

2.3.2 Finger print sensor 15

2.4 RELAY DRIVER CIRCUIT 16

2.4.1 Introduction 16

5

Page 6: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.4.2 DPDT 16

2.4.3 Circuit description 17

2.5 DC MOTOR 21

2.5.1 Introduction 21

2.5.2 Construction and working 21

2.6 GSM 24

2.6.1 Introduction 24

2.6.2 GSM Network Areas 25

2.6.3 GSM Frequency 26

2.7 LIQUID CRYSTAL DISPLAY 28

2.7.1 Introduction 28

2.8 PIC MICROCONTROLLER 31

2.8.1 Introduction 31

2.8.2 Core Features 31

2,8.3 Peripheral Features 33

2.8.4 Pin Configuration 34

2.8.5 Pin Description 35

2.8.6 Memory Organization 39

2.9 MAX 232 COMMUNICATION 49

2.9.1 Introduction 49

6

Page 7: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.9.2 Scope of the standard 49

2.9.3 Description of max 232 50

2.10 POWER SUPPLY 52

2.10.1 Introduction 52

2.10.2 Working principle 52

3 SOFTWARE TOOLS 19

3.1 KEIL C Compiler 19

3.3 Program

4 RESULT ANALYSIS AND VERIFICATION 54

5 CONCLUSION 56

APPENDIX 1- PIC 16F877A DATA SHEETS

APPENDIX 2- LCD DATA SHEETS

APPENDIX 3- R305 FINGER PRINT DATA SHEETS

APPENDIX 4- MAX 232 DATA SHEETS

APPENDIX 5- 7805 DATA SHEETS

7

Page 8: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

LIST OF TABLES

TABLE NO TITLE PAGE NO

T 2. 8.1 Pin Description 35

T 2.8.2 Pin Description 36

T 2.8.3 Interrupts 45

8

Page 9: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

LIST OF FIGURES

FIGURE NO TITLE PAGE NO

2.1 BASIC BLOCK DIAGRAM 12

2.2 CIRCUIT DIAGRAM 13

2.4.1 RELAY DRIVER CIRCUIT 18

2.5.1 DC MOTOR 21

2.5.2 WORKING OF DC MOTOR 22

2.6.1 SIMPLE ARCHITECTURE DIAGRAM

GSM NETWORK 25

2.6.2 GSM NETWORK ALONG WITH

ADDED ELEMENT 26

2.8.1 PIN DIAGRAM OF PIC 34

2.9.1 CIRUIT DIAGRAM OF MAX 232 49

2.10.1 BLOCK DIAGRAM OF POWER SUPPLY 52

9

Page 10: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

10

Page 11: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

CHAPTER 1

INTRODUCTION

Nowadays the vehicle theft has increased due to the low security in the vehicle

it needs to enhance the security level in the vehicles. Traditional and

commonly used key locks available in the vehicle are well known to the

thieves and thus it can be easily unlocked by the professional thieves. With the

help of master key it becomes very easy to unlock the lock of the vehicle by

the thieves. This creates the demand of such type of lock which is new and

provides an additional security level. The new and modern lock must be unique

in itself i.e. it must be only unlocked by special and specific key. This type of

feature is available in the biometrics locks i.e. the lock which can only be

locked and unlocked by the human body features. Biometrics can include: face

recognition, voice recognition, fingerprint recognition, eye (iris) recognition.

Of all these type of special biometric recognition techniques the fingerprint

recognition is the most widely used because fingerprint of every person on the

earth is unique and can provide good reliability. Also the implementation of

the fingerprint recognition system is easy and cheap than the other ones. Thus

fingerprint recognition locking system can provide better reliability than the

traditional locks and also is cheaper and easy than the other biometric locking

system. Thus here we are proposing a model which utilizes the concept of

fingerprint recognition in the motorcycles to enhance the security level of the

vehicle. Some other related work to this model is also reviewed in the next

section.

11

Page 12: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

CHAPTER 2

BIOMETRIC VEHICLE ACCESS SYSTEM

Biometric Vehicle Access system prevents the unauthorized person accessing

the vehicle. The block diagram of this system is shown in Fig 2.1. The

components involved in hardware sections are PIC microcontroller, DC motor,

GSM modem and fingerprint module. This chapter gives detailed information

about the hardware components and their applications.

Fig 2.1 BLOCK DIAGRAM OF BIOMETRIC VEHICLE ACCESS

SYSTEM

12

PIC 16F877A

ADC

U

ART

SPI

I2C

GPIO

DAC / PWM

Power

& Reset

UART

GPIO

ROM

RAM

CLOCK

GSM Modem

UAR

T

GSM

Module

Relay

Drive

Relay

Load

Device

Finger Print Reader

UAR

T

Interface

Controller

Sensor

Module

Sensors

Page 13: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.2 CIRCUIT DIAGRAM

Fig 1.2 BASIC CIRUIT DIAGRAM

2.2.1 FINGER PRINT

Fingerprint authentication refers to the automated method of verifying a match

between two human fingerprints. Fingerprints are one of many forms of

biometrics used to identify individuals and verify their identity.

2.2.2 GSM

GSM is a cellular network, which means that mobile phones connect to it by

searching for cells in the immediate vicinity. GSM is connected through 232IC

2.2.3 RS 232

13

Page 14: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

RS-232 is a standard for serial communication transmission of data. Used to

interconnect the GSM module with the microcontroller.

2.2.4 LIQUID CRYSTAL DISPLAY

Liquid crystal display is a flat panel display, electronic visual display, or video

display that uses the light modulating properties of liquid crystals. Liquid

crystals do not emit directly. LCD is connected with the microcontroller.

2.2.5 MICROCONTROLLER

The data is given to the serial port of the PIC microcontroller. Microcontroller

is programmed to find the finger print is matched with previously stored one if

it is same it well send to the signal to the DC motor driver circuit.

2.2.6 DC MOTOR and RELAY

Signal from microcontroller is given to the driven circuit, which gives signal to

the relay to run motor in forward or reverse direction

14

Page 15: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.3 BIOMETRIC TECHNOLOGY

2.3.1 INTRODUCTION

Biometric s is automated methods of recognizing a person based on a

physiological or behavioral characteristic. Among the features measured are

face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.

Biometric technologies are becoming the foundation of an extensive array of

highly secure identification and personal verification solutions. As the level of

security breaches and transaction fraud increases, the need for highly secure

identification and personal verification technologies is becoming apparent.

