An Inexpensive Security Authentication System
-
Upload
svsembedded -
Category
Documents
-
view
213 -
download
0
Transcript of An Inexpensive Security Authentication System
7/27/2019 An Inexpensive Security Authentication System
http://slidepdf.com/reader/full/an-inexpensive-security-authentication-system 1/5
An INEXPENSIVE SECURITY AUTHENTICATION SYSTEM
BASED ON A NOVEL FINGER PRINT-RECOGNITION
STRUCTURE
Abstract:
In modern world, many new techniques such as biometric recognition technique,
image processing technique, communication technique and so on, have been
integrated into car security systems. At the same time, the amount of accident of
cars still remains high, specially, lost. Traditional car security systems rely on
many sensors and cost a lot. When one car is really lost, no more feedback could
be valid to help people to find it back. Our project fulfils the need of car security so
as to prevent car thefts which is easier in case of car locking systems.
Problem statement:
• No information to the Owner if Car get Lost
• Traditional car security systems rely on many sensors and cost a lot
• Physical Key
• Alarm System
Proposed system:
In proposed system we introduce a low-cost framework for embedded car security
system, which consists of a finger print recognition system (FPRS), a GPS (Global
Positioning System) module, a GSM (Global System for Mobile Communications)
module and a control platform. The finger print detection technique to be applied
in car security system because this kind of technique is effective and fast, and one
alarm signal could be given to make an alarm or “call” the police and the host
soundlessly with the help of other modules in the system prototype. Experimental
7/27/2019 An Inexpensive Security Authentication System
http://slidepdf.com/reader/full/an-inexpensive-security-authentication-system 2/5
results illuminate the validity of this car security system, and it is also much
cheaper and ‘smarter’ than traditional ones.
Finger Print:
A fingerprint is an impression of the friction ridges found on the inner surface of a finger or a
thumb. Personal Safes are revolutionary locking storage cases that open with just the touch of
your finger. These products are designed as "access denial" secure storage for medications,
jewelry, weapons, documents, and other valuable or potentially harmful items.These utilize
fingerprint recognition technology to allow access to only those whose fingerprints you choose.
It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with
just the touch of a button. Stored fingerprints are retained even in the event of complete power
failure or battery drain. These eliminates the need for keeping track of keys or remembering a
combination password, or PIN. It can only be opened when an authorized user is present, since
there are no keys or combinations to be copied or stolen, or locks that can be picked.
GSM:
GSM (Global System for Mobile communications) is the technology that underpins most
of the world's mobile phone networks. The GSM platform is a hugely successful wireless
technology and an unprecedented story of global achievement and cooperation. GSM has
become the world's fastest growing communications technology of all time and the leading
global mobile standard, spanning 218 countries. GSM is an open, digital cellular technology used
for transmitting mobile voice and data services. GSM operates in the 900MHz and 1.8GHz bands
GSM supports data transfer speeds of up to 9.6 kbps, allowing the transmission of basic data
services such as SMS.
GPS:
GPS (Global Positioning System) technology is used to find the location of any object or
vehicle to monitor a child continuously using satellite signals. Three satellite signals are
necessary to locate the receiver in 3D space and fourth satellite is used for time accuracy.GPS
will give the information of parameters like longitude, latitude and attitude. With the help of
7/27/2019 An Inexpensive Security Authentication System
http://slidepdf.com/reader/full/an-inexpensive-security-authentication-system 3/5
these parameters one can easily locate the position of any object. In this GPS technology, the
communication takes place between GPS transceiver and GPS satellite.
Hardware requirements:
• Microcontroller
• Power supply
• Keypad section
• GSM module
•
Gps module• Ignition unit | Driver unit
• Rs232
• Max 232
Software requirements:
• Keil C cross compiler IDE
• Flash magic programmer tool
• Orcad hardware design tool
• Languages:
– Embedded C
Applications:
•
Security applications• Image processing applications
• Banking applications shopping ,
• Theatre applications
• Rowing races
• Personal identity apps
7/27/2019 An Inexpensive Security Authentication System
http://slidepdf.com/reader/full/an-inexpensive-security-authentication-system 4/5
POWER SUPPLY:
• •
BLOCK DIAGRAM:
Step Down
Transformer Bridge
Rectifier
Filter
Circuit
Regulator
section
FINGER
PRINT (FPRS)
GPS
ARM
PROCESSOR
LPC2148
CONTROLLER
POWER
SUPPLY 16X2 LCD DISPLAY
MAX232
GPS
RESET
CRYSTAL
GSM
MODEM
DRIVER
IC
BUZZER
GPS
DRIVER
IC
ENGINE
7/27/2019 An Inexpensive Security Authentication System
http://slidepdf.com/reader/full/an-inexpensive-security-authentication-system 5/5
RECEIVER SECTION: