SlideShare a Scribd company logo
Harsh Andharia-120110111016
Varun Jauhari-120110111018
Vrunda Daiya-120110111034
Jessica Desai-120110111056
SMART VAULT: An Automatic Strong Security System For
24X7 Access Of Lockers
Faculty Guide:
Prof. Shankar K. Parmar
TABLE
OF
CONTENTS
INTRODUCTION
 MOTIVATION
 OVERVIEW
 PROGRESS REPORT
 DESIGN
• New Delhi: ICICI Bank, launched the ‘Smart Vault’, a fully automated locker
available 24x7, including weekends and post banking hours.
• The ‘Smart Vault’ uses robotic technology to access the lockers from the safe
vault and enables customers to conveniently access their lockers at any time
of their preference, in the comfort of a secure lounge where the locker
automatically comes up to the customer.
• Customers can access the lockers in total privacy without any intervention of
the branch staff. Located at New Delhi, the ‘Smart Vault’ is equipped with multi-
layered security systems including biometric authentication, debit card & PIN
authentication, unique dimple keys that are difficult to replicate, unbreakable
lock system and the option of using additional personal lock as well.
• We named our project after our source of Motivation.
MOTIVATION
 In this era, with the increase of wealth and valuable assets develops a need to protect
it from being stolen or misplaced. To protect and place our belongings in a safe place is
always what we desire. Through the years this has led to the development of vaults
that are locked by locks that the greatest mind are not able to decode. But still there is
a constant fear of our valuables being stolen.
 The primary objective of our entire project is to develop a security system which the
users can access at any time of the day or night. The security of the system is enhanced
by using three tiers of security which includes the biometrics system which takes in the
fingerprint of the user, the unique plastic card which each user of the security system
possesses and a 4 digit password which may be uniquely set by the user on creating
his/her account. Further, the system is made available 24x7 by totally automated
security system which involves no human intervention.
OVERVIEW
PROGRESS CHART
Step 1
• Duration: 7TH SEMESTER
• DESIGNING & INTERFACING FINGERPRINT MODULE TO THE MICROCONTROLLER
Step 2
• Duration : FIRST HALF OF 8TH SEMESTER
• INTERFACING LCD & KEYPAD TO PIC
• INTERFACING EM18 RFID CARD READER MODULE.
• ROTATING THE CAROUSEL
Step 3
• Duration: LATER HALF OF 8TH SEMESTER
• INTERFACING IR SENSOR TO PIC
• MOUNTING ON PRINTED CIRCUIT BOARD FROM GENERAL PURPOSE BOARD
• INTEGRATING THE ELECTRONIC MODULE WITH THE MECHANICAL DESIGN
PROGRESS CHART
 In need for strengthening the security system and in order to eliminate the
disadvantages of the traditional vault system, we had to totally come up with an all-
new design which incorporates three levels of the security system and a carousel
which exposes only one vault at a time.
 We designed our model in such a way that security is always considered our first
priority. So to enhance the security system we incorporated three tiers of security
level namely:
1. Fingerprint Module
2. RFID Card Reader Module
3. 4 digit password
DESIGN
 When all the three levels of security are checked the vaults have to be placed at a fixed
locations from where the users can assess their valuables. Various designs were considered
to make this happen.
Robotic Arm
Conveyor Belt
Circular rotating carousel
 Fixed time intervals
Fixed angles
 IR Sensors
DESIGN
AT A GLANCE…
Smart vault ppt
BLOCK DIAGRAM…
Smart vault ppt
FIRST LEVEL OF
SECURITY
INVOLVES THE
USER TO SCAN
HIS/HER
FINGER. UPON
BEING
MATCHED GETS
THE ACCESS TO
THE NEXT
LEVEL
SECOND LEVEL
OF SECURITY
MAKES THE
USER SWIPE A
PLASTIC CARD.
USER GETS TO
ENTER THE
NEXT LEVEL
ONLY AFTER
BOTH BEING
MATCHED.
THIRD LEVEL
OF SECURITY IS
TO ENTER 4
DIGIT
PASSWORD. IF
ANY OF THE 3
SECURITY
LEVELS FAIL,
THE USER IS
ASKED TO
LEAVE.
CAROUSEL
ROTATES TO
ALIGN THE
DESIRED VAULT
AT THE
WINDOW FROM
WHERE THE
VAULT CAN BE
ACCESSED BY
THE USER.
FOR THE
USER’S
CONVENIENCE,
MANUAL LOCK
IS USED TO
FURTHER
ENHANCE THE
SAFETY OF THE
SYSTEM
FINALLY, AFTER
PASSING
THROUGH
MANY CHECKS
THE USER
ACCESSES
ONE’S
VALUABLES
FROM THE
VAULT
FLOW CHART &
ALGORITHM…
STEP 1: Start
STEP 2: Place the Finger
STEP 3: Go to Step 10 if the Fingerprint doesn’t match
STEP 4: Door opens
STEP 5: Swipe the Card
STEP 6: Go to Step 10 if the Card doesn’t match
STEP 7: Enter 4 digit PASSWORD
STEP 8: Go to Step 11 if password doesn’t match
STEP 9: Carousel locates the desired vault at the window
using IR Sensor & user accesses the vault
STEP 10: EXIT
STEP 11: Is the number of trials <= 3? If YES Go to step 7,
else GOTO Step 10
CIRCUIT DIAGRAM
& ITS DESCRIPTION
Smart vault ppt
CIRCUIT DIAGRAM DESCRIPTION
Crystal
connections
Keypad
interfacing
LCD
interfacing
Fingerprint
Interfacing
EM 18 RFID
Interfacing
MOTOR
Driver IC
IR Sensor
• Ceramic capacitors C1 & C2
(both of 33pF) and crystal
X1(12 MHz) is related to the
clock circuitry which
produces the system clock
frequency
• The keys are connected in simple parallel
manner.