Biometric based authentication applications include workstation, network, and

domain access, single sign-on, application logon, data protection, remote

access to resources, transaction security and web security. Utilized alone or

integrated with other technologies such as smart cards, encryption keys and

digital signatures, biometrics is set to pervade nearly all aspects of our daily

lives.

Utilizing biometrics for personal authentication is becoming convenient and

considerably more accurate than current methods. This is because biometrics

links the event to a particular individual (a password or token may be used by

someone-9-other than the authorized user), is convenient (nothing to carry or

remember), accurate(it provides for positive authentication) and cost effective.

By unequivocally linking an individual to a transaction or event, biometrics

precisely verify who did what, where, and when. The indisputable evidence of

biometrics means that they add value to time and attendance solutions by

minimizing the opportunity for ID fraud through unauthorized use of lost,

stolen or “borrowed” ID cards, PINs and passwords. Fingerprint analysis is a

15

Page 16: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

fast and inexpensive technique of identifying a person. Even twins have

different fingerprints.

2.3.2 FINGER PRINT SENSOR

Fingerprint recognition or fingerprint authentication refers to the automated

method of verifying a match between two human fingerprints. Fingerprints are

one of many forms of biometrics used to identify an individual and verify their

identity. This article touches on two major classes of algorithm (pattern) and

four sensor designs (optical, ultrasonic, passive and active capacitance).

Fingerprint sensor is an electronic device used to capture a digital image of the

fingerprint pattern. The captured image is called a live scan. This live scan is

digitally processed to create a biometric template (a collection of extracted

features) which is stored and used for matching. This is an overview of some

of the more commonly used fingerprint sensor technologies.

Optical fingerprint imaging involves capturing a digital image of the print

using visible light. This type of sensor is, in essence, a specialized camera. The

top layer of the sensor, where the finger is placed, is known as the touch

surface. Beneath this layer is a light-emitting phosphor layer which illuminates

the surface of the finger. The light reflected from the finger passes through the

phosphor layer to an array of solid state pixels (a charge-coupled device)

which

Captures a visual image of the fingerprint. A scratched or dirty touch

surface can cause a bad image of the fingerprint. A disadvantages of this type

of sensor is the fact that the imaging capabilities are affected by the quality of

skin on the finger. For instance, a dirty or marked finger is difficult to image

properly. Also, it is possible for an individual to erode the outer layer of skin

on the fingerprints to the point where the fingerprint is no longer visible. It can

also be easily fooled by an image of a fingerprint if not coupled with a “live

16

Page 17: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

finger” Detector. However, unlike capacitive sensors, like sensor technology is

not susceptible to electrostatic discharge damage.

2.4 RELAY DRIVER CIRCUIT

2.4.1 INTRODUCTION

A relay is a switch worked by an electromagnet. It is useful if we want a small

current in one circuit to control another circuit containing a device such as a

lamp or electric motor which requires a large current, or if we wish several

different switch contacts to be operated simultaneously.

When the controlling current flow through the coil, the soft iron core is

magnetized and attracts the L-shaped soft iron armature. These rocks on its

pivot and opens, closes or changes over, the electrical contacts in the circuit

being controlled it closes the contacts. The current needed to operate a relay is

called the pull-in current and the dropout current in the coil when the relay just

stops working. Relay driver circuit is used for on / off control of relay, it acts

as a switch, normally open relay is used. Relay function is derived by

controller unit. Relay working current is 40 ma. When the controller unit

output is low relay should be in off condition. When the controller unit output

is high, relay should be in off condition. When the controller unit output is

high, relay should be ready for doing specified function.

2.4.2 DPDT :

A DPDT(double-pole double throw) relay has two pairs of contacts or

“throws” and two magnetically activated switch contacts or “poles”. A current

applied to the relay coil causes both poles to switch.

17

Page 18: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.4.3 RELAY CIRCUIT DESCRIPTION:

Fig 4.1 Relay driver circuit

This circuit is designed to control the load. The load may be motor or any other

load. The load is turned ON and OFF through relay. The relay ON and OFF is

controlled by the pair of switching transistors (BC 547). The DPDT relay is

connected in the Q2 transistor collector terminal. A relay is nothing but

electromagnetic switching device which consists of six pins. They are two set

of common, normally close (NC) and normally open (NO) pin. The relay

common pin is connected to supply voltage. The normally open (NO) pin

18

Page 19: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

connected to load. When high pulse signal to base of the Q1 transistors, the

transistor is conducting and short the collector and emitter terminal and zero

signal is given to base of the Q2 transistor. So the relay is turned OFF stat

2.5 DC MOTOR

2.5.1 INTRIODUCTION

A DC motor is a mechanically commutated electric motor powered from direct

current (DC). The stator is stationary in space by definition and therefore so is

its current. The current in the rotor is switched by the commutator to also be

stationary in space. This is how the relative angle between the stator and rotor

magnetic flux is maintained near 90 degrees, which generates the maximum

torque.

2.5.2 CONSTRUCTION and WORKING

Parts of DC Motor is shown in this figure

19

Page 20: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Fig 2.5.1 DC Motor

ARMATURE:

A dc motor consists of a rectangular coil made of insulated copper wire wound

on a soft iron core. This coil wound on the soft iron core forms the armature.

The coil is mounted on the axle and Is placed between the cylindrical concave

poles of a magnet.

COMMUTATOR:

A commutator is used to reverse the direction of flow of current. Commutator

is a copper ring split into two parts c1 and c2. The split rings are insulated from

each other and mounted on the axle of the motor. The two ends of the coil are

soldered to these rings. They rotate along with the coil. Commutator rings are

20

Page 21: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

connected to a battery. The wires from the battery are not connected to the

rings but to the brushes which are in contact with the rings.

BRUSHES:

Two small strips of carbon, known as brushes press slightly against the two

split rings, and the split rings rotate between the brushes. The carbon brushes

are connected to a DC source.

2.5.2 Working of a DC Motor

Fig 2.5.2 Working of DC Motor

When the coil is powered, a magnetic field is generated around the armature.

The left side of the armature is pushed away from the left magnet and drawn

towards the right, causing rotation.

When the coil turns through 90 degree, the brushes lose contact with the

commutator and the current stops flowing through the coil. However the coil

keeps turning because of its own momentum.

Now when the coil turns through 180 degree, the sides get interchanged. As a

result the commutator ring C, is now in contact with brush B2 and commutator

21

Page 22: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

ring C2 is in contact with brush B1. Therefore, the current continues to flow in

the same direction.

