smart vault ppt
TRANSCRIPT
Harsh Andharia-120110111016
Varun Jauhari-120110111018Vrunda Daiya-120110111034Jessica Desai-120110111056
SMART VAULT: An Automatic Strong Security System For 24X7 Access Of Lockers
Faculty Guide:Prof. Shankar K. Parmar
INTRODUCTION
AT A GLANCE
BLOCK DIAGRAM
FLOWCHART & ALGORITHM
CIRCUIT DIAGRAM & ITS DESCRIPTION
HARDWARE & ITS SPECIFICATIONS
DESIGNING PCB USING PROTEUS
PCB LAYOUT
CONCLUSION
REFERENCES
TABLE OF
CONTENTS
INTRODUCTION MOTIVATION OVERVIEW PROGRESS REPORT DESIGN
• New Delhi: ICICI Bank, launched the ‘Smart Vault’, a fully automated locker available 24x7, including weekends and post banking hours.
• The ‘Smart Vault’ uses robotic technology to access the lockers from the safe vault and enables customers to conveniently access their lockers at any time of their preference, in the comfort of a secure lounge where the locker automatically comes up to the customer.
• Customers can access the lockers in total privacy without any intervention of the branch staff. Located at New Delhi, the ‘Smart Vault’ is equipped with multi-layered security systems including biometric authentication, debit card & PIN authentication, unique dimple keys that are difficult to replicate, unbreakable lock system and the option of using additional personal lock as well.
• We named our project after our source of Motivation.
MOTIVATION
In this era, with the increase of wealth and valuable assets develops a need to protect it from being stolen or misplaced. To protect and place our belongings in a safe place is always what we desire. Through the years this has led to the development of vaults that are locked by locks that the greatest mind are not able to decode. But still there is a constant fear of our valuables being stolen.
The primary objective of our entire project is to develop a security system which the users can access at any time of the day or night. The security of the system is enhanced by using three tiers of security which includes the biometrics system which takes in the fingerprint of the user, the unique plastic card which each user of the security system possesses and a 4 digit password which may be uniquely set by the user on creating his/her account. Further, the system is made available 24x7 by totally automated security system which involves no human intervention.
OVERVIEW
PROGRESS CHART
Step 1• Duration: 7TH SEMESTER • DESIGNING & INTERFACING FINGERPRINT MODULE TO THE MICROCONTROLLER
Step 2
• Duration : FIRST HALF OF 8TH SEMESTER• INTERFACING LCD & KEYPAD TO PIC• INTERFACING EM18 RFID CARD READER MODULE.• ROTATING THE CAROUSEL
Step 3
• Duration: LATER HALF OF 8TH SEMESTER• INTERFACING IR SENSOR TO PIC • MOUNTING ON PRINTED CIRCUIT BOARD FROM GENERAL PURPOSE BOARD• INTEGRATING THE ELECTRONIC MODULE WITH THE MECHANICAL DESIGN
PROGRESS CHART
In need for strengthening the security system and in order to eliminate the disadvantages of the traditional vault system, we had to totally come up with an all-new design which incorporates three levels of the security system and a carousel which exposes only one vault at a time.
We designed our model in such a way that security is always considered our first priority. So to enhance the security system we incorporated three tiers of security level namely:
1. Fingerprint Module2. RFID Card Reader Module3. 4 digit password
DESIGN
When all the three levels of security are checked the vaults have to be placed at a fixed locations from where the users can assess their valuables. Various designs were considered to make this happen.
Robotic ArmConveyor BeltCircular rotating carousel
Fixed time intervalsFixed angles IR Sensors
DESIGN
AT A GLANCE…
BLOCK DIAGRAM…
FIRST LEVEL OF SECURITY INVOLVES THE USER TO SCAN
HIS/HER FINGER. UPON
BEING MATCHED GETS THE
ACCESS TO THE NEXT
LEVEL
SECOND LEVEL OF SECURITY
MAKES THE USER SWIPE A
PLASTIC CARD. USER
GETS TO ENTER THE NEXT LEVEL ONLY AFTER BOTH BEING MATCHED.
THIRD LEVEL OF SECURITY
IS TO ENTER 4 DIGIT
PASSWORD. IF ANY OF THE 3
SECURITY LEVELS FAIL, THE USER IS
ASKED TO LEAVE.
CAROUSEL ROTATES TO ALIGN THE DESIRED
VAULT AT THE WINDOW
FROM WHERE THE VAULT
CAN BE ACCESSED BY
THE USER.