• In order to save a few pins the keypad can
also be connected in a matrix form of 5x2 or
so.
• 10 Push button switches for 4 digit password
(0-9) are connected to the D0, C0,
C1,C2,C3,C4,D2,C5,C4,D3 & D1 bits of the
microcontroller, configured as input pins.
• Each of these is connected to a pull up
resistor such that this pin is at Vcc potential
when the switch is not pressed.
• When the switch is pressed the pin it is
connected to will be grounded.
• The resistor is connected in series with it to
limit the current.
• The interface between this LCD and
Microcontroller can be 8 bit or 4 bit.
• Since the 2X16 character LCD is
connected in a 4 bit mode to the
microcontroller, it makes use of only the
lower 4 data lines i.e. D4, D5, D6 & D7
which are connected to B5, B4. B3 & B2
respectively. The RS (Register Select) &
EN (Enable) bit of the LCD is connected to
the B7 & B6 of the processor
respectively.
• R/W pin is meant for selecting between
read and write modes.
 The fingerprint sensor is combination of R305 FP+PIC MCU board that can read different
fingerprints and store in its own flash memory.
 The sensor can perform three functions namely Add (Enroll), Empty Database or Search
Database and return the ID of stored fingerprint. Any of three functions can be called
simply by making the pin low of the sensor or pressing on-board three switches.
 The response is either ERROR or OK which is indicated by on-board LED. The response is
also returned as single serial data byte.
 The return byte is a valid ID or error code. The response byte is a single byte at 9600 bps
thus making whole sensor very easy to use.
 There are 6 pins on the R305 Fingerprint Module namely GND, +5V, TX out, search, empty
and add connected to the pins GND,+5V, one of the inputs to one of the OR gate, D4, D5 &
D6 of the microcontroller respectively.
Types of functions performed by R305 module
Add (Enrol) Function:
Adds a fingerprint to
database and return a
byte of newly added ID.
Return values are from
0x00 to 0xFE. In case of
error like no finger
placed, return code is
0xFF. Here 0xFF means
error executing function
Search Function: When
a finger is put and
search function is called,
it returns a matching ID
if found in its existing
memory. Return values
are from 0x00 to 0xFE.
In case of error like no
finger placed, return
code is 0xFF. Here 0xFF
means error executing
function.
Empty Function: When
you wish to empty all
fingerprint data stored
on sensor you can use
this function. After
executing this function,
you will get 0xCC as OK
or 0xFF in case of error
The EM-18 RFID Reader module generates and
radiates RF Carrier Signals of frequency 125 KHz
through its coils. When a 125 KHz Passive RFID
Tag (has no battery) is brought in to this field, gets
energized from it. These RFID Tags are usually
made using a CMOS IC EM4102. It gets enough
power and master clock for its operations from the
electromagnetic fields produced by RFID Reader.
By changing the modulation current through the
coils, tag will send back the information contained
in the factory programmed memory array.
EM-18 RFID Reader
Module can be directly
interfaced with 5V PIC
Microcontrollers using
UART module When a
RFID Tag is bring in to the
field of EM-18 RFID
Reader, it will read its tag
number and give output
via TX terminal. The BEEP
terminal will become LOW
to indicate valid tag
detection.
The UART output will be
12 ASCII data, among
these first 10 will be tag
number and last 2 will be
XOR result of the tag
number which can be
used for error testing.
For eg : If the RFID tag number is 500097892E, output of EM-
18 Reader will be 500097892E60 where 60 is 50 xor 00 xor 97
xor 89 xor 2E.
There are 3 pins of the EM18 RFID Module
namely GND, +5V & TX output which are
connected to ground, Vcc and one of the
inputs to other OR gate.
Two OR gates and one AND gate is used to
sync the system in such a way that the user
gets access if BOTH the fingerprint and the
RFID card matches and also because there is
just one RX pin. The Fingerprint Select pin is
E0 and the RFID Select pin is the A5 pin of the
PIC. The TX of both the FP & RF are fed as
one of the inputs of the OR gate and the other
input is the respective Select pin. The output of
the two OR gate is combined using an AND
gate and the output of the AND gate is fed to
the RX (C7) pin of the Microcontroller.
Internally the L298N consists of four independent power amps with 5-volt digital inputs and four high current, high
voltage power amplifiers capable of driving single DC motors, and both unipolar and bi-polar stepper motors. The
four amplifiers are usually used in pairs forming an H-bridge to switch polarity for to control the direction of a single
DC motor or as two pairs of H-bridges a bi-polar stepper motor.
