Upload
saiprasad-manchikatla
View
630
Download
9
Tags:
Embed Size (px)
Citation preview
Department Of ECE
1. INTRODUCTION
1.1 Introduction
Embedded systems plays a crucial role in critical infrastructure, which is
recognized as essential to national security, health and economy. There is an increasing
concern of security threats, as embedded systems are moving towards networked
applications. Model based approaches have proven to be an effective for embedded
system design. Security is the important aspect of embedded system design. The
characteristics of embedded system give rise to a number of novel vulnerabilities.
Network connectivity opens even more avenues for remote exploits. In response, security
solutions are being developed to provide robustness, protection from attacks, and
recovery capabilities.
Fingerprint identification is used in many ways, for identification and also for the
security purposes. In these days, somewhere sometimes bikes are stolen by the stranger’s
reason is that they don’t have security system. In the present generation we are using the
fingerprint based security system for door locking, EVM’s for any kind of the
identification.
1.2 Literature Survey
Biometrics is derived from Greek word “bios” means life and “metron” means
measure. It is the study of methods for uniquely recognizing human based upon one or
more physical or behavioral traits.
1.2.1 Fingerprint Authentication:
It refers to the automated method of verifying a match between two human
fingerprints.
Fingerprints are one of many forms of biometrics used to identify an individual
and verify their identity. This article touches two major classes of algorithms (minutia
and pattern) and four sensor designs (optical, ultrasonic, passive capacitance and active
capacitance).The simple fact is that passwords don’t work very well. Other authentication
mechanisms such as tokens, smart cards, etc. require you to carry something. This is
better than a password, but easies to lose. Think about losing your credit card or driving 1
SVS Institute Of Technology
Department Of ECE
license. Losing your corporate network access is a lot worse. Information is valuable and
harder to track than money.
Fingerprints can also acts as a simple, trusted and convenient user-interface to a
well thought security architecture. The two components need each other to provide truly
effective security. A user authenticated via fingerprints can take advantage of a solid
security system minimal education. Fingerprints have been used for identification for
over 100 years. They are the standard without question. In addition to signatures,
fingerprints are the only other form of identification that has a legal standing. A key issue
of trust is privacy. The best way to maintain that is to store a template of unique
fingerprint characteristics instead of entire print. This is sufficient for one to one or too
many matching and eliminates the need for a database of searchable fingerprints.
1.2.2 Biometric System:
The diagram below shows a simple block diagram of a biometric system. The
main operations a system can perform are enrollment and test. During the enrollment
biometric information of an individual are stored, during the test, and during the test
information are detected and compared with the stored information.
Fig 1.0: Biometric System
2SVS Institute Of Technology
Department Of ECE
Biometric System Diagram:
The first block (sensor) is the interface between the real world (user) and our
system (biometric system), it has to acquire all the necessary data. Most of the time it is
an image acquisition system, but it can change according to the characteristics we want to
consider.
The second block performs all the necessary pre-processing; it has to remove
artifacts from the sensor, to enhance the input (e.g. remove some kind of noise.), to use
some kind of normalization, etc.
In third block we have to extract the features we need. This step is really
important; we have to choose which features it extract and how. Moreover we have to do
it with certain efficiency (it can’t take hours). After that, we can have a vector of numbers
or an image with particular properties: all those data are used to create the template.
A template is a synthesis of all the characteristics we could extract from the
source; it has to be as short as possible (to improve efficiency) but we can’t discard to
many details, thus losing discrimination.
Then if it is performing enrollment, then the template is simply stored somewhere
(it can be stored in on a card or within a database). If it is performing the matching phase,
the obtained template is passed to matcher that compares it with other existing templates,
estimating the distance between them using any algorithm (e.g. Hamming distance). The
decision matcher has taken is sent as output, so that it can be used for any purpose (e.g. it
can allow the entrance in restricted areas).
1.2.3 Patterns and Features:
The analysis of fingerprints for matching purposes generally requires the
comparison of several features of the print pattern. These include print patterns, which
are aggregate characteristics of ridges, and minutia points, which are unique features
found within patterns. It is also necessary to know the structure and properties of human
skin in order to successfully employ some of the imaging technologies.
Patterns:
There are three basic patterns of fingerprint ridges are the Arch, Loop, and Whorl.
3SVS Institute Of Technology
Department Of ECE
Arch Pattern:
An arch is a pattern where the ridges enter from one side of a finger, rise in the
centre forming an arc, and them exit the other side of the finger.
Loop Pattern:
The loop pattern is a pattern where the ridges enter from one side of a finger, from
a curve, and tend to exit from the same side they enter.
Whorl Pattern:
In the whorl pattern, ridges form a circular pattern around a central point on the
finger. Scientists have found that of family members often share the same general
patterns, leading to the belief that these patterns are inherited.
Fig 1.1: Human Fingerprint Pattern
Features:
Minutia based feature:
The major minutia features of fingerprint ridges are: ridge ending, bifurcation and
short point ridge (or dot). The ridge ending is the point at which a ridge terminates.
Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or
dots) are the ridges which are significantly shorter than the average ridge length on the
fingerprint.
4SVS Institute Of Technology
Department Of ECE
Sequential design based on the following modules: Segmentation, local ridge
orientation estimation (singularity and more detection), local ridge frequency estimation,
fingerprint enhancement, minutiae detection, and minutiae filtering and post-processing.
Ridge based feature:
Size and shape of fingerprint, number, type, and position of singularities (cores
and deltas), spatial relationship and geometrical attributes of the ridge lines, shape
features, global and local texture information, sweat pores, fractal features.
