22
PC-BASED SECURITY SYSTEM

Pc Based Security System

  • Upload
    ssramz

  • View
    2.711

  • Download
    5

Embed Size (px)

DESCRIPTION

Final Year Project titled “PC-based security system powered by 8051 Microcontroller,” Department of Electronics and Communication Engineering, Sri Venkateswara College of Engineering (Anna University), 2005

Citation preview

Page 1: Pc Based Security System

PC-BASED SECURITY

SYSTEM

Page 2: Pc Based Security System

PROBLEM DEFINITION

The purpose of the project is to come out

with a Reliable Security System. Pictures of thescene under security belt are sent via e-mail tothe user. The PC also initiates a call to the users

phone when there is intrusion. Remote

Controlling the PC is achieved using an

Interactive Voice Response System.

Page 3: Pc Based Security System

DOOR

OR

WINDOW

STEPPER

MOTOR

WEB-

CAM

MICRO-

CONTROLLER

RXIR

TX

MODEM

ALARM

SMS

E-MAIL

(PICTURE)

IVM

SOFTWARE

Page 4: Pc Based Security System

MICROCONTROLLERMICROCONTROLLERMICROCONTROLLERMICROCONTROLLER

• 8051 MICROCONTROLLER 8051 MICROCONTROLLER 8051 MICROCONTROLLER 8051 MICROCONTROLLER

# 8255 I/O CHIP# 8255 I/O CHIP# 8255 I/O CHIP# 8255 I/O CHIP

* 40- PIN CHIP

* 3 PORTS - A, B, C OF 8-BITS EACH.

# OUR APPLICATION:# OUR APPLICATION:# OUR APPLICATION:# OUR APPLICATION:

* PORT A – OUTPUT

* PORT B – INPUT

* SIMPLE I/O MODE (MODE 0)

Page 5: Pc Based Security System

SERIAL COMMUNICATIONSERIAL COMMUNICATIONSERIAL COMMUNICATIONSERIAL COMMUNICATION

WE WORK ATWE WORK ATWE WORK ATWE WORK AT

* BAUD RATE – 9600 BPS

* DATA BITS - 8

* PARITY - NONE

* STOP BITS - 1

TO TRANSFER DATA SERIALLYTO TRANSFER DATA SERIALLYTO TRANSFER DATA SERIALLYTO TRANSFER DATA SERIALLY

•TMOD( TIMER MODE) - TIMER 1 IN MODE 2.

•SCON (SERIAL PORT CONTROL REGISTER)

SERIAL MODE 1- 8 BIT DATA, 1 START AND 1 STOP BITS.

•SBUF - TRANSFER DATA VIA TxD.

•TR1SET TO START TIMER.

•TI FLAG BIT MONITORED.

Page 6: Pc Based Security System

SERIAL COMMUNICATIONSERIAL COMMUNICATIONSERIAL COMMUNICATIONSERIAL COMMUNICATION

WE SEND DATA “YES” SERIALLY TO THE PC.WE SEND DATA “YES” SERIALLY TO THE PC.WE SEND DATA “YES” SERIALLY TO THE PC.WE SEND DATA “YES” SERIALLY TO THE PC.

TO RECEIVE DATA SERIALLYTO RECEIVE DATA SERIALLYTO RECEIVE DATA SERIALLYTO RECEIVE DATA SERIALLY

•TMOD( TIMER MODE) REGISTER – TIMER 1 IN MODE 2.

•SCON (SERIAL PORT CONTROL REGISTER)

SERIAL MODE 1- 8 BIT DATA, 1 START AND 1 STOP BITS.

•SBUF - TRANSFER DATA VIA TxD.

•TR1SET TO START TIMER.

• RI FLAG BIT MONITORED.

WE RECEIVE DATA “DONE” SERIALLY FROM THE PC.WE RECEIVE DATA “DONE” SERIALLY FROM THE PC.WE RECEIVE DATA “DONE” SERIALLY FROM THE PC.WE RECEIVE DATA “DONE” SERIALLY FROM THE PC.

Page 7: Pc Based Security System

ALGORITHM:ALGORITHM:ALGORITHM:ALGORITHM:

• STEPPER MOTOR IS AT RESET POSITION.