The four power amplifiers and grouped in pairs of two with individual enable pins (ENA, ENB) and individual
current sense pins (SENSA, SENSB) for each pair. The current sense pins in general can be tied to ground, but
can be inserted a low value resistor, whose voltage reading is proportional to current. ENA, ENB, and In1-In4
are all standard 5-volt TTL logic making connection to most micro-controllers easy. ENA will turn on A1 and A2
when with a digital HIGH (5-volts) and off when LOW (0 volts); the corresponding outputs will be floating when
off. Same is true of ENB, In3 and In4. ENA and ENB can be connected directly together to enable both channels
at once or simply tied to +5 volts and both channels making all four outputs active at all times. A 5-volt TTL level
input to In1, In2 In3, or In4 will produce a corresponding output of Vm (motor voltage) minus about a volt.
The output is used to drive a single motor. An additional motor can also be added to the same module.
IR Sensor
An infrared sensor is an
electronic instrument which is
used to sense certain
characteristics of its surroundings
by either emitting and/or
detecting infrared radiation.
Infrared sensors are also
capable of measuring the heat
being emitted by an object and
detecting motion
The output is fed to the
D7 bit of PIC MC.
HARDWARE
& ITS DESCRIPTION
o MICROCONTROLLER- PIC 16F877A
o R305 FINGERPRINT MODULE
o EM 18 RFID CARD READER MODULE
o GEAR MOTOR
Smart vault ppt
MICROCONTROLLER- PIC 16F877A
Advantages of PIC:
It is a RISC design
Its code is extremely
efficient, allowing the PIC
to run with typically less
program memory than its
larger competitors
It is low cost, high clock
speed
PIC is a peripheral interface controller, developed
by general instrument’s microelectronics, in the
year of 1993.
PIN DIAGRAM OF PIC 16F877A
Features of PIC16F877:
High-
performance
RISC CPU
Up to 8K x 14
words of FLASH
program
memory
35 Instructions
(fixed length
encoding-14-bit)
368×8 static
RAM based data
memory
Up to 256 x 8
bytes of
EEPROM data
memory
Interrupt
capability (up to
14 sources)
Three
addressing
modes (direct,
indirect, relative)
Power-on reset
(POR)
Harvard
architecture
memory
Power saving
SLEEP mode
Wide operating
voltage range:
2.0V to 5.5V
High sink /
source current:
25mA
Accumulator
based machine
CORE
FEATURES
3 Timer/counters (programmable pre-scalars)
• Timer0, Timer2 are 8-bit timer/counter with 8-bit pre-scalar
• Timer1 is 16-bit, can be incremented during sleep via external crystal/clock
Two capture, compare, PWM modules
• Input capture function records the Timer1 count on a pin transition
• A PWM function output is a square wave with a programmable period and duty cycle.
10-bit 8 channel analog-to-digital converter
USART with 9-bit address detection
Synchronous serial port with master mode and I2C Master/Slave
8-bit parallel slave port
PERIPHERAL FEATURES:
10-bit, up to 8-channel Analog-to-Digital Converter (A/D)
Brown-out Reset (BOR)
Analog Comparator module (Programmable input
multiplexing from device inputs and comparator outputs
are externally accessible)
ANALOG FEATURES
R305 FINGERPRINT MODULEOperation
Principle: Fingerprint processing includes two parts: fingerprint
enrollment and fingerprint matching (the matching can
be 1:1 or 1:N).
When enrolling, user needs to enter the finger two times.
The system will process the two time finger images,
generate a template of the finger based on processing
results and store the template. When matching, user
enters the finger through optical sensor and system will
generate a template of the finger and compare it with
templates of the finger library. For 1:1 matching, system
will compare the live finger with specific template
designated in the Module; for 1:N matching, or searching,
system will search the whole finger library for the
matching finger. In both circumstances, system will return
the matching result, success or failure
Features of R305 Fingerprint Module:
EM 18 RFID CARD READER MODULE
Serial and TTL output.
Along with two RFID cards.
Excellent read performance without an external circuit
Compact size and cost-effective.
Applications
Access control
Handheld readers
This is a low frequency (125 KHz)
RFID reader with serial output
having a range of 8-12cm. It is a
compact units with built in antenna
and can be directly connected to
the PC using RS232 protocol.
FEATURES
TYPES OF RFID
Many types of RFID exist, but at the highest level, we can divide RFID devices into two classes: active and passive.
Active tags require a power source they’re either connected to a powered infrastructure or use energy stored in an
integrated battery.
In the latter case, a tag’s lifetime is limited by the stored energy, balanced against the number of read operations the
device must undergo.
One example of an active tag is the transponder attached to an aircraft that identifies its national origin.However,
batteries make the cost, size, and life-time of active tags impractical for the retail trade.
Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags also have an indefinite
operational life and are small enough to fit into a practical adhesive label.
A passive tag consists of three parts: an antenna, a semiconductor chip attached to the antenna, and some form of
encapsulation. The tag reader is responsible for powering and communicating with a tag. The tag antenna captures
energy and transfers the tag’s ID (the tag’s chip coordinates this process).
The encapsulation maintains the tag’s integrity and protects the antenna and chip from environmental conditions or
reagents. The encapsulation could be a small glass vial or a laminar plastic substrate with adhesive on one side to
enable easy attachment to goods.