Fig 1.2: Ridge based feature
5SVS Institute Of Technology
Department Of ECE
2.BLOCK DIAGRAM
+5vFig 2.1: BLOCK DIAGRAM
6SVS Institute Of Technology
AT89C51 BUZZER
DRIVER RELAY
Bike connection
L.C.D
Max 232
FINGERPRINTMODULE
POWER SUPPLY (5V DC)
Department Of ECE
2.1 Block diagram description:
8051 MICROCONTROLLER:
The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller
with 4k bytes of Flash Programmable and erasable read only memory (EROM).AT89C51
has many functions and to this microcontroller many other various components are
connected for the functioning of their particular operations and to get the particular
required output. This is very necessary in each and every embedded project.
FINGERPRINT MODULE:
Fingerprint module is interconnected to 8051 microcontroller and this module is
used for the recognization and identification of the fingerprint and also to verify the
recognized fingerprint. So fingerprint module is necessary for identification.
MAX 232:
Max 232 is used as a voltage converter, as 8051 microcontroller need TTL
voltage level, as fingerprint module voltage is cmos voltage level ,but by using the
max232 we can convert one voltage level to the other voltage level.
LCD:
LCD is used to display the functioning of the project or particular operation, as
our project is needed to identify and also to recognize the fingerprint, the LCD shows it
on the screen and total verification depends on the LCD.
BIKE BATTERY:
Bike battery is connected to the 8051 microcontroller and it has the main
functioning of our project. In this bike battery the power supplies and the ignition key
lock on and off conditions totally depends on the bike battery.
7SVS Institute Of Technology
Department Of ECE
POWER SUPPLY:
Power supply is needed for each and every IC and also the modules, so it supplies
the required amount of power to all the components and has major part the project, it
supplies a high power but by using the voltage regulator we can supply the required
amount of power to the components.
RELAY:
Relay is used as switch and when ever it gets the power it starts the vehicle and
when ever it doesn’t get any power until and unless it won’t starts the vehicle.
2.2 Schematic diagram
Fig 2.2: Schematic diagram
8SVS Institute Of Technology
Department Of ECE
2.3 Working principle
The working principle of “fingerprint based vehicle access control system” is
switching (act as switch).
In our project, from the fingerprint module the wires are connected to the battery
of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get
the power, green wire is connected for earthing, red black is connected for the display
purpose the power from the battery generates from the black wire then the total display
will appear.
In the ignition lock there are certain conditions when the bike is on and as well as
off condition, in the on condition the green wire is shorted with black and white wire then
there is short circuit hence the bike doesn’t start and when there is open circuit with in the
green wire then the bike begins to start, at the starting moment of the bike fingerprint
module ask for the verification of the fingerprint impression if matches they can use
otherwise it gives a sound from the buzzer.
9SVS Institute Of Technology
Department Of ECE
3. HARDWARE & SOFTWARE REQUIREMENTS
HARDWARE:
3.1 AT89C51:
A microcontroller is a general purpose device, but that is meant to read data,
perform limited calculations on that data and control its environment based on those
calculations. The prime use of a microcontroller is to control the operation of a machine
using a fixed program that is stored in ROM and that does not change over the lifetime of
the system.
The microcontroller design uses a much more limited set of single and double
byte instructions that are used to move data and code from internal memory to the ALU.
The microcontroller is concerned with getting data from and to its own pins, the
architecture and instruction set are optimized to handle data in bit and byte size.
The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller
with 4k bytes of Flash Programmable and erasable read only memory (EROM). The
device is manufactured using Atmel’s high-density nonvolatile memory technology and
is functionally compatible with the industry-standard 80C51 microcontroller instruction
set and pin out. By combining versatile 8-bit CPU with Flash on a monolithic chip, the
Atmel’s AT89c51 is a powerful microcomputer, which provides a high flexible and cost-
effective solution to many embedded control applications.
10SVS Institute Of Technology
Department Of ECE
Pin Configuration of AT89c51 Microcontroller
Fig 3.1: Pin Configuration of AT89c51 Microcontroller
11SVS Institute Of Technology
Department Of ECE
AT89C51 Block Diagram
Fig 3.2: AT89C51 Block Diagram
PIN DESCRIPTION:
VCC
Supply voltage
GND
Ground
Port 0
Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin
can sink eight TTL inputs. When 1’s are written to port 0 pins, the pins can be used as
high impedance inputs.
Port 0 can also be configured to be the multiplexed low order address/data bus
during access to external program and data memory.
12SVS Institute Of Technology
Department Of ECE
Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The port 1output
buffers can sink/source four TTL inputs. When 1’s are written to port 1 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 1 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The port 2 output
buffers can sink/source four TTL inputs. When 1’s are written to port 2 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 2 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The port 3 output
buffers can sink/source four TTL inputs. When 1s are written to port 3 pins, they are
pulled high by the internal pull-ups can be used as inputs. As inputs, Port 3 pins that are
externally being pulled low will source current because of the internal pull-ups.
Port 3 also receives some control signals for Flash Programming and verification.
Port pin Alternate Functions
P3.0 RXD(serial input port)
P3.1 TXD(serial input port)
P3.2 INT0(external interrupt 0)
P3.3 INT1(external interrupt 1)
P3.4 T0(timer 0 external input)
P3.5 T1(timer 1 external input)
P3.6 WR(external data memory write strobe)
P3.7 RD(external data memory read strobe)
Table 1.1: Pin Description of AT89C51
13SVS Institute Of Technology
Department Of ECE
RST
Rest input A on this pin for two machine cycles while the oscillator is running
resets the device.
