Technical
Technical
4 Block Diagram
4.1 Circuit description 13
4.2 Circuit diagram 14
5 Software and Hardware are used 16
5.1 Software program and testing 16
5.2 Hardware assembling and testing 16
6 Results 17
7 Conclusion 19
8 Advantages and Diadvantages 20
9 Reference 21
ABSTRACT
In today’s high-speed world, security plays significant role. People are now more
concern of their belongings like valuable documents, jewelry, and many more material.
The safest place to keep all such valuable is bank. With the advancement in technology
there are many system designed to keep bank lockers safe.
The main objective of this paper is to use diverse technologies to create a bank
locker security system. A door- locking system utilizing RFID and GSM technology,
combined with fingerprint scanning and IR sensor activation, will be used to enable
secure access to bank lockers. This technology may unlock the door while simultaneously
activating, validating, and approving the user. As a result, it appears that the specified
system is very secure. It is possible to accomplish that by integrating hardware and
software. The ARM LPC 2148 microcontroller can be used to implement the hardware
component. The goal is to develop a system that is inexpensive, uses little power, is
simple to use, and is compact in size.
i
LIST OF FIGURES
S.No Fig No Name of the figure Page No
2 2.1 Odor detection steps 3
2 2.5 IR sensor 6
ii
LIST OF ABBREVATIONS
S.No Abbrevation Full form
1 GSM Global system for Mobile Communication
2 RFID Radio Frequency Identification
3 FDM Frequency division multiplexing
4 TDM Time division multiplexing
5 ARM Advanced risc architecture
6 LPC Low pin count
iii
1.INTRODUCTION
1.1 Introduction
It is said that a bank locker is the safest place to store valuable necessities. In light
of this, the security of these lockers has drawn considerable attention, particularly in
urban areas. As a result, most people either install multiple locks or use a digital solution
like alarm systems to address the safety danger. Alarm systems use a number of sensors
and come in a wide range of designs. The sensor system might not be reliable at all times.
However, it can recognize various environmental alterations, which are assessed and then
trigger an alarm based on a pre-defined value. Biometrics, including GSM, RFID, and
PIR sensors, exceed other technologies in terms of security and dependability. The great
performance of fingerprint scanning for identification is one of its advantages.
Therefore, we use fingerprint technology as an identity module. The goal is to
create a prototype to handle the serious problem of security for critical organizational
systems, including bank lockers with the appropriate authorization. An antenna or coil, a
transceiver (with a decoder), and a transponder (RF tag) with customized information are
the components of an RFID system. The market is filled with a wide variety of RFID
systems. These are divided into groups based on the frequency ranges.
Low-frequency (30-500 kHz), mid-frequency (900 kHz-1500MHz), and high-
frequency (2.4-2.5GHz) RFID kits are some of the models that are most frequently used.
An electrical device that monitors and detects infrared radiation in its environment is
called an infrared (IR) sensor. A GSM module is a specific kind of device that uses a SIM
card and requires a mobile operator subscription to function, much like a cell phone or
A GSM modem resembles a phone from the standpoint of a mobile operator.
Tags and readers are the two halves of the wireless system known as Radio Frequency
Identification (RFID). Tags can be passive or active, employing radio waves to transmit
their identity as well as additional information to adjacent readers. Readers can be mobile
so that they can be carried by hand, or they can be mounted on a post or overhead.
The LPC2141/42/44/46/48 microcontrollers combine a microcontroller with
embedded high speed flash memory with capacities ranging from 32 kB to 512 kB. They
are based on a 16-bit/32-bit ARM7TDMI-S CPU with real-time emulation and embedded
debug support.
1
32-bit code execution at the highest clock rate is made possible via a 128-bit wide
memory interface and a special accelerator architecture.The alternative 16-bit Thumb
mode cuts code by more than 30% with little performance hit for applications that require
small code sizes.
The LPC2141/42/44/46/48 are perfect for applications like access control and
point-of-sale where miniaturisation is essential due to their small size and low power
consumption. These devices are well suited for communication gateways and protocol
converters, soft modems, voice recognition, and low-end imaging because they have
serial communications interfaces that range from a USB 2.0 Full-speed device to multiple
UARTs, SPI, SSP, to I2C-bus and on-chip SRAM of 8 kB to 40 kB. They also have large
buffer sizes and powerful processors. The aforementioned microcontrollers are suitable
for industrial control and medical applications due to their various 32-bit timers, single or
dual 10-bit ADC(s), 10-bit DAC, PWM channels, 45 fast GPIO lines, and up to nine edge
or level sensitive external interrupt pins.
2
2. LITERATURE SURVEY
3
2.2 Security using pattern analyzer
In this system various levels of security are implemented. One security level is on
machine side and other level is on door side. Here authentication of a person is done by
RFID tag and a camera. When a person has to access the locker he has to swipe his tag.
Along with RFID one more authentication level is there. Camera which is installed in
strong room captures pattern password using OPEN CV to compare and recognize user
pattern for authentication. The other level of security is implemented with the help of
sensors like vibration sensors and temperature sensors near door for security issues.
4
Fig.2.3 Smartphone using NFC
2.4 Security using motion sensor
One of the key player technologies in security system is motion sensor. The motion
sensor is a device used to detect motions or different movements in the area around it.
The main function of such sensors is to detect intruder when there is no one in
organization or home or any institute. Motion sensors stand guard by alerting the control
panel system by sending signals whenever the sensor get tripped by changes in motion.
There are various types of motion sensors like passive motion sensor and active motion
sensor. Active motion sensor emits various energy signals like sound signals, infrared
signal, and microwave signal. Also few sensors use vibrations, ultrasonic waves
to detect motions.