GEAR MOTOR
Rated Voltage: DC24V;
Rated Current: 0.5 A;
Output Speed: 3.5RPM
Shaft Diameter: 6mm / 0.23";
Reduction Ratio: 1:2160
Power: 12W
DC Motor Diameter: 32mm / 1.26" ;
Total Length(Approx.): 72mm /2.8“
Weight: 149g
SPECIFICATIONS
DESIGNING PCB USING
PROTEUS
Install
Proteus
Proteus ISIS:
Open the ‘ISIS Professional’ from
PROTEUS. This is the application
where the simulations
of the circuits can be tested.
Layout is the final design which
is needed in order to make the
PCB of a circuit. To make the
schematic, first we must have its
raw design.
Proteus ARES:
‘ARES Professional’
will open
automatically once
the previous step is
done. This is the
application where
the final layout will
be made.
Making PCB layout
includes four step
procedure :
• Making Schematic in ARES
• ROUTING
• POWER PLANE
GENERATION
• MAKING PCB
STEPS…
PCB LAYOUT…
Smart vault ppt
o FUTURE SCOPE
o LEARNING OUTCOMES
o CONCLUSION
Including a GPS module to inform the users about any access.
Informing of a theft to both the user and police if any security level fails.
Extending the same design to access more number of vaults.
Increasing the number of SECURITY levels e.g. Face Recognition.
Redesigning to include a conveyor belt.
Load bearing capacity and the design of the carousel can be further modified pertaining to its usage.
• Practical approach to be adopted for all the theory learned till
date.
• The interdependence of various branches of engineering on
each other.
• Decision about buying various components based on a lot of
Research work and gathering details about it prior to it.
• Proper planning of deadlines and executing the same in a
group together.
• Having a backup plan when things fail
LEARNINGS THAT WE TAKE WITH US:
With the advent of modern techniques in
every domain of life, the needs and
demands to life a luxurious, hassle-free and
safe life increases. People are always in a
need to store their valuables in a safer and
anytime accessible place.
The primary objective of the project carried
out was to enhance the security level of the
vault system and can be accessible 24x7.
This was achieved by involving three levels
of security system namely the fingerprint
module, the plastic card and 4 digit
password. The system was totally
automated by using a mechanically driven
and programmed using a microcontroller
and IR sensor to stop the desired vault at
the fixed vault position. This in a way
requires no human intervention hence
making the system accessible to the users
beyond the regular bank hours.
The entire project didn’t work in the pre-
planned way and required quite a lot of
changes ranging from the design to the
selection of various components.
But with vigorous efforts and dedicated work
of all the members of the team the desired
objective and an exact prototype was
successfully achieved.
 http://www.nxp.com/documents/data_sheet/MFRC522
 https://en.wikipedia.org/wiki/
 https://patents.google.com/
 http://www.ijcse.com/docs/INDJCSE12-03-06-058
 http://onin.com/fp/Recently_Published_FP_Research_presentation_IAI_Aug_2014
 http://ai.pku.edu.cn/aiwebsite/research.files/
 http://www.ijarcsse.com/
 http://www.cvauni.edu.vn/
 https://electrosome.com/matrix-keypad-pic-microcontroller/
 https://electrosome.com/interfacing-lcd-with-pic-microcontroller-hi-tech-c/
 PIC 16f877a Datasheet
 EM18 Datasheet
 R305 Datasheet
 International Journal for Advanced Science and Technology
Smart vault ppt

More Related Content

PPTX
Autosar MCAL (Microcontroller Abstraction Layer)
PPTX
Embedded Systems - Training ppt
PPTX
KWP 2000 and UDS Protocols | Analysis & Comparison
PPTX
What is AUTOSAR Communiation Stack
PDF
Can Protocol For Automobiles
PPTX
Intel i7 Technologies
PDF
AUTOSAR_EXP_LayeredSoftwareArchitecture.pdf
PPTX
GSM Based Fault Monitoring System (Project)
Autosar MCAL (Microcontroller Abstraction Layer)
Embedded Systems - Training ppt
KWP 2000 and UDS Protocols | Analysis & Comparison
What is AUTOSAR Communiation Stack
Can Protocol For Automobiles
Intel i7 Technologies
AUTOSAR_EXP_LayeredSoftwareArchitecture.pdf
GSM Based Fault Monitoring System (Project)

What's hot (20)

PPTX
MICROPROCESSOR BASED SUN TRACKING SOLAR PANEL SYSTEM TO MAXIMIZE ENERGY GENER...
PDF
Alcohol Detection System in Vehicle using Arduino
PPTX
ACCIDENT PREVENTION AND DETECTION SYSTEM
DOCX
AUTOMATIC HEAD LIGHT DIMMERS
PPTX
436198511-AUTOSAR-Methodology-Overview.pptx
PDF
System On Chip
DOCX
ARDUINO EMBEDDED SYSTEM
PPTX
Communication stack
PDF
Full custom Ic design Implementation of low power priority encoder
PPTX
Bluetooth controlled home appliances
PPTX
gsm based security system
PPTX
Drink and Drive Alcohol Detection
PPTX
7 benefits of noc services
PDF
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
DOCX
Hardware-Software Codesign
PPTX
Embedded systems
PPTX
Arduino uno
PPTX
2 x4 decoder using switch level(Alok singh kanpur)
PPTX
Embedded System
PPTX
Automatic Night Lamp With Morning Alarm
MICROPROCESSOR BASED SUN TRACKING SOLAR PANEL SYSTEM TO MAXIMIZE ENERGY GENER...