ALE/PROG:
Address Latch Enable is an output pulse for latching the low byte of the address
during access to external memory. This pin is also the program pulse input (PROG)
during Flash programming.
In normal operation ALE is emitted at a constant rate of 1/16 the oscillator
frequency and may be used for external timing or clocking purpose. Note, however, that
one ALE pulse is skipped during each access to external Data memory.
PSEN
Program Store Enable is the read strobe to external program memory when the
AT89c51 is executing code from external program memory PSEN is activated twice each
machine cycle, except that two PSEN activations are skipped during each access to
external data memory.
EA /VPP
External Access Enable (EA) must be strapped to GND in order to enable the
device to fetch code from external program memory locations starting at 0000h up to
FFFFH. Note, however, that if lock bit 1 is programmed EA will be internally latched on
reset. EA should be strapped to Vcc for internal program executions. This pin also
receives the 12-volt programming enable voltage (Vpp) during Flash programming when
12-volt programming is selected.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock
operating circuit.
XTAL 2
Output from the inverting oscillator amplifier.
14SVS Institute Of Technology
Department Of ECE
OPERATING DESCRIPTION
The detail description of the AT89C51 included in this description is:
• Memory Map and Registers
• Timer/Counters
• Interrupt System
MEMORY MAP AND REGISTERS
Memory
The AT89C51 has separate address spaces for program and data memory. The
program and data memory can be up to 64K bytes long. The lower 4K program memory
can reside on-chip. The AT89C51 has 128 bytes of on-chip RAM.
The lower 128 bytes can be accessed either by direct addressing or by indirect
addressing. The lower 128 bytes of RAM can be divided into 3 segments as listed below
1. Register Banks 0-3:
Locations 00H through 1FH (32 bytes). The device after reset defaults to register
bank 0. To use the other register banks, the user must select them in software. Each
register bank contains eight 1-byte registers R0-R7. Reset initializes the stack point to
location 07H, and is incremented once to start from 08H, which is the first register of the
second register bank.
2. Bit Addressable Area:
16 bytes have been assigned for this segment 20H-2FH. Each one of the 128 bits
of this segment can be directly addressed (0-7FH). Each of the 16 bytes in this segment
can also be addressed as a byte.
3. Scratch Pad Area:
30H-7FH are available to the user as data RAM. However, if the data pointer has
been initialized to this area, enough bytes should be left aside to prevent SP data
destruction.
15SVS Institute Of Technology
Department Of ECE
Fig 3.3: Memory Map & Registers
SPECIAL FUNCTION REGISTERS
The Special Function Registers (SFR's) are located in upper 128 Bytes direct
addressing area. The SFR Memory Map in shows that.
Not all of the addresses are occupied. Unoccupied addresses are not implemented
on the chip. Read accesses to these addresses in general return random data, and write
accesses have no effect. User software should not write 1’s to these unimplemented
locations, since they may be used in future microcontrollers to invoke new features. In
that case, the reset or inactive values of the new bits will always be 0, and their active
values will be 1.
The functions of the SFR’s are outlined in the following sections.
Accumulator (ACC)
ACC is the Accumulator register. The mnemonics for Accumulator-specific
instructions, however, refer to the Accumulator simply as A.
16SVS Institute Of Technology
Department Of ECE
B Register (B)
The B register is used during multiply and divide operations. For other
instructions it can be treated as another scratch pad register.
Program Status Word (PSW)
The PSW register contains program status information.
Stack Pointer (SP)
The Stack Pointer Register is eight bits wide. It is incremented before data is
stored during PUSH and CALL executions. While the stack may reside anywhere in on
chip RAM, the Stack Pointer is initialized to 07H after a reset. This causes the stack to
begin at location 08H.
Data Pointer (DPTR)
The Data Pointer consists of a high byte (DPH) and a low byte (DPL). Its function
is to hold a 16-bit address. It may be manipulated as a 16-bit register or as two
independent 8-bit registers.
Serial Data Buffer (SBUF)
The Serial Data Buffer is actually two separate registers, a transmit buffer and a
receive buffer register. When data is moved to SBUF, it goes to the transmit buffer,
where it is held for serial transmission. (Moving a byte to SBUF initiates the
transmission.) When data is moved from SBUF, it comes from the receive buffer.
Timer Registers
Register pairs (TH0, TL0) and (TH1, TL1) are the 16-bit Counter registers for
Timer/Counters 0 and 1, respectively.
Control Registers
Special Function Registers IP, IE, TMOD, TCON, SCON, and PCON contain
control and status bits for the interrupt system, the Timer/Counters, and the serial port.
17SVS Institute Of Technology
Department Of ECE
TIMER/COUNTERS
The IS89C51 has two 16-bit Timer/Counter registers: Timer 0 and Timer 1. All
two can be configured to operate either as Timers or event counters. As a Timer, the
register is incremented every machine cycle. Thus, the register counts machine cycles.
Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the
oscillator frequency.
As a Counter, the register is incremented in response to a 1-to-0 transition at its
corresponding external input pin, T0 and T1. The external input is sampled during S5P2
of every machine cycle. When the samples show a high in one cycle and a low in the next
Cycle, the count is incremented. The new count value appears in the register during S3P1
of the cycle following the one in which the transition was detected. Since two machine
cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum
count rate is 1/24 of the oscillator frequency. There are no restrictions on the duty cycle
of the external input signal, but it should be held for at least one full machine cycle to
ensure that a given level is sampled at least once before it changes.