• THE 8051 SCANS THE PORTS CONTINUOUSLY FOR ANY I/P FROM THE IR RECEIVER CIRCUITRY.

•ON RECEPTION OF SIGNAL AT THE PORTS, 8051 AUTOMATES THE STEPPER MOTOR TO PREDEFINED

ANGLES.

STEPPER MOTOR CONTROLSTEPPER MOTOR CONTROLSTEPPER MOTOR CONTROLSTEPPER MOTOR CONTROL

Page 8: Pc Based Security System

RESET STEPPER MOTOR (SM)

AND SCAN FOR I/P’S

START

I/P AT

PORT 1?

I/P AT

PORT 2?

ROTATE SM BY

B DEGREESROTATE SM BY

A DEGREES

SEND SIGNAL TO PC TO TAKE A PICTURE

YESYES

NO

NO

Page 9: Pc Based Security System

VISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMING----IIII

ALGORITHMALGORITHMALGORITHMALGORITHM::::• SERIAL COMM. PORT TO COMMUNICATE WITH MICRO CONTROLLER IS CHOSEN AND PORT SETTINGS ARE SET.

• THE COMM. PORT IS SCANNED FOR INPUT FROM THE MICRO CONTROLLER.

• ONCE THE PROGRAM RECEIVES THE REQUIRED INPUT, THE WEBCAM IS AUTOMATED TO TAKE A PICTURE.

• THE WEB CAM CAN TAKE ‘N’ NUMBER OF PICTURES DEPENDING ON THE REQUIREMENTS.

Page 10: Pc Based Security System

VISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMING----IIIIIIII

ALGORITHMALGORITHMALGORITHMALGORITHM::::

• AN ACTIVE-X CONTROL ezVidCap IS USED TO AUTOMATE WEB CAM.

• THE PICTURES TAKEN ARE IN BITMAP FORMAT.

• THE FORMAT OF THE PICTURE IS THEN CONVERTED FROM .bmp TO .JPEG BY COMPRESSION TECHNIQUE (USING Picformat32).

• THE .JPEG PICTURE IS THEN STORED IN THE SYSTEM AND SENT TO USER’S e-MAIL.

Page 11: Pc Based Security System

VISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMINGVISUALBASIC PROGRAMMING----IIIIIIIIIIII

ALGORITHMALGORITHMALGORITHMALGORITHM::::• MICROSOFT OUTLOOK IS USED TO SEND THE E-MAIL.

• A MISSED CALL OR A SMS MESSAGE IS SENT TO THE USER’S MOBILE / PHONE USING A DIAL-UP MODEM.

• ONCE DIALING A NUMBER IS COMPLETED THE PROGRAM COMMUNICATES WITH THE MICROCONTROLLER

• THE MICROCONTROLLER THEN RESETS ITSELF TO THE INITIAL POSITION AND STARTS TO SCAN FOR INPUT FROM THE IR RECEIVER.

Page 12: Pc Based Security System

SCAN FOR I/P FROM µC

CONVERT PICTURES FROM.bmp TO .JPEG

e-MAIL USING MICROSOFT OUTLOOK

DIAL A NUMBER

STOP

START

COMMUNICATEWITH µC

AUTOMATE WEBCAM

STORE PICTURES

Page 13: Pc Based Security System

IVM SOFTWARE IVM SOFTWARE IVM SOFTWARE IVM SOFTWARE

(ANSWERING ATTENDANT)(ANSWERING ATTENDANT)(ANSWERING ATTENDANT)(ANSWERING ATTENDANT)

� TELEPHONE ANSWERING MACHINE.

� CALL ATTENDANT. (RE-DIRECT INCOMING

CALLS).

� VOICE MAILBOX – STORES INCOMING

MESSAGES.

� INTERACTIVE VOICE RESPONSE SYSTEM

(IVRS).

Page 14: Pc Based Security System

FEATURES OF IVMFEATURES OF IVMFEATURES OF IVMFEATURES OF IVM

� CALL TRANSFER (CALL FORWARDING).

� REMOTE ACCESS (LISTEN TO MESSAGES

BY DIALING-IN).

� AUTOMATED OUTBOUND CALLS.

� UNLIMITED VOICE MAILBOXES.