Alcohol Detection System in Vehicle using Arduino
ACCIDENT PREVENTION AND DETECTION SYSTEM
AUTOMATIC HEAD LIGHT DIMMERS
436198511-AUTOSAR-Methodology-Overview.pptx
System On Chip
ARDUINO EMBEDDED SYSTEM
Communication stack
Full custom Ic design Implementation of low power priority encoder
Bluetooth controlled home appliances
gsm based security system
Drink and Drive Alcohol Detection
7 benefits of noc services
What is AUTOSAR Communication Stack (ComStack)?Get introduced to CAN ComStack
Hardware-Software Codesign
Embedded systems
Arduino uno
2 x4 decoder using switch level(Alok singh kanpur)
Embedded System
Automatic Night Lamp With Morning Alarm
Ad

Similar to Smart vault ppt (20)

PDF
IRJET- Smart Vehicle Security System using Finger Print Sensor
PDF
Intellectual Bank Locker Security System
PDF
Intellectual Bank Locker Security System
PPTX
RTOS based Confidential Area Security System
PDF
Biometric smart card polling system12
PPTX
Paperless ticket system
PPTX
ppt.pptx
DOC
Finger print based bank locker system
DOC
Finger print based bank locker system
PPTX
Tamper Detection & Discrimination in Passive RFID Systems using Steganography
DOC
Finger print based bank locker system
PPTX
RFID BASED VEHICLE TRACKING SYSTEM
PPTX
RFID BASED SMART CARD READER
PPT
Biometrics Technology1
DOC
Finger print based security system
DOCX
Design Documents (4)
PDF
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
PDF
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
PDF
Electronic Door Lock using RFID and Password Based on Arduino
PPTX
Fingerprint base security system
IRJET- Smart Vehicle Security System using Finger Print Sensor
Intellectual Bank Locker Security System
Intellectual Bank Locker Security System
RTOS based Confidential Area Security System
Biometric smart card polling system12
Paperless ticket system
ppt.pptx
Finger print based bank locker system
Finger print based bank locker system
Tamper Detection & Discrimination in Passive RFID Systems using Steganography
Finger print based bank locker system
RFID BASED VEHICLE TRACKING SYSTEM
RFID BASED SMART CARD READER
Biometrics Technology1
Finger print based security system
Design Documents (4)
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
REAL TIME FACE DETECTING UNAUTHORIZED HUMAN MOVEMENT USING ESP 32 CAM MODULE
Electronic Door Lock using RFID and Password Based on Arduino
Fingerprint base security system
Ad

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PPTX
Sustainable Sites - Green Building Construction
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Digital Logic Computer Design lecture notes
PDF
PPT on Performance Review to get promotions
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
PPTX
web development for engineering and engineering
PDF
Well-logging-methods_new................
Welding lecture in detail for understanding
Sustainable Sites - Green Building Construction
CH1 Production IntroductoryConcepts.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
additive manufacturing of ss316l using mig welding
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)
R24 SURVEYING LAB MANUAL for civil enggi
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Geodesy 1.pptx...............................................
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Digital Logic Computer Design lecture notes
PPT on Performance Review to get promotions
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
CYBER-CRIMES AND SECURITY A guide to understanding
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
web development for engineering and engineering
Well-logging-methods_new................

Smart vault ppt

  • 1. Harsh Andharia-120110111016 Varun Jauhari-120110111018 Vrunda Daiya-120110111034 Jessica Desai-120110111056 SMART VAULT: An Automatic Strong Security System For 24X7 Access Of Lockers Faculty Guide: Prof. Shankar K. Parmar
  • 3. INTRODUCTION  MOTIVATION  OVERVIEW  PROGRESS REPORT  DESIGN
  • 4. • New Delhi: ICICI Bank, launched the ‘Smart Vault’, a fully automated locker available 24x7, including weekends and post banking hours. • The ‘Smart Vault’ uses robotic technology to access the lockers from the safe vault and enables customers to conveniently access their lockers at any time of their preference, in the comfort of a secure lounge where the locker automatically comes up to the customer. • Customers can access the lockers in total privacy without any intervention of the branch staff. Located at New Delhi, the ‘Smart Vault’ is equipped with multi- layered security systems including biometric authentication, debit card & PIN authentication, unique dimple keys that are difficult to replicate, unbreakable lock system and the option of using additional personal lock as well. • We named our project after our source of Motivation. MOTIVATION