INTERRUPT SYSTEM
An interrupt is an external or internal event that suspends the operation of micro
controller to inform it that a device needs its service. In interrupt method, whenever any
device needs its service, the device notifies the micro controller by sending it an interrupt
signal. Upon receiving an interrupt signal, the micro controller interrupts whatever it is
doing and serves the device. The program associated with interrupt is called as interrupt
service subroutine (ISR).Main advantage with interrupts is that the micro controller can
serve many devices.
Baud Rate
The baud rate in Mode 0 is fixed as shown in the following equation. Mode 0
Baud Rate = Oscillator Frequency /12 the baud rate in Mode 2 depends on the value of
the SMOD bit in Special Function Register PCON. If SMOD = 0 the baud rate is 1/64 of
the oscillator frequency. If SMOD = 1, the baud rate is 1/32 of the oscillator frequency.
18SVS Institute Of Technology
Department Of ECE
Mode 2 Baud Rate = 2SMODx (Oscillator Frequency)/64.In the IS89C51, the Timer 1
overflow rate determines the baud rates in Modes 1 and 3.
NUMBER OF INTERRUPTS IN 89C51:
There are basically five interrupts available to the user. Reset is also considered as
an interrupt. There are two interrupts for timer, two interrupts for external hardware
interrupt and one interrupt for serial communication.
Memory location Interrupt name
0000H Reset
0003H External interrupt 0
000BH Timer interrupt 0
0013H External interrupt 1
001BH Timer interrupt 1
0023H Serial COM interrupt
Lower the vector, higher the priority. The External Interrupts INT0 and INT1 can
each be either level-activated or transition-activated, depending on bits IT0 and IT1 in
Register TCON. The flags that actually generate these interrupts are the IE0 and IE1 bits
in TCON. When the service routine is vectored, hardware clears the flag that generated
an external interrupt only if the interrupt was transition-activated. If the interrupt was
level-activated, then the external requesting source (rather than the on-chip hardware)
controls the request flag.
The Timer 0 and Timer 1 Interrupts are generated by TF0and TF1, which are set
by a rollover in their respective Timer/Counter registers (except for Timer 0 in Mode
3).When a timer interrupt is generated, the on-chip hardware clears the flag that is
generated.
The Serial Port Interrupt is generated by the logical OR of RI and TI. The service
routine normally must determine whether RI or TI generated the interrupt, and the bit
must be cleared in software.
All of the bits that generate interrupts can be set or cleared by software, with the
same result as though they had been set or cleared by hardware. That is, interrupts can be
generated and pending interrupts can be canceled in software. 19
SVS Institute Of Technology
Department Of ECE
Each of these interrupt sources can be individually enabled or disabled by setting
or clearing a bit in Special Function Register IE (interrupt enable) at address 0A8H.
There is a global enable/disable bit that is cleared to disable all interrupts or to set the
interrupts.
IE (Interrupt enable register) :
Steps in enabling an interrupt:
Bit D7 of the IE register must be set to high to allow the rest of register to take
effect. If EA=1, interrupts are enabled and will be responded to if their corresponding bits
in IE are high. If EA=0, no interrupt will be responded to even if the associated bit in the
IE register is high.
Description of each bit in IE register:
D7 bit: Disable all interrupts. If EA =0, no interrupt is acknowledged, if EA=1 each
interrupt source is individually enabled or disabled by setting or clearing its enable bit.
D6 bit: Reserved.
D5 bit: Enables or disables timer 2 over flow interrupt (in 8052).
D4 bit: Enables or disables serial port interrupt.
D3 bit: Enables or disables timer 1 over flow interrupt.
D2 bit: Enables or disables external interrupt 1.
D1 bit: Enables or disables timer 0 over flow interrupt.
D0 bit: Enables or disables external interrupt 0.
Interrupt priority in 89C51:
There is one more SRF to assign priority to the interrupts which is named as
interrupt priority (IP). User has given the provision to assign priority to one interrupt.
Writing one to that particular bit in the IP register fulfils the task of assigning the priority.
20SVS Institute Of Technology
Department Of ECE
Description of each bit in IP register:
D7 bit: Reserved.
D6 bit: Reserved.
D5 bit: Timer 2 interrupt priority bit (in 8052).
D4 bit: Serial port interrupt priority bit.
D3 bit: Timer 1 interrupt priority bit.
D2 bit: External interrupt 1 priority bit.
D1 bit: Timer 0 interrupt priority bit.
D0 bit: External interrupt 0 priority bit.
3.2 POWER SUPPLY
This term covers the power distribution system together with any other primary or
secondary sources of energy.
Fig 3.4: Power Supply
Introduction
Power supply is a reference to a source of electrical power. A device or system
that supplies electrical or other types of energy to an output load or group of loads is
called a power supply unit or PSU. The first section is the transformer. The transformer
steps up or steps down the input line voltage and isolates the power supply from the
power line. The rectifier section converts the alternating current input signal to a
pulsating direct current. A filter section is used to convert pulsating dc to a purer, more
21SVS Institute Of Technology
Department Of ECE
desirable form of dc voltage. The final section is the regulator, it maintains the output of
the power supply at a constant level.