FOR THE USER’S
CONVENIENCE, MANUAL
LOCK IS USED TO FURTHER
ENHANCE THE SAFETY OF
THE SYSTEM
FINALLY, AFTER
PASSING THROUGH
MANY CHECKS THE USER ACCESSES
ONE’S VALUABLES FROM THE
VAULT
FLOW CHART & ALGORITHM…
STEP 1: Start
STEP 2: Place the Finger
STEP 3: Go to Step 10 if the Fingerprint doesn’t match
STEP 4: Door opens
STEP 5: Swipe the Card
STEP 6: Go to Step 10 if the Card doesn’t match
STEP 7: Enter 4 digit PASSWORD
STEP 8: Go to Step 11 if password doesn’t match
STEP 9: Carousel locates the desired vault at the window using IR Sensor & user accesses the vault
STEP 10: EXIT
STEP 11: Is the number of trials <= 3? If YES Go to step 7, else GOTO Step 10
CIRCUIT DIAGRAM& ITS DESCRIPTION
CIRCUIT DIAGRAM DESCRIPTION
Crystal connections
Keypad interfacing
LCD interfacing
Fingerprint Interfacing
EM 18 RFID Interfacing
MOTOR Driver IC IR Sensor
• Ceramic capacitors C1 & C2 (both of 33pF) and crystal X1(12 MHz) is related to the clock circuitry which produces the system clock frequency
• The keys are connected in simple parallel manner.
• In order to save a few pins the keypad can also be connected in a matrix form of 5x2 or so.
• 10 Push button switches for 4 digit password (0-9) are connected to the D0, C0, C1,C2,C3,C4,D2,C5,C4,D3 & D1 bits of the microcontroller, configured as input pins.
• Each of these is connected to a pull up resistor such that this pin is at Vcc potential when the switch is not pressed.
• When the switch is pressed the pin it is connected to will be grounded.
• The resistor is connected in series with it to limit the current.
• The interface between this LCD and Microcontroller can be 8 bit or 4 bit.
• Since the 2X16 character LCD is connected in a 4 bit mode to the microcontroller, it makes use of only the lower 4 data lines i.e. D4, D5, D6 & D7 which are connected to B5, B4. B3 & B2 respectively. The RS (Register Select) & EN (Enable) bit of the LCD is connected to the B7 & B6 of the processor respectively.
• R/W pin is meant for selecting between read and write modes.
The fingerprint sensor is combination of R305 FP+PIC MCU board that can read different fingerprints and store in its own flash memory.
The sensor can perform three functions namely Add (Enroll), Empty Database or Search Database and return the ID of stored fingerprint. Any of three functions can be called simply by making the pin low of the sensor or pressing on-board three switches.
The response is either ERROR or OK which is indicated by on-board LED. The response is also returned as single serial data byte.
The return byte is a valid ID or error code. The response byte is a single byte at 9600 bps thus making whole sensor very easy to use.
There are 6 pins on the R305 Fingerprint Module namely GND, +5V, TX out, search, empty and add connected to the pins GND,+5V, one of the inputs to one of the OR gate, D4, D5 & D6 of the microcontroller respectively.
Types of functions performed by R305 module
Add (Enrol) Function: Adds a fingerprint to
database and return a byte of newly added ID. Return values are from
0x00 to 0xFE. In case of error like no finger
placed, return code is 0xFF. Here 0xFF means error executing function
Search Function: When a finger is put and search function is called, it returns a matching ID if found in its existing
memory. Return values are from 0x00 to 0xFE. In case of error like no finger placed, return
code is 0xFF. Here 0xFF means error executing
function.
Empty Function: When you wish to empty all fingerprint data stored on sensor you can use
this function. After executing this function,
you will get 0xCC as OK or 0xFF in case of error
The EM-18 RFID Reader module generates and radiates RF Carrier Signals of frequency 125 KHz through its coils. When a 125 KHz Passive RFID
Tag (has no battery) is brought in to this field, gets energized from it. These RFID Tags are usually made using a CMOS IC EM4102. It gets enough
power and master clock for its operations from the electromagnetic fields produced by RFID Reader. By changing the modulation current through the
coils, tag will send back the information contained in the factory programmed memory array.
EM-18 RFID Reader Module can be directly interfaced with 5V PIC Microcontrollers using UART module When a
RFID Tag is bring in to the field of EM-18 RFID
Reader, it will read its tag number and give output
via TX terminal. The BEEP terminal will become LOW
to indicate valid tag detection.
The UART output will be 12 ASCII data, among
these first 10 will be tag number and last 2 will be
XOR result of the tag number which can be used for error testing.
For eg : If the RFID tag number is 500097892E, output of EM-18 Reader will be 500097892E60 where 60 is 50 xor 00 xor 97
xor 89 xor 2E.
There are 3 pins of the EM18 RFID Module namely GND, +5V & TX output which are connected to ground, Vcc and one of the
inputs to other OR gate.
Two OR gates and one AND gate is used to sync the system in such a way that the user gets access if BOTH the fingerprint and the
RFID card matches and also because there is just one RX pin. The Fingerprint Select pin is
E0 and the RFID Select pin is the A5 pin of the PIC. The TX of both the FP & RF are fed as
one of the inputs of the OR gate and the other input is the respective Select pin. The output of
the two OR gate is combined using an AND gate and the output of the AND gate is fed to
the RX (C7) pin of the Microcontroller.
Internally the L298N consists of four independent power amps with 5-volt digital inputs and four high current, high voltage power amplifiers capable of driving single DC motors, and both unipolar and bi-polar stepper motors. The four amplifiers are usually used in pairs forming an H-bridge to switch polarity for to control the direction of a single DC motor or as two pairs of H-bridges a bi-polar stepper motor.
The four power amplifiers and grouped in pairs of two with individual enable pins (ENA, ENB) and individual current sense pins (SENSA, SENSB) for each pair. The current sense pins in general can be tied to ground, but can be inserted a low value resistor, whose voltage reading is proportional to current. ENA, ENB, and In1-In4 are all standard 5-volt TTL logic making connection to most micro-controllers easy. ENA will turn on A1 and A2 when with a digital HIGH (5-volts) and off when LOW (0 volts); the corresponding outputs will be floating when off. Same is true of ENB, In3 and In4. ENA and ENB can be connected directly together to enable both channels at once or simply tied to +5 volts and both channels making all four outputs active at all times. A 5-volt TTL level input to In1, In2 In3, or In4 will produce a corresponding output of Vm (motor voltage) minus about a volt.
The output is used to drive a single motor. An additional motor can also be added to the same module.
IR Sensor
An infrared sensor is an electronic instrument which is
used to sense certain characteristics of its surroundings
by either emitting and/or detecting infrared radiation. Infrared sensors are also
capable of measuring the heat being emitted by an object and
detecting motion
The output is fed to the D7 bit of PIC MC.
HARDWARE & ITS DESCRIPTION
o MICROCONTROLLER- PIC 16F877Ao R305 FINGERPRINT MODULEo EM 18 RFID CARD READER MODULEo GEAR MOTOR
MICROCONTROLLER- PIC 16F877A
Advantages of PIC:
It is a RISC design
Its code is extremely efficient, allowing the PIC to run with typically less
program memory than its larger competitors
It is low cost, high clock speed
PIC is a peripheral interface controller, developed by general instrument’s microelectronics, in the
year of 1993.
PIN DIAGRAM OF PIC 16F877A
Features of PIC16F877:
High-performance
RISC CPU
Up to 8K x 14 words of FLASH
program memory
35 Instructions (fixed length
encoding-14-bit)
368×8 static RAM based data
memory
Up to 256 x 8 bytes of
EEPROM data memory
Interrupt capability (up to
14 sources)
Three addressing
modes (direct, indirect, relative)
Power-on reset (POR)
Harvard architecture
memoryPower saving SLEEP mode
Wide operating voltage range:
2.0V to 5.5V
High sink / source current:
25mA
Accumulator based machine
CORE FEATURES
3 Timer/counters (programmable pre-scalars)• Timer0, Timer2 are 8-bit timer/counter with 8-bit pre-scalar• Timer1 is 16-bit, can be incremented during sleep via external crystal/clock
Two capture, compare, PWM modules• Input capture function records the Timer1 count on a pin transition• A PWM function output is a square wave with a programmable period and duty cycle.
10-bit 8 channel analog-to-digital converter
USART with 9-bit address detection
Synchronous serial port with master mode and I2C Master/Slave
8-bit parallel slave port
PERIPHERAL FEATURES:
10-bit, up to 8-channel Analog-to-Digital Converter (A/D)
Brown-out Reset (BOR)
Analog Comparator module (Programmable input multiplexing from device inputs and comparator outputs are externally accessible)
ANALOG FEATURES
R305 FINGERPRINT MODULE
Ope
ratio
n P
rinci
ple:
Fingerprint processing includes two parts: fingerprint enrollment and fingerprint matching (the matching can be 1:1 or 1:N).
When enrolling, user needs to enter the finger two times. The system will process the two time finger images, generate a template of the finger based on processing results and store the template. When matching, user enters the finger through optical sensor and system will generate a template of the finger and compare it with templates of the finger library. For 1:1 matching, system will compare the live finger with specific template designated in the Module; for 1:N matching, or searching, system will search the whole finger library for the matching finger. In both circumstances, system will return the matching result, success or failure
Features of R305 Fingerprint Module:
EM 18 RFID CARD READER MODULE
Serial and TTL output.