  • 5.  In this era, with the increase of wealth and valuable assets develops a need to protect it from being stolen or misplaced. To protect and place our belongings in a safe place is always what we desire. Through the years this has led to the development of vaults that are locked by locks that the greatest mind are not able to decode. But still there is a constant fear of our valuables being stolen.  The primary objective of our entire project is to develop a security system which the users can access at any time of the day or night. The security of the system is enhanced by using three tiers of security which includes the biometrics system which takes in the fingerprint of the user, the unique plastic card which each user of the security system possesses and a 4 digit password which may be uniquely set by the user on creating his/her account. Further, the system is made available 24x7 by totally automated security system which involves no human intervention. OVERVIEW
  • 6. PROGRESS CHART Step 1 • Duration: 7TH SEMESTER • DESIGNING & INTERFACING FINGERPRINT MODULE TO THE MICROCONTROLLER Step 2 • Duration : FIRST HALF OF 8TH SEMESTER • INTERFACING LCD & KEYPAD TO PIC • INTERFACING EM18 RFID CARD READER MODULE. • ROTATING THE CAROUSEL Step 3 • Duration: LATER HALF OF 8TH SEMESTER • INTERFACING IR SENSOR TO PIC • MOUNTING ON PRINTED CIRCUIT BOARD FROM GENERAL PURPOSE BOARD • INTEGRATING THE ELECTRONIC MODULE WITH THE MECHANICAL DESIGN PROGRESS CHART
  • 7.  In need for strengthening the security system and in order to eliminate the disadvantages of the traditional vault system, we had to totally come up with an all- new design which incorporates three levels of the security system and a carousel which exposes only one vault at a time.  We designed our model in such a way that security is always considered our first priority. So to enhance the security system we incorporated three tiers of security level namely: 1. Fingerprint Module 2. RFID Card Reader Module 3. 4 digit password DESIGN
  • 8.  When all the three levels of security are checked the vaults have to be placed at a fixed locations from where the users can assess their valuables. Various designs were considered to make this happen. Robotic Arm Conveyor Belt Circular rotating carousel  Fixed time intervals Fixed angles  IR Sensors DESIGN
  • 13. FIRST LEVEL OF SECURITY INVOLVES THE USER TO SCAN HIS/HER FINGER. UPON BEING MATCHED GETS THE ACCESS TO THE NEXT LEVEL SECOND LEVEL OF SECURITY MAKES THE USER SWIPE A PLASTIC CARD. USER GETS TO ENTER THE NEXT LEVEL ONLY AFTER BOTH BEING MATCHED. THIRD LEVEL OF SECURITY IS TO ENTER 4 DIGIT PASSWORD. IF ANY OF THE 3 SECURITY LEVELS FAIL, THE USER IS ASKED TO LEAVE. CAROUSEL ROTATES TO ALIGN THE DESIRED VAULT AT THE WINDOW FROM WHERE THE VAULT CAN BE ACCESSED BY THE USER. FOR THE USER’S CONVENIENCE, MANUAL LOCK IS USED TO FURTHER ENHANCE THE SAFETY OF THE SYSTEM FINALLY, AFTER PASSING THROUGH MANY CHECKS THE USER ACCESSES ONE’S VALUABLES FROM THE VAULT
  • 15. STEP 1: Start STEP 2: Place the Finger STEP 3: Go to Step 10 if the Fingerprint doesn’t match STEP 4: Door opens STEP 5: Swipe the Card STEP 6: Go to Step 10 if the Card doesn’t match STEP 7: Enter 4 digit PASSWORD STEP 8: Go to Step 11 if password doesn’t match STEP 9: Carousel locates the desired vault at the window using IR Sensor & user accesses the vault STEP 10: EXIT STEP 11: Is the number of trials <= 3? If YES Go to step 7, else GOTO Step 10
  • 16. CIRCUIT DIAGRAM & ITS DESCRIPTION
  • 19. • Ceramic capacitors C1 & C2 (both of 33pF) and crystal X1(12 MHz) is related to the clock circuitry which produces the system clock frequency
  • 20. • The keys are connected in simple parallel manner. • In order to save a few pins the keypad can also be connected in a matrix form of 5x2 or so. • 10 Push button switches for 4 digit password (0-9) are connected to the D0, C0, C1,C2,C3,C4,D2,C5,C4,D3 & D1 bits of the microcontroller, configured as input pins. • Each of these is connected to a pull up resistor such that this pin is at Vcc potential when the switch is not pressed. • When the switch is pressed the pin it is connected to will be grounded. • The resistor is connected in series with it to limit the current.
  • 21. • The interface between this LCD and Microcontroller can be 8 bit or 4 bit. • Since the 2X16 character LCD is connected in a 4 bit mode to the microcontroller, it makes use of only the lower 4 data lines i.e. D4, D5, D6 & D7 which are connected to B5, B4. B3 & B2 respectively. The RS (Register Select) & EN (Enable) bit of the LCD is connected to the B7 & B6 of the processor respectively. • R/W pin is meant for selecting between read and write modes.
  • 22.  The fingerprint sensor is combination of R305 FP+PIC MCU board that can read different fingerprints and store in its own flash memory.  The sensor can perform three functions namely Add (Enroll), Empty Database or Search Database and return the ID of stored fingerprint. Any of three functions can be called simply by making the pin low of the sensor or pressing on-board three switches.  The response is either ERROR or OK which is indicated by on-board LED. The response is also returned as single serial data byte.  The return byte is a valid ID or error code. The response byte is a single byte at 9600 bps thus making whole sensor very easy to use.  There are 6 pins on the R305 Fingerprint Module namely GND, +5V, TX out, search, empty and add connected to the pins GND,+5V, one of the inputs to one of the OR gate, D4, D5 & D6 of the microcontroller respectively.