Each of the blocks are described below
1. Transformer - steps down high voltage AC mains to low voltage AC.
2. Rectifier - converts AC to DC, but the DC output is varying.
3. Smoothing - smoothes the DC from varying greatly to a small ripple.
4. Regulator - eliminates ripple by setting DC output to a fixed voltage.
3.3 Voltage Regulator:
A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. It may use an electromechanical mechanism, or passive or active electronic components. Depending on the design, it may be used to regulate one or more AC or DC voltages. There are two types of regulators they are:
Positive Voltage Series (78xx)
Negative Voltage Series (79xx)
78xx:’78’ indicate the positive series and ‘xx’indicates the voltage rating. Suppose 7805
produces the maximum 5V.’05’indicates the regulator output is 5V.
79xx:’78’ indicate the negative series and ‘xx’indicates the voltage rating. Suppose 7905
produces the maximum -5V.’05’indicates the regulator output is -5V.
These regulators consists the three pins there are
Pin1: It is used for input pin.
Pin2: This is ground pin for regulator
Pin3: It is used for output pin. Through this pin we get the output.
22SVS Institute Of Technology
Department Of ECE
Fig 3.5: Voltage Regulator
3.4 MAX 232
Connection Diagram:
Fig 3.6: MAX 232 Connection Diagram
The MAX232 line drivers/receivers are designed for RS-232 and V.28
communications in harsh environments. Each transmitter output and receiver input is
protected against 15kV electrostatic discharge (ESD) shocks, without latchup.It can
operate from a Single +5V Power Supply.
23SVS Institute Of Technology
Department Of ECE
It is an integrated circuit that converts signals from an RS-232 serial port to
signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a dual
driver/receiver and typically converts the RX, TX, CTS and RTS signals.
Fig 3.7: MAX232 line drivers/receivers
The drivers provide RS-232 voltage level outputs (approx. ± 7.5 V) from a single
+ 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for
implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V
to + 5 V range, as power supply design does not need to be made more complicated just
for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as
high as ± 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of
1.3 V, and a typical hysteresis of 0.5 V.
24SVS Institute Of Technology
Department Of ECE
Voltage levels:
It is helpful to understand what occurs to the voltage levels. When a MAX232 IC
receives a TTL level to convert, it changes a TTL Logic 0 to between +3 and +15V, and
changes TTL Logic 1 to between -3 to -15V, and vice versa for converting from RS232
to TTL. This can be confusing when you realize that the RS232 Data Transmission
voltages at a certain logic state are opposite from the RS232 Control Line voltages at the
same logic state. To clarify the matter, see the table below.
Table 1.2:RS232 Voltage Levels
FUNCTION TABLE
Table 1.3:RS232 Function Table
25SVS Institute Of Technology
Department Of ECE
LOGIC DIAGRAM: (POSITIVE LOGIC)
Fig 3.8:RS232 Logic Diagram
3.5 RS-232 Cable
RS-232 was created for one purpose, to interface between Data Terminal
Equipment (DTE) and Data Communications Equipment (DCE) employing serial binary
data interchange. So as stated the DTE is the terminal or computer and the DCE is the
modem or other communications device. RS-232 is most widely used serial input output
interfacing standards. This standards used in PCs and numerous types of equipment.
However, since the standards were set long before the advent of the TTL logic family, its
input and output levels are not TTL compatible. In RS 232, a 1 is represented by -3 to -25
volt, while 0 bit is +3 to +25 volt, making -3 to +3 undefined. For this reason, we must
use MAX 232 line driver to convert voltage level. It is compatible with PC.
26SVS Institute Of Technology
Department Of ECE
Fig 3.9: RS232 cable
3-wire and 5-wire RS-232:
Minimal “3-wire” RS-232 connections consisting only of transmits data,
receive data, and ground, is commonly used when the full facilities of RS-232 are not
required. Even a two-wire connection (data and ground) can be used if the data flow is
one way (for example, a digital postal scale that periodically sends a weight reading, or a
GPS receiver that periodically sends position, if no configuration via RS-232 is
necessary). When only hardware flow control is required in addition to two-way data, the
RTS and CTS lines are added in a 5-wire version
DB9 CONNECTOR
The term "DB9" refers to a common connector type, one of the D-Subminiature or
D-Sub types of connectors. DB9 has the smallest "footprint" of the D-Subminiature
connectors, and houses 9 pins (for the male connector) or 9 holes (for the female
connector).
DB9 connectors were once very common on PCs and servers. DB9 connectors are
designed to work with the EIA/TIA 232 serial interface standard, which determined the
function of all nine pins as a standard, so that multiple companies could design them into
their products. DB9 connectors were commonly used for serial peripheral devices like
keyboards, mice, joysticks, etc. Today, the DB9 has mostly been replaced by more
modern interfaces such as USB, PS/2, Fire wire, and others. However, there are still
many legacy devices that use the DB9 interface for serial communication.
27SVS Institute Of Technology
Department Of ECE
Fig 3.10: DB9 connector (male and female)
TYPES OF THE DB9 CONNECTOR:
In DB9 connector w have two types of connector
• Male connectors
• Female connectors
Male:
Fig 3.11: DB9 male connector
28SVS Institute Of Technology
Department Of ECE
Female:
Fig 3.12:DB9 Female Connector
Pin Functions:
Data: TxD on pin 3, RxD on pin 2
Handshake: RTS on pin 7, CTS on pin 8, DSR on pin 6,
CD on pin 1, DTR on pin 4
Common: Common pin 5(ground)
Other: RI on pin 9
The method used by RS-232 for communication allows for a simple connection of
three lines: TX, Rx, and Ground. The three essential signals for 2 way RS-232
Communications are these:
TXD: carries data from DTE to the DCE.