The bar magnet represents the armature and the coil of wire represents the

field. The arrow shows the direction of the armature’s rotation. Notice that the

arrow shows the armature starting to rotate in the clockwise direction. The

north pole of the field coil is repelling the north pole of the armature, and the

south pole of the field coil is repelling the south pole of the armature.

2.6 GSM

2.6.1 INTRODUCTION

GSM (Global system for mobile communications) is the most popular standard

for mobile phones in the world. Its promoter, the GSM association, estimates

that 80% of the global mobile marcket uses the standard GSM is used by over

3 billion people across more than 212 contries and teritories its ubiquity makes

international roming very common between mobile phone operators,enabling

subscribers to use their phones in many parts of the world. GSM differs from

its predecessors in that both signaling and speech channels are digital, and thus

is considered a second generation (2G) mobile phone system. This has also

meant than data communication was easy to build into the system. GSM

EDGE is a 3G verson of protocol. A GSM network consits of several

functional entities, whose functions and interfaces are defined. The GSM

network can be devided into following broad parts.

The mobile statiom (MS)

The base station subsystem (BSS)

The network switching subsystem (NSS)

The operation support subsystem (OSS)

22

Page 23: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Fig 2.6.1 GSM architecure

The added components of the GSM architecture include the functions of thedatabases and messaging system:

Home location register (HLR)

Visitor location register (VLR)

Equipment identity register (EIR)

Authentication center (AUC)

SMS serving center (SMS SC)

Gateway MSC (GMSC)

Chargeback center (CBC)

TRanscoder and Adaptaion Unit (TRAU)

23

Page 24: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Fig 2.6.2 GSM element diagram

The MS and the BSS communicate across the um interface, also known as the

air interface or radio link. The BSS communicates with the network service

switching center across the A interface.

2.6.2 GSM NETWORK AREAS

In a GSM network, the following areas are defined:

Cell: cell is the basic service area: one BTS overs one cell.Each cell is

given a cell global identity (CGI), a number that uniquely identify the

cell.

Location Area: A group of cell form a location area. This is the area

that is paged when a subscriber gets an incoming call. Each location

area is asigned a location area identity (LAI). Each location area is

served by one or more BSCs.

MSC/VLR Service Area: The area covered by one MSC is called the

MSC/VLR service area.

24

Page 25: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

PLMN: The area covered by one network operator is called PLMN. A

PLMN contain one or more MSCs.

2.6.3 GSM FREQUENCIES

GSM network operate in a number of different frequency ranges (separated

into GSM frequency ranges for 2G and UMTS frequency bands for 3G). Most

2G GSM networks operate in the 900 MHZ or 1800MHZ bands. Some contries

in the americas(including canada and the united states) use the 850MHZ and

1900MHZ bands because the 900 and 1800MHZ frequency bands where

already alocated. Most 3G GSM network in europe operate in the 2100MHZ

frequency band. The rarer 400 and 450MHZ frequency bands or asigned in

some contries where these frequencies where previously used for first

generation systems.

GSM-900 uses 890-915MHZ to send information from the mobile station to

the base station (uplink) and 935-960MHZ for the other direction

(downlink),providing 125RF channels(channel numbers 1-124) spaced at

200KHZ dublex spacing of 45MHZ is used. In some contries the GSM-900

band has been extended to cover a lorge frequency range. This ‘extended

GSM’, E-GSM, uses 880-915MHZ (uplink) and 925-960MHZ

(downlink),adding 50 (channel numbers 975 to 1023 and 0) to the original

GSM-900 band. Time divisaion multiplexing is used to allow eight full-rate or

16 half-rate speech channel per radio frequency channel. Ther are eight radio

time slots (giving eight burst periods)grouped into what is called TDMA

frame. Half-rate channels use alternate frames in the same timeslot. The

channel data rate for all 8 channels is 270.833k bits/sec, and the frame duration

is 4.615 ms. The transmission power in the handset is limited to a maximum of

2 watts in GSM 850/900 and 1 watt in GSM1800/1900.

25

Page 26: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.7 LIQUID CRYSTAL DISPLAY (LCD)

2.7.1 INTRODUCTION

Liquid crystal displays (LCD’s) have materials, which combine the properties

of both liquids and crystals. Rather than having a melting point, they have a

temperature range within which the molecules are almost as mobile as they

would be in a liquid, but are grouped together in an ordered form similar to a

crystal.

An LCD consists of two glass panels, with the liquid crystal material sand

witched in between them. The inner surface of the glass plates are coated with

transparent electrodes which define the character, symbols or patterns to be

displayed polymeric layers are present in between the electrodes and the liquid

crystal, which makes the liquid crystal molecules to maintain a defined

orientation angle.

One each polarizes are pasted outside the two glass panels. These polarizes

would rotate the light rays passing through them to a definite angle, in a

particular direction. When the LCD is in the off state, light rays are rotated by

the two polarizes and the liquid crystal, such that the light rays come out of the

LCD without any orientation, and hence the LCD appears transparent.

When sufficient voltage is applied to the electrodes, the liquid crystal

molecules would be aligned in a specific direction. The light rays passing

through the LCD would be rotated by the polarizes, which would result in

activating / highlighting the desired characters. The LCD’s are lightweight

with only a few millimeters thickness. Since the LCD’s consume less power,

they are compatible with low power electronic circuits, and can be powered for

long durations.

26

Page 27: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

The LCD does not generate light and so light is needed to read the display. By

using backlighting, reading is possible in the dark. The LCD’s have long life

and a wide operating temperature range. Changing the display size or the

layout size is relatively simple which makes the LCD’s more customers

friendly.

The LCDs used exclusively in watches, calculators and measuring instruments

are the simple seven-segment displays, having a limited amount of numeric

data. The recent advances in technology have resulted in better legibility, more

information displaying capability and a wider temperature range. These have

resulted in the LCDs being extensively used in telecommunications and

entertainment electronics. The LCDs have even started replacing the cathode

ray tubes (CRTs) used for the display of text and graphics, and also in small

TV applications.

Crystalonics dot–matrix (alphanumeric) liquid crystal displays are available in

TN, STN types, with or without backlight. The use of C-MOS LCD controller

and driver ICs result in low power consumption. These modules can be

interfaced with a 4-bit or 8-bit microprocessor /Micro controller

The built-in controller IC has the following features:

Correspond to high speed MPU interface (2MHz)

80 x 8 bit display RAM (80 Characters max)

9,920-bit character generator ROM for a total of 240 character fonts. 208

character fonts (5 x 8 dots) 32 character fonts (5 x 10 dots)

64 x 8 bit character generator RAM 8 character generator RAM 8

character fonts (5 x 8 dots) 4 characters fonts (5 x 10 dots)

yProgrammable duty cycles

1/8 – for one line of 5 x 8 dots with cursor

1/11 – for one line of 5 x 10 dots with cursor.