  • 23. Types of functions performed by R305 module Add (Enrol) Function: Adds a fingerprint to database and return a byte of newly added ID. Return values are from 0x00 to 0xFE. In case of error like no finger placed, return code is 0xFF. Here 0xFF means error executing function Search Function: When a finger is put and search function is called, it returns a matching ID if found in its existing memory. Return values are from 0x00 to 0xFE. In case of error like no finger placed, return code is 0xFF. Here 0xFF means error executing function. Empty Function: When you wish to empty all fingerprint data stored on sensor you can use this function. After executing this function, you will get 0xCC as OK or 0xFF in case of error
  • 24. The EM-18 RFID Reader module generates and radiates RF Carrier Signals of frequency 125 KHz through its coils. When a 125 KHz Passive RFID Tag (has no battery) is brought in to this field, gets energized from it. These RFID Tags are usually made using a CMOS IC EM4102. It gets enough power and master clock for its operations from the electromagnetic fields produced by RFID Reader. By changing the modulation current through the coils, tag will send back the information contained in the factory programmed memory array. EM-18 RFID Reader Module can be directly interfaced with 5V PIC Microcontrollers using UART module When a RFID Tag is bring in to the field of EM-18 RFID Reader, it will read its tag number and give output via TX terminal. The BEEP terminal will become LOW to indicate valid tag detection. The UART output will be 12 ASCII data, among these first 10 will be tag number and last 2 will be XOR result of the tag number which can be used for error testing. For eg : If the RFID tag number is 500097892E, output of EM- 18 Reader will be 500097892E60 where 60 is 50 xor 00 xor 97 xor 89 xor 2E. There are 3 pins of the EM18 RFID Module namely GND, +5V & TX output which are connected to ground, Vcc and one of the inputs to other OR gate.
  • 25. Two OR gates and one AND gate is used to sync the system in such a way that the user gets access if BOTH the fingerprint and the RFID card matches and also because there is just one RX pin. The Fingerprint Select pin is E0 and the RFID Select pin is the A5 pin of the PIC. The TX of both the FP & RF are fed as one of the inputs of the OR gate and the other input is the respective Select pin. The output of the two OR gate is combined using an AND gate and the output of the AND gate is fed to the RX (C7) pin of the Microcontroller.
  • 26. Internally the L298N consists of four independent power amps with 5-volt digital inputs and four high current, high voltage power amplifiers capable of driving single DC motors, and both unipolar and bi-polar stepper motors. The four amplifiers are usually used in pairs forming an H-bridge to switch polarity for to control the direction of a single DC motor or as two pairs of H-bridges a bi-polar stepper motor. The four power amplifiers and grouped in pairs of two with individual enable pins (ENA, ENB) and individual current sense pins (SENSA, SENSB) for each pair. The current sense pins in general can be tied to ground, but can be inserted a low value resistor, whose voltage reading is proportional to current. ENA, ENB, and In1-In4 are all standard 5-volt TTL logic making connection to most micro-controllers easy. ENA will turn on A1 and A2 when with a digital HIGH (5-volts) and off when LOW (0 volts); the corresponding outputs will be floating when off. Same is true of ENB, In3 and In4. ENA and ENB can be connected directly together to enable both channels at once or simply tied to +5 volts and both channels making all four outputs active at all times. A 5-volt TTL level input to In1, In2 In3, or In4 will produce a corresponding output of Vm (motor voltage) minus about a volt. The output is used to drive a single motor. An additional motor can also be added to the same module.
  • 27. IR Sensor An infrared sensor is an electronic instrument which is used to sense certain characteristics of its surroundings by either emitting and/or detecting infrared radiation. Infrared sensors are also capable of measuring the heat being emitted by an object and detecting motion The output is fed to the D7 bit of PIC MC.
  • 28. HARDWARE & ITS DESCRIPTION o MICROCONTROLLER- PIC 16F877A o R305 FINGERPRINT MODULE o EM 18 RFID CARD READER MODULE o GEAR MOTOR
  • 30. MICROCONTROLLER- PIC 16F877A Advantages of PIC: It is a RISC design Its code is extremely efficient, allowing the PIC to run with typically less program memory than its larger competitors It is low cost, high clock speed PIC is a peripheral interface controller, developed by general instrument’s microelectronics, in the year of 1993. PIN DIAGRAM OF PIC 16F877A
  • 31. Features of PIC16F877: High- performance RISC CPU Up to 8K x 14 words of FLASH program memory 35 Instructions (fixed length encoding-14-bit) 368×8 static RAM based data memory Up to 256 x 8 bytes of EEPROM data memory Interrupt capability (up to 14 sources) Three addressing modes (direct, indirect, relative) Power-on reset (POR) Harvard architecture memory Power saving SLEEP mode Wide operating voltage range: 2.0V to 5.5V High sink / source current: 25mA Accumulator based machine CORE FEATURES
  • 32. 3 Timer/counters (programmable pre-scalars) • Timer0, Timer2 are 8-bit timer/counter with 8-bit pre-scalar • Timer1 is 16-bit, can be incremented during sleep via external crystal/clock Two capture, compare, PWM modules • Input capture function records the Timer1 count on a pin transition • A PWM function output is a square wave with a programmable period and duty cycle. 10-bit 8 channel analog-to-digital converter USART with 9-bit address detection Synchronous serial port with master mode and I2C Master/Slave 8-bit parallel slave port PERIPHERAL FEATURES:
  • 33. 10-bit, up to 8-channel Analog-to-Digital Converter (A/D) Brown-out Reset (BOR) Analog Comparator module (Programmable input multiplexing from device inputs and comparator outputs are externally accessible) ANALOG FEATURES