Along with two RFID cards.
Excellent read performance without an external circuit
Compact size and cost-effective.
Applications
Access control
Handheld readers
This is a low frequency (125 KHz) RFID reader with serial output
having a range of 8-12cm. It is a compact units with built in antenna and can be directly connected to
the PC using RS232 protocol.
FEATURES
TYPES OF RFID
Many types of RFID exist, but at the highest level, we can divide RFID devices into two classes: active and passive.
Active tags require a power source they’re either connected to a powered infrastructure or use energy stored in an integrated battery.
In the latter case, a tag’s lifetime is limited by the stored energy, balanced against the number of read operations the device must undergo.
One example of an active tag is the transponder attached to an aircraft that identifies its national origin.However, batteries make the cost, size, and life-time of active tags impractical for the retail trade.
Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label.
A passive tag consists of three parts: an antenna, a semiconductor chip attached to the antenna, and some form of encapsulation. The tag reader is responsible for powering and communicating with a tag. The tag antenna captures energy and transfers the tag’s ID (the tag’s chip coordinates this process).
The encapsulation maintains the tag’s integrity and protects the antenna and chip from environmental conditions or reagents. The encapsulation could be a small glass vial or a laminar plastic substrate with adhesive on one side to enable easy attachment to goods.
GEAR MOTOR
Rated Voltage: DC24V;
Rated Current: 0.5 A;
Output Speed: 3.5RPM
Shaft Diameter: 6mm / 0.23";
Reduction Ratio: 1:2160
Power: 12W
DC Motor Diameter: 32mm / 1.26" ;
Total Length(Approx.): 72mm /2.8“
Weight: 149g
SPECIFICATIONS
DESIGNING PCB USING PROTEUS
Install Proteu
s
Proteus ISIS:Open the ‘ISIS Professional’ from PROTEUS. This is the
application where the simulations
of the circuits can be tested.Layout is the final design which is needed in order to make the PCB of a circuit. To make the schematic, first we must have
its raw design.
Proteus ARES: ‘ARES Professional’
will open automatically once the previous step is
done. This is the application where the final layout will
be made.
Making PCB layout includes four step procedure :• Making Schematic in ARES• ROUTING• POWER PLANE
GENERATION• MAKING PCB
STEPS…
PCB LAYOUT…
ACCOMPLISHMENTSo FUTURE SCOPEo LEARNING OUTCOMESo CONCLUSION
FUTURE SCOPE
Including a GPS module to inform the users about any access.
Informing of a theft to both the user and police if any security level fails.
Extending the same design to access more number of vaults.
Increasing the number of SECURITY levels e.g. Face Recognition.
Redesigning to include a conveyor belt.
Load bearing capacity and the design of the carousel can be further modified pertaining to its usage.
LEARNING OUTCOMES
• Practical approach to be adopted for all the theory learned till date.
• The interdependence of various branches of engineering on each other.
• Decision about buying various components based on a lot of Research work and gathering details about it prior to it.
• Proper planning of deadlines and executing the same in a group together.
• Having a backup plan when things fail
LEARNINGS THAT WE TAKE WITH US:
With the advent of modern techniques in every domain of life, the needs and demands to life a luxurious, hassle-free and safe life increases.
People are always in a need to store their valuables in a safer and anytime accessible
place.
The primary objective of the project carried out was to enhance the security level of the vault system and can be accessible 24x7. This was achieved by involving three levels of security
system namely the fingerprint module, the plastic card and 4 digit password. The system was totally automated by using a mechanically
driven and programmed using a microcontroller and IR sensor to stop the
desired vault at the fixed vault position. This in a way requires no human intervention hence making the system accessible to the users
beyond the regular bank hours.
The entire project didn’t work in the pre-planned way and required quite a lot of changes ranging from the design to the
selection of various components. But with vigorous efforts and dedicated work of
all the members of the team the desired objective and an exact prototype was
successfully achieved.
CONCLUSION
REFERENCES… http://www.nxp.com/documents/data_sheet/MFRC522
https://en.wikipedia.org/wiki/
https://patents.google.com/
http://www.ijcse.com/docs/INDJCSE12-03-06-058
http://onin.com/fp/Recently_Published_FP_Research_presentation_IAI_Aug_2014
http://ai.pku.edu.cn/aiwebsite/research.files/
http://www.ijarcsse.com/
http://www.cvauni.edu.vn/
https://electrosome.com/matrix-keypad-pic-microcontroller/
https://electrosome.com/interfacing-lcd-with-pic-microcontroller-hi-tech-c/
PIC 16f877a Datasheet EM18 Datasheet R305 Datasheet International Journal for Advanced Science and Technology