27

Page 28: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.8 Peripheral Interface Controller

The Components involved in hardware section are PIC16F877A, Stepper

motor, GSM. This chapter gives detailed information about the hardware

components, working principles and their applications which are used in the

biometric vechicle access system.

2.8.1 Introduction:

The microcontroller that has been used for this project is from PIC series. PIC

microcontroller is the first RISC based microcontroller fabricated in CMOS

(complimentary metal oxide semiconductor) that uses separate bus for

instruction and data allowing simultaneous access of program and data

memory.

The main advantage of CMOS and RISC combination is low power

consumption resulting in a very small chip size with a small pin count. The

main advantage of CMOS is that it has immunity to noise than other

fabrication techniques.

Various microcontrollers offer different kinds of memories. EEPROM,

EPROM, FLASH etc. are some of the memories of which FLASH is the most

recently developed. Technology that is used in PIC16F877A is flash

technology, so that data is retained even when the power is switched off. Easy

Programming and Erasing are other features of PIC 16F877A

2.8.2 Core Features

• High-performance RISC CPU

• Only 35 single word instructions to learn

28

Page 29: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

• All single cycle instructions except for program branches which are two

cycle

• Operating speed: DC - 20 MHz clock input

DC - 200 ns instruction cycle

• Up to 8K x 14 words of Flash Program Memory,

Up to 368 x 8 bytes of Data Memory (RAM)

Up to 256 x 8 bytes of EEPROM data memory

• Pin out compatible to the PIC16C73/74/76/77

• Interrupt capability (up to 14 internal/external

• Eight level deep hardware stack

• Direct, indirect, and relative addressing modes

• Power-on Reset (POR)

• Power-up Timer (PWRT) and Oscillator Start-up Timer (OST)

• Watchdog Timer (WDT) with its own on-chip RC Oscillator for reliable

operation

• Programmable code-protection

• Power saving SLEEP mode

• Selectable oscillator options

• Low-power, high-speed CMOS EPROM/EEPROM technology

• Fully static design

• In-Circuit Serial Programming (ICSP) via two pins

29

Page 30: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

• Only single 5V source needed for programming capability

• In-Circuit Debugging via two pins

• Processor read/write access to program memory

• Wide operating voltage range: 2.5V to 5.5V

• High Sink/Source Current: 25 mA

• Commercial and Industrial temperature ranges

• Low-power consumption:

< 2mA typical @ 5V, 4 MHz

20mA typical @ 3V, 32 kH

< 1mA typical standby current

2.8.3 Peripheral Features

• Timer0: 8-bit timer/counter with 8-bit prescaler

• Timer1: 16-bit timer/counter with prescaler, can be incremented during

sleep

Via external crystal/clock

• Timer2: 8-bit timer/counter with 8-bit period register, prescaler and

postscaler

• Two Capture, Compare, PWM modules

Capture is 16-bit, max resolution is 12.5 ns,

30

Page 31: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Compare is 16-bit, max resolution is 200 ns,

PWM max. resolution is 10-bit

• 10-bit multi-channel Analog-to-Digital converter

• Synchronous Serial Port (SSP) with SPI. (Master Mode) and I2C.

(Master/Slave)

• Universal Synchronous Asynchronous Receiver Transmitter (USART/SCI)

with

9- Bit addresses detection.

• Brown-out detection circuitry for Brown-out Reset (BOR)

2.8.4Pin Configuration

31

Page 32: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Fig 2.8.1 Pin Diagram for PIC 16f877A

2.8.5 Pin Description:

T 2.8.1

32

Page 33: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

T 2.8.2

Legend: I = input O = output I/O = input/output P = power

= Not used TTL = TTL input ST = Schmitt Trigger input

Note :

1. This buffer is a Schmitt Trigger input when configured as an external

interrupt.

2. This buffer is a Schmitt Trigger input when used in serial programming

mode.

33

Page 34: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

3. This buffer is a Schmitt Trigger input when configured as general purpose

I/O and a TTL input when used in the Parallel Slave Port mode (for

interfacing to a microprocessor bus).

4. This buffer is a Schmitt Trigger input when configured in RC oscillator

mode and a

CMOS input otherwise.

I/O PORTS:

Some pins for these I/O ports are multiplexed with an alternate function for the

peripheral features on the device. In general, when a peripheral is enabled, that

pin may not be used as a general purpose I/O pin.

Additional Information on I/O ports may be found in the IC micro™

Mid-Range Reference Manual,

PORTA AND THE TRISA REGISTER:

PORTA is a 6-bit wide bi-directional port. The corresponding data direction

register is TRISA. Setting a TRISA bit (=1) will make the corresponding

PORTA pin an input, i.e., put the corresponding output driver in a Hi-

impedance mode. Clearing a TRISA bit (=0) will make the corresponding

PORTA pin an output, i.e., put the contents of the output latch on the selected

pin.

PORTB AND TRISB REGISTER:

PORTB is an 8-bit wide bi-directional port. The corresponding data

direction register is TRISB. Setting a TRISB bit (=1) will make the

corresponding PORTB pin an input, i.e., put the corresponding output driver in

a hi-impedance mode. Clearing a TRISB bit (=0) will make the corresponding

PORTB pin an output, i.e., put the contents of the output latch on the selected

34

Page 35: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

pin. Three pins of PORTB are multiplexed with the Low Voltage

Programming function; RB3/PGM, RB6/PGC and RB7/PGD. The alternate

functions of these pins are described in the Special Features Section. Each of

the PORTB pins has a weak internal pull-up. A single control bit can turn on

all the pull-ups.

This is performed by clearing bit RBPU (OPTION_REG<7>). The weak

pull-up is automatically turned off when the port pin is configured as an

output. The pull-ups are disabled on a Power-on Reset.

PORTC AND THE TRISC REGISTER:

PORTC is an 8-bit wide bi-directional port. The corresponding data direction

register is TRISC. Setting a TRISC bit (=1) will make the corresponding

PORTC pin an input, i.e., put the corresponding output driver in a hi-

impedance mode. Clearing a TRISC bit (=0) will make the corresponding

PORTC pin an output, i.e., put the contents of the output latch on the selected

pin. PORTC is multiplexed with several peripheral functions. PORTC pins

have Schmitt Trigger input buffers.

PORTD AND TRISD REGISTERS:

This section is not applicable to the 28-pin devices. PORTD is an 8-bit port

with Schmitt Trigger input buffers. Each pin is individually configurable as an

input or output. PORTD can be configured as an 8-bit wide microprocessor

Port (parallel slave port) by setting control bit PSPMODE (TRISE<4>). In this

mode, the input buffers are TTL.

35

Page 36: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

PORT E AND TRISE REGISTER:

PORTE has three pins RE0/RD/AN5, RE1/WR/AN6 and RE2/CS/AN7, which

are individually configurable as inputs or outputs. These pins have Schmitt

Trigger input buffers.

The PORTE pins become control inputs for the microprocessor port when bit

PSPMODE (TRISE<4>) is set. In this mode, the user must make sure that the

TRISE<2:0> bits are set (pins are configured as digital inputs). Ensure

ADCON1 is configured for digital I/O. In this mode the input buffers are TTL.

PORTE pins are multiplexed with analog inputs. When selected as an analog

input, these pins will read as '0's. TRISE controls the direction of the RE pins,

even when they are being used as analog inputs. The user must make sure to

keep the pins configured as inputs when using them as analog inputs.

2.8.6 MEMORY ORGANISATION:

There are three memory blocks in each of the PIC16F877 MUC’s. The

program memory and Data Memory have separate buses so that concurrent

access can occur.

PROGRAM MEMORY ORGANISATION:

The PIC16f877 devices have a 13-bit program counter capable of addressing

8K *14 words of FLASH program memory. Accessing a location above the

physically implemented address will cause a wraparound.

The RESET vector is at 0000h and the interrupt vector is at 0004h.

DATA MEMORY ORGANISTION:

36

Page 37: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

The data memory is partitioned into multiple banks which contain the General

Purpose Registers and the special functions Registers. Bits RP1 (STATUS<6)

and RP0 (STATUS<5>) are the bank selected bits.

Each bank extends up to 7Fh (1238 bytes). The lower locations of each

bank are reserved for the Special Function Registers. Above the Special

Function Registers are General Purpose Registers, implemented as static RAM.

All implemented banks contain special function registers. Some frequently

used special function registers from one bank may be mirrored in another bank

for code reduction and quicker access.

EEPROM:

EEPROM (electrically erasable, programmable read only memory) technology

supplies Nonvolatile storage of variables to a PIC-controlled device or

instrument. That is variables stored in an EEPROM will remain there even

after power has been turned off and then on again. Some instruments use an

EEPROM to store calibration data during manufacture. In this way, each

instrument is actually custom built, with customization that can be easily

automated. Other instruments use and EEPROM to allow a user to store

several sets of setup information. For an instrument requiring a complicated

setup procedure, this permits a user to retrieve the setup required for any one of

several very

Different measurements. Still other devices use an EEPROM in a way that is

transparent

To a user, providing backup of setup parameters and thereby bridging overpower outages

The data EEPROM and flash program memory are readable and writable

during normal operation over the entire VDD range. A bulk erase operation

37

Page 38: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

may not be issued from user code (which includes removing code protection.

The data memory is not directly mapped in the register file space. Instead it is

indirectly addressed through the special function registers (SFR).

There are six SFRS used to read and write the program and data EEPROMmemory.

These registers are:

EECON1

EECON2

EEDATA

EEDATH

EEADR

EEADRH

EEDATA holds the 8-bit data for read/write and EEADRR holds the address

of the EEPROM location being accessed. The 8-bit EEADR register can

access up to 256 locations of data EEPROM. The EEADR register can be

thought of as the indirect addressing register of the data EEPROM. EEcon1

contains the control bits, while eecon2 is the register used to initiate the

read/write. The EEPROM data memory allows bytes read and write. A byte

write automatically erases the location and writes the new data. The write time

is controlled by timer in-built.

38

Page 39: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.9 MAX 232 COMMUNICATION

2.9.1 INTRODUCTION:

In telecommunication, MAX-232 is a standard for serial binary datainterconnection between a DTE (Data Terminal Equipment) and a DCE (DataCircuit- terminating Equipment). It is commonly used in computer serial ports.

2.9.2 SCOPE OF THE STANDARD:

The Electronic Industries Alliance(EIA) standards MAX-232-C[3] as of 1996defines:

Electrical signal characteristics such as voltage levels, signaling rate, timingand slew-rate of signals, voltage with stand level, short-circuit behavior,maximum stray capacitance and cable length.

Interface mechanical characteristics, pluggable connectors and pinidentification

Function of does not defines such elements as character encoding (forexample, ASCII, BAUDOT or EBCDIC),or the framinig of characters in thedata stream (bits per character, start/stop bits, parity). The standard does notdefine protocols for error detection or algorithms for data compression.

FIG 2.9.1 CIRCUIT DIAGRAM OF MAX232

39

Page 40: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

The satandard does not define bit rates for transmission, although the standardsays it is intended for bit rates lower than 20,000 bits per second. Manymodern devices can exeeds this speed (38,400 and 57,600 bit/sec beingcommon, and 115,200 and 230,400 bit/s making occasional appearances) whilestill using MAX-232 compatible signal levels.

Details of character format and transmission bit rate are controlled by theserial port hardware, often a single integrated circuit called a UART thatconverts data from parallel to serial form. A typical serial port includesspecialized driver and receiver integrated circuits to convert between internallogic levels and MAX-232 comatible signal levels.

2.9.3 Description:

In this circuit the MAX 232 IC used as level logic converter.The MAX 232 is adual driver/receiver that includes a capacitive voltage generator to supply EIA232 voltage levels from a single 5v supply. Each receiver converts EIA-232 to5v TTL/CMOS levels. Each driver converts TTL/CMOS input levels into EIA-232 levels.

In this circuit the microcontroller transmitter pin is connected in the MAX 232T2IN pin which converts input 5v TTL/CMOS levels to RS 232 levels.ThenT2OUT pin is connected to receiver pin of 9 pin D type serial connector whichis directly connected to PC.

In PC the transmitting data is given to R2IN of MAX 232 through transmittingpin D type connector which converts the RS232 level to 5v TTL/CMOS level.The R2OUT pin is connected to receiver pin of the microcontroller. Likewisethe data is transmitted and received between the microcontroller and PC orother device vice versa. Communication as defined in the RS 232 standard inan asynchronous serial communication method.The word serial means, that theinformation is send one bit at a time. Asynchronous tells us that theinformation is not send in predefined time slots. The RS232 standard describesa communication method where information is send bit by bit on a physicalchannel. The information must be broken up in data words. The length of adata word is variable. On PC’s a length between 5&8 bits can be selected.Which synchronous communication, a clock or trigger signal must be presentwhich indicates the beginning of each transfer. The absence of a clock signalmakes an asynchronous communication channel to operate.