Page 15: Pc Based Security System

FEATURES OF IVMFEATURES OF IVMFEATURES OF IVMFEATURES OF IVM

� AUTOMATIC MESSAGE FORWARD BY e-MAIL

OR UPLOAD TO INTERNET.

� SAVE IN-COMING MESSAGES AS WAV FILES.

� ABILITY FOR CALLER TO ENTER NUMBERS.

� ABILITY TO OPEN FILES OR RUN OTHER

SOFTWARES.

Page 16: Pc Based Security System

REMOTE ACCESS BY TELEPHONEREMOTE ACCESS BY TELEPHONEREMOTE ACCESS BY TELEPHONEREMOTE ACCESS BY TELEPHONE

ACCESS MAILBOXES:ACCESS MAILBOXES:ACCESS MAILBOXES:ACCESS MAILBOXES:

� LISTEN TO STORED MESSAGES.

� TRANSFER OR DELETE THE MESSAGES.

� ACCESS THE SYSTEM:ACCESS THE SYSTEM:ACCESS THE SYSTEM:ACCESS THE SYSTEM:

� SHUTDOWN THE SYSTEM.

� RESTART THE SYSTEM.

� OPEN ANY EXTERNAL APPLICATION.

� CLOSE THE RUNNING APPLICATION.

IVM IVM IVM IVM ANSWERING ATTENDANTANSWERING ATTENDANTANSWERING ATTENDANTANSWERING ATTENDANT

Page 17: Pc Based Security System

THE USER

PUTS A CALL

THROUGH.

PHONE

COMPUTER

WITH

INTERACTIVE VOICE

RESPONSE (IVR)

SOFTWARE

1.

2

DIALING A

SPECIFIC ACCESS

CODE-SOFTWARE

ENTERS

IVR MODE.

REGULAR

ANSWERING

MACHINE.

TRIGGERING THE

SECURITY SYSTEM.

CONTROLLING

THE

COMPUTER.

*RESTARTING

5

3

3

4

Page 18: Pc Based Security System

DOOR

CONNECTED

TO AN

ON –OFF

SWITCH

ALARM

SMS

PHONE CALL

SENDS IMAGES

ABOUT THE

SCENE AT HOME

THROUGH

E-MAIL.

WEB

CAM

COMPUTER

RECEIVES

THE SIGNAL &

TAKES

PREDEFINED

ACTION.

3.

2.

1.

4.

5.

6.

Page 19: Pc Based Security System

FUTURE ENHANCEMENTSFUTURE ENHANCEMENTSFUTURE ENHANCEMENTSFUTURE ENHANCEMENTS

• USING A GSM MODEMGSM MODEMGSM MODEMGSM MODEM

* * * * SMSSMSSMSSMS (SHORT MESSAGING SERVICE)

**** MMSMMSMMSMMS (MULTIMEDIA MESSAGING

SERVICE).

• THE SYSTEM MAY BE CUSTOMIZED:

* TRAPTRAPTRAPTRAP THE INTRUDERTHE INTRUDERTHE INTRUDERTHE INTRUDER

* PARALYSEPARALYSEPARALYSEPARALYSE THE THIEFTHE THIEFTHE THIEFTHE THIEF

Page 20: Pc Based Security System

REFERENCES REFERENCES REFERENCES REFERENCES ---- IIII

• IBM PC & CLONES, by B.GOVINDARAJALU.

• www.nch.com.au/ivmIVM SOFTWARE FROM “NCH SWIFTSOUND”.

• THE 8051 MICROCONTROLLER ANDEMBEDDED SYSTEMS, by MUAMMAD ALIMAZIDI & JANICE GILLISPIE MAZIDI.

• www.electronicsforu.com“ELECTRONICS FORYOU”

Page 21: Pc Based Security System

REFERENCESREFERENCESREFERENCESREFERENCES----IIIIIIII

• VISUAL BASIC 6-HOW TO PROGRAM, byDEITEL & DEITEL.

• THE COMPLETE REFERENCE-VISUAL BASIC 6 by NEOL JERKE.

• http://www.martin2k.co.uk/vb6/ezVidCapVIDEO CAPTURE CONTROL.

Page 22: Pc Based Security System

THANK YOU.THANK YOU.THANK YOU.THANK YOU.