  • 34. R305 FINGERPRINT MODULEOperation Principle: Fingerprint processing includes two parts: fingerprint enrollment and fingerprint matching (the matching can be 1:1 or 1:N). When enrolling, user needs to enter the finger two times. The system will process the two time finger images, generate a template of the finger based on processing results and store the template. When matching, user enters the finger through optical sensor and system will generate a template of the finger and compare it with templates of the finger library. For 1:1 matching, system will compare the live finger with specific template designated in the Module; for 1:N matching, or searching, system will search the whole finger library for the matching finger. In both circumstances, system will return the matching result, success or failure
  • 35. Features of R305 Fingerprint Module:
  • 36. EM 18 RFID CARD READER MODULE Serial and TTL output. Along with two RFID cards. Excellent read performance without an external circuit Compact size and cost-effective. Applications Access control Handheld readers This is a low frequency (125 KHz) RFID reader with serial output having a range of 8-12cm. It is a compact units with built in antenna and can be directly connected to the PC using RS232 protocol. FEATURES
  • 37. TYPES OF RFID Many types of RFID exist, but at the highest level, we can divide RFID devices into two classes: active and passive. Active tags require a power source they’re either connected to a powered infrastructure or use energy stored in an integrated battery. In the latter case, a tag’s lifetime is limited by the stored energy, balanced against the number of read operations the device must undergo. One example of an active tag is the transponder attached to an aircraft that identifies its national origin.However, batteries make the cost, size, and life-time of active tags impractical for the retail trade. Passive RFID is of interest because the tags don’t require batteries or maintenance. The tags also have an indefinite operational life and are small enough to fit into a practical adhesive label. A passive tag consists of three parts: an antenna, a semiconductor chip attached to the antenna, and some form of encapsulation. The tag reader is responsible for powering and communicating with a tag. The tag antenna captures energy and transfers the tag’s ID (the tag’s chip coordinates this process). The encapsulation maintains the tag’s integrity and protects the antenna and chip from environmental conditions or reagents. The encapsulation could be a small glass vial or a laminar plastic substrate with adhesive on one side to enable easy attachment to goods.
  • 38. GEAR MOTOR Rated Voltage: DC24V; Rated Current: 0.5 A; Output Speed: 3.5RPM Shaft Diameter: 6mm / 0.23"; Reduction Ratio: 1:2160 Power: 12W DC Motor Diameter: 32mm / 1.26" ; Total Length(Approx.): 72mm /2.8“ Weight: 149g SPECIFICATIONS
  • 40. Install Proteus Proteus ISIS: Open the ‘ISIS Professional’ from PROTEUS. This is the application where the simulations of the circuits can be tested. Layout is the final design which is needed in order to make the PCB of a circuit. To make the schematic, first we must have its raw design. Proteus ARES: ‘ARES Professional’ will open automatically once the previous step is done. This is the application where the final layout will be made. Making PCB layout includes four step procedure : • Making Schematic in ARES • ROUTING • POWER PLANE GENERATION • MAKING PCB STEPS…
  • 43. o FUTURE SCOPE o LEARNING OUTCOMES o CONCLUSION
  • 44. Including a GPS module to inform the users about any access. Informing of a theft to both the user and police if any security level fails. Extending the same design to access more number of vaults. Increasing the number of SECURITY levels e.g. Face Recognition. Redesigning to include a conveyor belt. Load bearing capacity and the design of the carousel can be further modified pertaining to its usage.
  • 45. • Practical approach to be adopted for all the theory learned till date. • The interdependence of various branches of engineering on each other. • Decision about buying various components based on a lot of Research work and gathering details about it prior to it. • Proper planning of deadlines and executing the same in a group together. • Having a backup plan when things fail LEARNINGS THAT WE TAKE WITH US:
  • 46. With the advent of modern techniques in every domain of life, the needs and demands to life a luxurious, hassle-free and safe life increases. People are always in a need to store their valuables in a safer and anytime accessible place. The primary objective of the project carried out was to enhance the security level of the vault system and can be accessible 24x7. This was achieved by involving three levels of security system namely the fingerprint module, the plastic card and 4 digit password. The system was totally automated by using a mechanically driven and programmed using a microcontroller and IR sensor to stop the desired vault at the fixed vault position. This in a way requires no human intervention hence making the system accessible to the users beyond the regular bank hours. The entire project didn’t work in the pre- planned way and required quite a lot of changes ranging from the design to the selection of various components. But with vigorous efforts and dedicated work of all the members of the team the desired objective and an exact prototype was successfully achieved.
  • 47.  http://www.nxp.com/documents/data_sheet/MFRC522  https://en.wikipedia.org/wiki/  https://patents.google.com/  http://www.ijcse.com/docs/INDJCSE12-03-06-058  http://onin.com/fp/Recently_Published_FP_Research_presentation_IAI_Aug_2014  http://ai.pku.edu.cn/aiwebsite/research.files/  http://www.ijarcsse.com/  http://www.cvauni.edu.vn/  https://electrosome.com/matrix-keypad-pic-microcontroller/  https://electrosome.com/interfacing-lcd-with-pic-microcontroller-hi-tech-c/  PIC 16f877a Datasheet  EM18 Datasheet  R305 Datasheet  International Journal for Advanced Science and Technology