40

Page 41: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

2.10 POWER SUPPLY

2.10.1 INTRODUCTION:

The ac voltage, typically 220v rms, is connected to a transformer, which stepsthat ac voltage down to the level of the desired dc output. A diode rectifier thenprovides a full-wave rectified voltage that is initially filtered by a simplecapacitor filter to produce a dc voltage. This resulting dc voltage usually hassome ripple or ac voltage variation. A regulator circuit removes the ripples andalso remains the same dc value even if the input dc voltage varies, or the loadconnected to the output dc voltage changes. This voltage regulation is usuallyobtained using one of the popular voltage regulator IC units.

Fig 2.10.1 Block Diagram of a DC power supply

2.10.2 WORKING PRINCIPLE:

TRANSFORMER:

The transformer will step down the power supply voltage (0-230v) to (0-6v)level. Then the secondary of the potential transformer will be connected to theprecision rectifier, which is constructed with the help of op-amp. Theadvantages of using precision rectifier are it will give peak voltage output asDC; rest of the circuits will give only RMS output.

41

Page 42: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

RECTIFIER

The rectifier is the device which converts alternating current into some dcform. The output of the rectifier is in pulsated DC form. There is somesemiconductor devices used to convert AC to DC named diodes. Normally weare using PN junction diodes in rectifiers. These diodes allow the current flowto it when the incoming voltage is higher than or equal to 0.7v. Otherwise itwill act as an open circuit.

FILTER

The next section of the power supply is filter section. That is nothing butcapacitor. The capacitor is used as a filter to convert pulsated DC to pure DC.We can utilize the capacitor’s charging discharging characteristics and convertthe pulsated DC to pure DC.

VOLTAGE REGULATOR

Voltage regulators comprise a class of widely used ICs. Regulator IC unitscontain the circuitry for reference source, comparator amplifier, control device,and overload protection all in a single IC. IC units provide regulation of eithera fixed positive voltage, a fixed negative voltage, or an adjustably set voltage.The regulators can be selected for operation with load currents from hundredsof milli amperes to tens of amperes, corresponding to power ratings from milliwatts to tens of watts.

42

Page 43: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

3 SOFTWARE TOOLS

3.1KEIL C COMPILER

Keil development tools for the PIC Microcontroller Architecture support everyLevel of software developer from the professional applications engineer to theStudent just learning about embedded software development. Theindustry – standard Keil C Compilers, Macro Assemblers, Debuggers Real-Time Kernels, Single-board Computers, and Emulators support all 8051Derivatives and help you get your projects completed on schedule.

The Keil PIC Development Tools are designed to solve the complexProblems facing embedded software developers.

When starting a ne w project, simply select the microcontroller youUse from the Device Database and the Vision IDE sets all compiler,assembler, Linker, and memory options for you.

Numerous example programs are included to help you get startedWith the most popular embedded 8051 Devices.

The Keil Vission Debugger accurately simulates on-chipPeripherals (I2C,CAN,UART,SPI,Interrupts,I/O Ports, A/DConvedrter, D/A Converter, and PWM Modules) of your 8051devices.

Simulation helps you understand hardware configurations andAvoids time wasted on setup problems. Additionally, Withsimulation, you can Write and test applications before targethardware is available.

When you are re3ady to begin testing your software applicationwith Target hardware, use the MON51,MON390,MONADI,or FlashMON51 Target Monitors, the ISD51 In-System Debugger, or theULINK USB-JTAG Adapter To download and test program codeon your target system.

43

Page 44: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

PROGRAM

/*use 20Mhz crystal

use HS configuration to fuse*/

#include<pic.h>

#include"pic_lcd8.h"

#include"pic_serial.h"

#define set RB0

#define mov RB1

#define inc RB2

#define dec RB3

#define ent RB4

#define f_relay RB7

#define g_relay RB6

#define object RB5

signed char count=0;

unsigned charrc=0,data_rcv[80],i=0,fp_id=0,fpid1=0,chk_sum=0,va=0,k=0,kk,ct,start;

unsigned int j,x0,x1,x2;

void display(unsigned char val);

void fpid(unsigned char val);

void result();

void ent_fpid();

void interrupt serRx()

44

Page 45: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

{

if(RCIF)

{

data_rcv[rc]=RCREG;

rc++;

RCIF=0;

}

}

void main()

{

TRISB=0x3f;

TRISA=0X00;

TRISC=0x80;

TRISD=0x00;

PORTD=0xff;

TRISE0=0;TRISE1=0;TRISE2=0;

ADCON1=0x06;

PORTB=0xff;

g_relay=0;

Lcd8_Init();

Serial_Init(57600);

Lcd8_Display(0x80,"FINGER PRINT ",16);

Delay(65000); Delay(65000);Delay(65000);

Receive(1);

45

Page 46: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Lcd8_Command(0x01);

Delay(65000);

while(1)

{/*

Serial_Conout("TEST",4);

Delay(65530);Delay(65530);

*/

// if(!inc && !x0)x0=1;

if(!inc){while(!inc);count++;if(count>5){count=0;}}

// if(!dec && !x1)x1=1;

if(!dec){while(!dec);count--;if(count<0){count=5;}}

//if(!ent && !x2)x2=1;

if(!ent){while(!ent);fpid(count);}

display(count);

if(object==1) Lcd8_Write(0xcf,'Y');

else Lcd8_Write(0xcf,'N');

}

}

void display(unsigned char val)

{

switch(val)

{

case 1:

Lcd8_Display(0xC0,"ENROLLEMENT ",16);

break;

case 2:

Lcd8_Display(0xC0,"IDENTIFY FP ",16);

46

Page 47: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

break;

case 3:

Lcd8_Display(0xC0,"DEL USR FP ",16);

break;

case 4:

Lcd8_Display(0xC0,"DEL ALL FP ",16);

break;

case 5:

Lcd8_Display(0xC0,"VERIFY FP ",16);

break;

default:

Lcd8_Display(0x80,"select option ",16);

Lcd8_Display(0xC0," ",16);

break;

}

}

void fpid(unsigned char val)

{

Lcd8_Command(0x01);

for(rc=0;rc<50;rc++)data_rcv[rc]=0;

rc=0;

switch(val)