RXD: carries data from DCE to the DTE
SG: signal ground
Pin Configuration:
The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature
connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial
connections, allowing for the asynchronous transmission of data as provided for by
standard RS-232 (RS-232C).
29SVS Institute Of Technology
Department Of ECE
Fig 3.13: DB9male and female pins
Pin number Name
1 CD - Carrier Detect 2 RXD - Receive Data3 TXD - Transmit Data 4 DTR - Data Terminal Ready
5 GND - Signal Ground 6 DSR - Data Set Ready7 RTS - Request To Send
8 CTS - Clear To Send 9 RI - Ring Indicator
Table 1.4: DB9 Pin Configuration
30SVS Institute Of Technology
Department Of ECE
3.6 LCD (Liquid Crystal Display)
Fig 3.14: LCDGeneral Description:
The Liquid Crystal Display (LCD) is a low power device (microwatts). Now a
days in most applications LCDs are using rather using of LED displays because of its
specifications like low power consumption, ability to display numbers and special
characters which are difficult to display with other displaying circuits and easy to
program. An LCD requires an external or internal light source. Temperature range of
LCD is 0ºC to 60ºC and lifetime is an area of concern, because LCDs can chemically
degrade these are manufactured with liquid crystal material (normally organic for LCDs)
that will flow like a liquid but whose molecular structure has some properties normally
associated with solids. .
LCD’s are classified as
1. Dynamic-scattering LCDs and
2. Field-effect LCDs
Field-effect LCDs are normally used in such applications where source of
energy is a prime factor (e.g., watches, portable instrumentation etc.).They absorb
considerably less power than the light-scattering type. However, the cost for field-effect
units is typically higher, and their height is limited to 2 inches. On the other hand, light-
scattering units are available up to 8 inches in height. Field-effect LCD is used in the
project for displaying the appropriate information.
31SVS Institute Of Technology
Department Of ECE
RS (Command / Data):
This bit is to specify weather received byte is command or data. So that LCD can
recognize the operation to be performed based on the bit status.
RS = 0 => Command
RS = 1 => Data
RW (Read / Write):
RW bit is to specify weather controller wants READ from LCD or WRITE to
LCD. The READ operation here is just ACK bit to know weather LCD is free or not.
RW = 0 => Write
RW = 1 => Read
EN (Enable LCD):
EN bit is to ENABLE or DISABLE the LCD. Whenever controller wants to
write something into LCD or READ acknowledgment from LCD it needs to enable the
LCD.
EN = 0 => High Impedance
EN = 1 => Low Impedance
ACK (LCD Ready):
ACK bit is to acknowledge the MCU that LCD is free so that it can send new
command or data to be stored in its internal Ram locations
ACK = 1 => Not ACK
ACK = 0 => ACK
32SVS Institute Of Technology
Department Of ECE
LCD diagram:
16 x 2 Char LCD
R1
R2
GND
Vcc
Vf RS RW EN
D0 – D7
A K D0
D7
ACK
Block Diagram
Fig 3.15: LCD Block Diagram
33SVS Institute Of Technology
Department Of ECE
Hardware connections:
CONTROLER PINS
LCD PINS PIN NAME WITH FEATURE
(P1.0) 4 RS (Control Pin)(P1.1) 5 RW (Control pin )(P1.2) 6 EN (Control pin)Port 0 7 to 14 Data Port40 15 & 2 Vcc20 16 & 1 Gnd
Table 1.5: LCD Hardware Connections
3.7 Buzzer Circuit with Unique Functionality
Fig 3.16: Buzzer Circuit with Unique Functionality
Overview
The circuit was constructed using a few components to produce a unique buzzer
with adjustable buzzer tones.
Terminology
Buzzer – an electronic signaling device that produces light and buzzing sound
when activated or triggered
34SVS Institute Of Technology
Department Of ECE
Single Pole Double Throw (SPDT)
An electromagnetic switch that has common, normally open and normally closed
connections; the common gets connected to the normally closed connection when the
relay coil is de-energized while the common gets connected to the normally open
connection when the relay coil is energized.
3.8 ULN2804
The eight NPN Darlington connected transistors in this family of arrays are
ideally suited for interfacing between low logic level digital circuitry (such as TTL,
CMOS or PMOS/NMOS) and the higher current/voltage requirements of lamps, relays,
printer hammers or other similar loads for a broad range of computer, industrial, and
consumer applications. All devices feature open–collector outputs and freewheeling
clamp diodes for transient suppression. The ULN2803 is designed to be compatible with
standard TTL families. While the ULN2804 is optimized for 6 to 15 volt high level
CMOS or PMOS
ULN2804 IC FORM
35SVS Institute Of Technology
Department Of ECE
High-Voltage, High-Current Darlington
Fig 3.17: Pin diagram of ULN2804
Featuring continuous load current ratings to 500 mA for each of the drivers, the
ULN2804 high voltage, high-current Darlington arrays is ideally suited for interfacing
between low-level logic circuitry and multiple peripheral power loads. Typical power
loads totaling over 260 W (350 mA x 8, 95 V) can be controlled at an appropriate duty
cycle depending on ambient temperature and number of drivers turned on simultaneously.
Typical loads include relays, solenoids, stepping Motors, magnetic print hammers,
multiplexed LED and incandescent displays, and heaters. All devices feature open-
collector outputs with integral clamp diodes.
The ULN2003 has series input resistors selected for operation directly with 5 V
TTL or CMOS. These devices will handle numerous interface needs — particularly those
beyond the capabilities of standard logic buffers. The ULN2804 has series input resistors
for operation directly from 6 V to 15 V CMOS or PMOS logic outputs.
36SVS Institute Of Technology
Department Of ECE
The ULN is the standard Darlington arrays. The outputs are capable of sinking
500 mA and will withstand at least 50 V in the off state. Outputs may be paralleled for
higher load current capability. The ULN2804 will withstand 95 V in the off state.
These Darlington arrays are furnished in 18-pin dual in-line plastic packages (suffix
‘A’) or 18-lead small-outline plastic packages (suffix ‘LW’). All devices are pinned with
outputs opposite inputs to facilitate ease of circuit board layout. Prefix ‘ULN’ devices are
rated for operation over the temperature range of -20°C to +85°C; prefix ‘ULQ’ devices
are rated for operation to -40°C.
1. Output Voltage, VCE
2. Input Voltage, VIN ..............................30 V
3. Continuous Output Current, IC .... 500 mA
4. Continuous Input Current, IIN ....... 25 mA
5. Power Dissipation, PD
6. (one Darlington pair) .................. 1.0 W
7. Storage Temperature Range….-55°C to +150°
3.9 Fingerprint module:
System parameter and interface
serial number
Index Parameter Condition
1 Power supply 5V2 Working current 170mA3 Peak value current 200mA4 Fingerprint input
time<250ms
5 1:1 matching time <600msMatching features + matching
fingerprint
61:900 searching
time<2s
7Fingerprint
capacityMax. 960
8 FAR(False Acceptance Rate)
<0. 001 %
9 FRR(False Rejection
Rate)<1.5 %
10 Fingerprint template size
512bytes
37SVS Institute Of Technology
Department Of ECE
11 Outer interface UART
Commands / Datasheet format
Commands / datasheet:Pack mark =01 CommandPack mark=02 Data, and has Follow-up package Pack mark=08 the last data pack, overAll data packets have to add: 0xEF01
Command packs format:
Byte 2bytes 4bytes1
byte2
bytes1byte … …
2 bytes
NamePack head
Chip add
Pack mark
Pack length
command Parameter1 …Parameter
nCheck sum
Content 0xEF01 Xxxx 01 N=
Data pack format:
Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes
NamePack head
Chip addPack mark
Pack length DataCheck sum
Content 0xEF01 xxxx 02
Over Pack format:
Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes
namePack head
Chip addPack mark
Pack length dataCheck sum
content 0xEF01 xxxx 08
Data packs cannot ingress into executive flow alone, it has to follow behind the
command pack or respond pack.
Upload or upload data pack are the same format.
Pack length = the total bytes of pack length to check sum (command, parameter or data)
including check sum, but excludes the bytes of pack length itself.
38SVS Institute Of Technology
Department Of ECE
Check sum includes all the bytes of the pack mark to check sum, in excess of 2-
byte binary are ignored.
Chip address are default as 0xFFFFFFFF before created, once the host computer
through the command to generate the chip address, all packets must be generated in
accordance with the address to send and receive. Chip will refuse to address the wrong
packet.
Command response
Response is to report for the implementation of the orders and results execution.
Response includes all the parameter and the follow-up data packets, PC only confirm by
receiving the SOC response and order execution.
Response packet format: 2bytes 4bytes 1 byte 2 bytes 1 byte N bytes 2 bytes
0xEF01 Chips add.Pack mark
07Pack
lengthConfirm
codeReturn
parameterCheck sum
Table 1.6: Commands / Datasheet formats
Fig 3.18: Fingerprint Verification System
39SVS Institute Of Technology
Department Of ECE
Application
NGE - OP 67 can be used on all fingerprint verification systems, such as
R&D, Embedded interface development.
Complicated door-guard system;
Fingerprint IC card Identification Terminal;
Fingerprint identification and verification system associated with PC or embedded
environment.
Developer can develop various fingerprint verification application systems based on the
technical data.
3.10 Bike battery:
Bike battery consists of four wires red ,green,black,black and white, from these
four wires green wire is used for earthing and red wire is the battery power supplier and
black and white is used for starting the bike and stopping the bike and black wire is used
for display purpose .The four wires functions are given as;
RED: battery power supplier to all others
GREEN: only for earthing
BLACK: used for display (speed meter etc)
BLACK AND WHITE: used for start and stop the vehicle
Generally there are two conditions for the purpose of starting and stopping of the
bike the two conditions are shown in diagrammatically;
40SVS Institute Of Technology
Department Of ECE
Key off condition
Key on condition
Fig 3.19: Key off/on Condition
When ever the green wire is earthed with black and white wire then the bike stops
and when ever the green wire is open circuit with the black and white wire then the bike
begins to start, all this process depends on the ignition lock of the bike, if on the key and
also to off the key it must satisfy certain condition to accept the condition.
41SVS Institute Of Technology
Department Of ECE
SOFTWARE:
Operating System: WINDOWS XP
Software Used: KEIL, MICRO ‘C’ FLASH, EXPRESS PCB
3.11 KEIL SOFTWARE
Installing the Keil software on a Windows PC:
• Insert the CD-ROM in your computer’s CD drive
• On most computers, the CD will “auto run”, and you will see the Keil installation
menu. If the menu does not appear, manually double click on the Setup icon, in
the root directory: you will then see the Keil menu.