{

case 1:

ent_fpid();

47

Page 48: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x01\x00\x08",13);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x02\x00\x09",13);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x05\x00\x09",12);

Delay(5000); Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x06\x06\x02",11);

Serial_Out(0);

Serial_Out(fp_id);

chk_sum=fp_id+15;

Serial_Out(0);

Serial_Out(chk_sum);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);

i=1;

48

Page 49: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

result();

break;

case 2:

Lcd8_Display(0xc0,"--Processing.---",16);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);

Delay(65000);Delay(65000);Delay(40000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x01\x00\x08",13);

Delay(40000);Delay(20000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x08\x1b\x01\x00\x00\x01\x01\x00\x27",17);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);i=2;Delay(65000);

result();

break;

case 3:

ent_fpid();

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x07\x0C",10);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Out(0);

49

Page 50: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Delay(65000);

Serial_Out(fp_id);

Serial_Out(0);

Serial_Out(0x01);

chk_sum=fp_id+21;

Serial_Out(0);

Serial_Out(chk_sum);Delay(65000);Delay(65000); i=3;

result();

break;

case 4:

Lcd8_Display(0xc0,"--Processing.---",16);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x0D\x00\x11",12);

Delay(65000);Delay(65000);

i=4;

result();

break;

case 5:

ent_fpid();

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x06\x07\x02",11);

Serial_Out(0x00);

Serial_Out(fp_id);

chk_sum=fp_id+16;

Serial_Out(0x00);

Serial_Out(chk_sum);

50

Page 51: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Delay(65000);Delay(65000);Delay(65000) ;Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x01\x00\x05",12);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x04\x02\x01\x00\x08",13);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Serial_Conout("\xEF\x01\xFF\xFF\xFF\xFF\x01\x00\x03\x03\x00\x07",12);

i=5;

result();

Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);Delay(65000);

break;

default:

break;

}

}

void ent_fpid()

51

Page 52: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

{

while(!ent);Delay(65000);

Lcd8_Display(0x80,"Enter ID No: 000",16);

fp_id=0;

while(ent)

{

if(!inc){while(!inc);fp_id++;if(fp_id>=255)fp_id=0;Lcd8_Decimal3(0x8D,fp_id);}

if(!dec){while(!dec);fp_id--;if(fp_id>=255)fp_id=255;Lcd8_Decimal3(0x8D,fp_id);}

}

Lcd8_Display(0xc0,"--Processing.---",16);

ct++;

}

void result()

{

Lcd8_Command(0x01);

if(i==1)

{

if((data_rcv[69]==0x00)&&(rc>70))

{

Lcd8_Display(0x80," Enrollment ",16);

Lcd8_Display(0xC0," Success ",16);

52

Page 53: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

}

else if(data_rcv[69]==0x02)

{

Lcd8_Display(0x80," No Finger ",16);

}

else

{

Lcd8_Display(0x80," Enrollment ",16);

Lcd8_Display(0xC0," Not Success ",16);

}

i=0;

Delay(65000);Delay(65000);Delay(65000);

Lcd8_Command(0x01);

}

else if(i==2)

{

if(data_rcv[33]==0x00)

{

if(data_rcv[35]==0) {Lcd8_Display(0x80,"Keepfng proper ",16); goto down;}

Lcd8_Display(0x80," Success ",16);

Lcd8_Display(0xc0," Finger ID: ",16);

Lcd8_Decimal3(0xcb,data_rcv[35]);

Delay(65000);Delay(65000);

Lcd8_Command(0x01);

53

Page 54: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Delay(65000);Delay(65000);

f_relay=1;

if(data_rcv[35]==1)

{

if(object==1)

{

Lcd8_Write(0xcf,'Y');

g_relay=1;

Lcd8_Display(0x80,"AUTHORIZED USER ",16);

Lcd8_Display(0xc0,"",15);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

//Lcd8_Display(0x80,"messagesending ",16);

Serial_Conout("AT+CMGS=\"8760494899\"\r",21);

Delay(65000);

Serial_Conout("AUTHORIZEDUSER\r",16);

Delay(65000);

Serial_Out(0x0D);

Delay(65000);Delay(65000);

Serial_Out(0x1A);

Delay(65000);Delay(65000);Delay(65000);

// g_relay=0;

}

54

Page 55: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

else

{

Lcd8_Write(0xcf,'N');

Lcd8_Display(0x80,"UNAUTHORIZED USR",16);

Lcd8_Display(0xc0,"",15);

Delay(65000);Delay(65000);Delay(65000);Delay(65000);

Lcd8_Display(0x80,"messagesending ",16);

Serial_Conout("AT+CMGS=\"8760494899\"\r",21);

Delay(65000);

Serial_Conout("UNAUTHORIZED USER\r",18);

Delay(65000);

Serial_Out(0x0D);

Delay(65000);Delay(65000);

Serial_Out(0x1A);

Delay(65000);Delay(65000);Delay(65000);

}

}

else if(data_rcv[35]==2)

{

if(object==1)

{

55

Page 56: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

g_relay=1;

Lcd8_Write(0xcf,'Y');

Lcd8_Display(0x80,"AUTHORIZED USER ",16);

Lcd8_Display(0xc0,"",15);

Delay(65000);Delay(65000);

//Lcd8_Display(0x80,"messagesending ",16);

Serial_Conout("AT+CMGS=\"8760494899\"\r",21);

Delay(65000);

Serial_Conout("AUTHORIZEDUSER\r",16);

Delay(65000);

Serial_Out(0x0D);

Delay(65000);Delay(65000);

Serial_Out(0x1A);

Delay(65000);Delay(65000);Delay(65000);

// g_relay=0;

}

else

{

Lcd8_Write(0xcf,'N');

Lcd8_Display(0x80,"UNAUTHORIZED USR",16);

Lcd8_Display(0xc0,"",15);

56

Page 57: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Delay(65000);Delay(65000);

Lcd8_Display(0x80,"messagesending ",16);

Serial_Conout("AT+CMGS=\"8760494899\"\r",21);

Delay(65000);

Serial_Conout("UNAUTHORIZED USER\r",18);

Delay(65000);

Serial_Out(0x0D);

Delay(65000);Delay(65000);

Serial_Out(0x1A);

Delay(65000);Delay(65000);Delay(65000);

}

}

else

{

Lcd8_Display(0x80,"UNAUTHORIZED USR",16);

Lcd8_Display(0xc0," ",15);

Delay(65000);Delay(65000);

Lcd8_Display(0x80,"message sending",16);

Serial_Conout("AT+CMGS=\"9486144582\"\r",21);

Delay(65000);

Serial_Conout("INDRUTERDETECT\r",18);

Delay(65000);

57

Page 58: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Serial_Out(0x0D);

Delay(65000);Delay(65000);

Serial_Out(0x1A);

Delay(65000);Delay(65000);Delay(65000);

}

f_relay=0;

}

else if(data_rcv[33]==0x09)

{Lcd8_Display(0x80,"UNAUTHORIZED USR",16);

Lcd8_Display(0xc0," ",16);

// Delay(65000);Delay(65000);

Lcd8_Display(0xC0,"messagesending ",16);

}

/* else if(data_rcv[33]==0x24)

{

Lcd8_Display(0x80,"UNAUTHORIZED USR",16);

Lcd8_Display(0xc0,"",16);

// Delay(65000);Delay(65000);

Lcd8_Display(0xC0,"messagesending ",16);

} */

// Serial_Init(9600);

i=0;

58

Page 59: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

for(start=0;start<10;start++)

{

Delay(65000);

}

Lcd8_Command(0x01);

}

else if(i==3)

{

if(data_rcv[9]==0x00)

{

Lcd8_Display(0x80," Finger Id ",16);

Lcd8_Display(0xc0," Deleted ",16);

}

else if(data_rcv[9]==0x10)

{

Lcd8_Display(0x80,"Fail To delete ",16);

Lcd8_Display(0xc0," Finger Id ",16);

}

else if(data_rcv[9]==0x01)

{

Lcd8_Display(0x80,"Receiving ",16);

Lcd8_Display(0xc0," Error ",16);

}

i=0;

Delay(65000);Delay(65000);Delay(65000);

Lcd8_Command(0x01);

}

59

Page 60: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

else if(i==4)

{

if(data_rcv[9]==0x00)

{

Lcd8_Display(0x80," Finger id's ",16);

Lcd8_Display(0xc0," Deleted ",16);

kk=0;Delay(65000);

}

else if(data_rcv[9]==0x11)

{

Lcd8_Display(0x80,"Fail To delete ",16);

Lcd8_Display(0xc0,"Finger Id's ",16);

}

else if(data_rcv[9]==0x01)

{

Lcd8_Display(0x80,"Receiving ",16);

Lcd8_Display(0xc0," Error ",16);

}

i=0;

Delay(65000);Delay(65000);Delay(65000);

Lcd8_Command(0x01);

}

else if(i==5)

{

va=data_rcv[49]-data_rcv[47];

Lcd8_Decimal3(0xcA,va);

60

Page 61: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

Delay(65000);Delay(65000);

if(data_rcv[45]==0x00&&va==12)

{

Lcd8_Display(0x80,"Matching ",16);

Lcd8_Display(0xc0," Success ",16);

}

else if(va==13)

{

Lcd8_Display(0x80,"Receiving ",16);

Lcd8_Display(0xc0," Error ",16);

}

else

{

Lcd8_Display(0x80,"Matching ",16);

Lcd8_Display(0xc0," Not Success ",16);

} i=0;

Delay(65000);Delay(65000);Delay(65000);

Lcd8_Command(0x01);

}

Delay(65000);Delay(65000);Delay(65000);

down:;

}

61

Page 62: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

RESULT ANALYSIS AND VERIFICATION

The result which we expect from our project is that the vehicle will be ignitedonly when the authorized person scans his/her finger on the fingerprintmodule. The fingerprints of the authorized persons are stored in the fingerprintmodule. When any person put his/her finger on the fingerprint module then thedata of the placed finger is matched with the stored data in the module. If thefingerprint data is found in the module then match condition occurs and themicrocontroller ignites the vehicle otherwise vehicle will not start.

62

Page 63: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

CONCLUSION

Fingerprint identification enhances the security of a vehicle and makes it

possible only for some selected people to start the vehicle. The expected result

by implementing this model on the vehicle is that only the authorized person

will be able to ignite the vehicle. Not every person with the key will be able to

start the vehicle. There will be matching of the person’s data with the stored

one and only in the case of match the vehicle will start otherwise not. Thus by

implementing this relatively cheap and easily available system on a vehicle one

can ensure much greater security and exclusivity than that offered by a

conventional lock and key. The thief would have to do a great deal of

homework to steal the vehicle, and it is unlikely that they have the fingerprint

technology needed to fake your fingerprint.

63

Page 64: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

REFERENCES

[1] Omidiora E. O.(2011) “A Prototype of a Fingerprint Based Ignition

Systems in Vehicles” Published in European Journal of Scientific Research

ISSN 1450-216X Vol.62 No.2 (2011), pp. 164-171 © EuroJournals Publishing,

Inc. 2011 http://www.eurojournals.com/ejsr.htm

[2] Karthikeyan.a “ Fingerprint Based Ignition System” Published in

Karthikeyan.a, Sowndharya.j /International Journal Of Computational

Engineering Research / ISSN: 2250–3005

[3] Prashantkumar R.(2013) “Two Wheeler Vehicle Security System”

Published in International Journal of Engineering Sciences & Emerging

Technologies, Dec. 2013. ISSN: 2231 – 6604 Volume 6, Issue 3, pp: 324-334

©IJESET

[4] Visa M. Ibrahim “Microcontroller Based Anti-theft Security System Using

GSM Networks with Text Message as Feedback” Published in International

Journal of Engineering Research and Development e-ISSN: 2278-067X, p-

ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 10 (August 2012), PP. 18-

22

[5] Lin Hong. "Automatic Personal Identification Using Fingerprints", Ph.D.

Thesis, 1998.

64

Page 65: BIOMETRIC VEHICLE ACCESS SYSTEM USING …...fingerprint recognition locking system can provide better reliability than the traditional locks and also is cheaper and easy than the other

[6] Yang S. and Verbauwhede I. (2003) “A Secure Fingerprint Matching

Technique”, http://www.emsec.ee.ucla.edu./pdf/2003acm.pdf

[7] http://auto.howstuffworks.com/ignitionsystem.htm, “How Automobile

Ignition Systems Work “

[8] http://www.biometricinfo.org/fingerprintrecognition.htm,“Biometrics

Information Resource”

[9] http://www.crimtrac.gov.au/fingerprintanalysis.htm, “Fingerprint Analysis

– The Basics”

[10] R. K. Singh, “Crime in India 2011 - Statistics”, for National Crime

Records Bureau 2011.

65