• On the Keil menu, please select “Install Evaluation Software”. (You will not
require a license number to install this software).
• Follow the installation instructions as they appear.
Loading the Projects:
The example projects for this book are NOT loaded automatically when you
install the Keil compiler. These files are stored on the CD in a directory “/Pont”. The files
are arranged by chapter: for example, the project discussed in Chapter 3 is in the
directory “/Pont/Ch03_00-Hello”. Rather than using the projects on the CD (where
changes cannot be saved), please copy the files from CD onto an appropriate directory on
your hard disk.
Note: you will need to change the file properties after copying: file transferred from the
CD will be ‘read only’.
42SVS Institute Of Technology
Department Of ECE
Configuring the Simulator:
1. Open the Keil µVision2
2. Go to Project – Open Project and browse for Hello in Ch03_00 in Pont and open
it.
3. Go to Project – Select Device for Target ‘Target1’
4. Select 8052(all variants) and click OK
5. Now we need to check the oscillator frequency
6. Go to project – Options for Target ‘Target1’
7. Make sure that the oscillator frequency is 11.5902MHz.
8. Building the Target:
9. Build the target as illustrated in the figure below
10. Running the Simulation
11. Having successfully built the target, we are now ready to start the debug session
and run the simulator.
12. First start a debug session
13. The flashing LED we will view will be connected to Port 1. We therefore want to
observe the activity on port
14. To ensure that the port activity is visible, we need to start the ‘periodic window
update’ flag
15. Go to Debug - Go
16. While the simulation is running, view the performance analyzer to check the
delay durations.
17. Go to Debug – Performance Analyzer and click on it
18. Double click on DELAY_LOOP_Wait in Function Symbols: and click Define
button
43SVS Institute Of Technology
Department Of ECE
Go to Project:
Go to Project – Select Device for Target ‘Target1’
Select 8052(all variants) and click OK
44SVS Institute Of Technology
Department Of ECE
Now we need to check the oscillator frequency:Go to project – Options for Target ‘Target1’
Make sure that the oscillator frequency is 12MHz.
45SVS Institute Of Technology
Department Of ECE
Building the Target
Build the target as illustrated in the figure below
Running the Simulation Having successfully built the target, we are now ready to start the debug session and run the simulator.First start a debug session
46SVS Institute Of Technology
Department Of ECE
The flashing LED we will view will be connected to Port 1. We therefore want to observe the activity on this port
47SVS Institute Of Technology
Department Of ECE
To ensure that the port activity is visible, we need to start the ‘periodic window update’ flag
48SVS Institute Of Technology
Department Of ECE
Go to Debug - Go
While the simulation is running, view the performance analyzer to check the delay durations.
49SVS Institute Of Technology
Department Of ECE
Go to Debug – Performance Analyzer and click on it
Double click on DELAY LOOP Wait in Function Symbols: and click Define button
50SVS Institute Of Technology
Department Of ECE
Fig 3.20: Configuring the Simulator
51SVS Institute Of Technology
Department Of ECE
Advantages & Applications
Advantages
The main advantage of our project is
• It is used to reduce the vehicle thieves
• It is used to build the own security of your own vehicle
• It is used to identify the thieves (while they are stealing the buzzer or alarm makes sound)
Disadvantages
• Whenever neighbor needs your vehicle he can’t start without you(vehicle owner).
• Else one of your friend or son has to move with him (friend or neighbor fingerprint identity is stored)
Applications
House hold based equipments
• It is used in vehicles and also the household equipments (such as door locks and almaris etc)
Automobiles
• It is used in each and every security things which are needed for us.
• It is used in identification purpose (person identification by using the thumb impression etc)
52SVS Institute Of Technology
Department Of ECE
4. RESULTS
In our project, from the fingerprint module the wires are connected to the battery
of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get
the power, green wire is connected for earthing, red black is connected for the display
purpose the power from the battery generates from the black wire then the total display
will appear.
In the ignition lock there are certain conditions when the bike is on and as well as
off condition, in the on condition the green wire is shorted with black and white wire then
there is short circuit hence the bike doesn’t start and when there is open circuit with in the
green wire then the bike begins to start, at the starting moment of the bike fingerprint
module ask for the verification of the fingerprint impression if matches they can use
otherwise it gives a sound from the buzzer.
53SVS Institute Of Technology
Department Of ECE
5. CONCLUSION & FUTURE SCOPE
5.1 Conclusion
This project may helpful to the people who are earning a very less salaries and the people
who are richest, earning high salaries by keeping a powerful security on their own
vehicles, they can move anywhere they want by parking the vehicle at unknown place.
This may useful to each and every person in day to day life and they will never afraid of
the vehicle thefters. By this project people come to existence that our country is
developing and they move forward the leg with full of dareness in their minds.
5.2 Future Scope
In future we want to develop the same project but by adding a default user identifier and
in future we can make this project very bright, by using a snapshot video camera
whenever a thief ready for stealing the vehicle, as it records the total scenario happening
and also it sends the message to the owner of the vehicle by using the GSM and GPRS
technologies.
54SVS Institute Of Technology
Department Of ECE
BIBILOGRAPHY
http://www.fingerprint.com/
http://en.wikipedia.org/wiki/Biometric
http://travel.state.gov/fingerprint/eppt/eppt_2788.html
http://www.buslab.org/index.php/content/view/24733/6
http://www.pcworld.com/article/id,103535-page,1/article.html
http://www.modulesfinger.in/site/india
55SVS Institute Of Technology