Fig.2.5 IR Sensor
Fig.2.8.Fingerprint scan
8
3. PROPOSED SYSTEM
Here we are implementing a locker security system by using RFID and GSM technology.
RFID is a wireless technology of identifying objects with the help of radio waves. Main
components of RFID are RFID tag, RFID reader, and antenna. RFID tag consists of
information of locker holder. This tag has two main components antenna ,Integrated
circuit. In order to transmit and receive information to controller RFID reader is used.
Thus RFID reader is middle man between tag and controlling unit of locker system and
hence it also consists of antenna, RS232 cable and related circuitry. Locker account
holder will have RFID tag which will contain information about bank locker holder like
his name, locker number and like information. Whenever user has to access locker, he has
to first swipe RFID tag
If the tag is valid then user has to enter password through keypad. If the entered
password is correct then locker will be opened. If the entered password is wrong then
buzzer will be on indicating in authenticate user is accessing the locker. All these
activities are informed to user with the help of message through GSM technology. GSM
is a second generation digital cellular mobile system used to send text messages, calling.
GSM is also integrated to microcontroller to send message of activities. Thus here a
simple and convenient two level security is used to protect bank locker security, first
using RFID tag and other through password. As only two technologies are used it is
available to users at affordable price. Also because of simple circuitry there is less
maintenance. Besides this there are some limitations like user has to remember password
also there might be time delay in delivery of message due to poor network.
3.1 GSM and RFID Technology
The GSM (Global System for Mobile Communications) technology, which is a
cellular communication network standard, is frequently utilized by mobile phones and
other handheld devices. The fundamental operations of GSM technology require the
following actions:
Establishing a Connection: When a cell phone is powered on, it sends a signal to the
nearby base station in order to establish a connection. The base station validates the
request and subsequently sends the data back to the mobile phone to verify the
connection.
9
Authentication: After establishing a connection, the mobile device asks the network for
authentication. The network sends a challenge to the mobile device in order to encrypt a
secret code stored on the SIM (Subscriber Identity Module) card.
The code is encrypted on the mobile device and sent back to the network for verification.
If the code is accurate, the network verifies the mobile phone and assigns it a temporary
identity number, or TMSI.
Call setup: The mobile phone can now make and receive calls using the assigned TMSI.
Every time a call is made, the mobile phone sends a request to the network to connect to
the recipient's phone number.
The calling process: The call is routed to the nearest base station by the network after
finding the recipient's phone number. The base station sends a signal to the recipient's
phone to establish a connection.
Termination of a call: When the call is over, the mobile device signals the network to cut
off the connection.
GSM technology uses frequency division multiplexing (FDM) and time division
multiplexing (TDM) to send and receive signals. TDM produces time slots from the
available bandwidth and assigns a unique user to each one. When utilizing FDM to
segment the available frequency spectrum into various channels, each channel is assigned
to a different user. In the same frequency spectrum, many users can cohabit without
interfering with one another because to this.
GSM technology also makes use of a number of security measures to protect network and
mobile phone communication. These include encryption, authentication, and
authorization methods to guarantee that only authorized users can access the network and
communicate safely.
Fig.3.1 Working of GSM Network
RFID: Radio waves are used in RFID (Radio Frequency Identification) technology, a sort
of wireless communication technology, to identify and track persons or items.
10
The three steps that make up the basic operation of RFID technology are tag activation,
data transmission, and data receiving.
Tag activation: When an RFID reader sends a radio signal to an RFID tag, the antenna on
the tag activates. The tag's antenna then signals to the reader that it is prepared to
communicate by sending a signal back.
Data transmission: When the tag becomes operational, it communicates information to the
reader via radio waves. The tag has the capability to carry out data, including data
pertaining to its specific ID, setting, and status.
Active, semi-active, and passive RFID tags are all accessible. Since passive RFID tags
remain battery-less, they must rely on the scanner's power to transmit data. Active RFID
tags have a unique power supply and can transmit data over farther distances. Semi-
passive RFID tags have their own power supply for some activities but rely on the reader
for communication.
Data reception: The data sent by the tag is ingested and analyzed by the RFID reader. The
reader can then utilise this information for a variety of purposes, including managing
assets, monitoring access control, and keeping track of inventory.
Asset tracking, supply chain management, access control, and inventory management are
a few uses for RFID technology. Additionally, it can be combined with other
technologies, including sensors and GPS, to provide real- time tracking and object or
person observation.
Generally speaking, RFID technology provides a useful and efficient way to identify and
follow people or things without direct physical touch or line of sight. Due to its ability to
function in difficult circumstances and provide real-time data, it is a useful tool in
many industries.
11
4.BLOCK DIAGRAM
The block diagram of Bank locker system based on RFID and GSM technology is shown
in the figure3. It comprises the power supply section, keyboard, RFID Reader, AT89C51
microcontroller, MAX232driver, relay driver and GSM modem, LCD. The GSM board
has a valid SIM card with sufficient recharge amount to make outgoing calls. The circuit
is powered by regulated +5v dc.
13
Capacitor C2 bypasses the ripples present in the regulated supply. LED1 acts as the
power indicator and R1 limits the current through LED1.The power supply section is
shown in the figure
Fig.4.1Power Supply
14
The compact circuitry is built around Atmel AT89C52 microcontroller. The AT89C52 is
a low-power; high performance CMOS 8-bit microcomputer with 8 kB of Flash
programmable and erasable read only memory (PEROM). It has 256 bytes of RAM, 32
input/output (I/O) lines, three 16-bit timers/ counters, a six-vector two level interrupt
architecture, a full-duplex serial port, an on chip oscillator and clock circuitry. The system
clock also plays a significant role in operation of the microcontroller. An 11.0592MHz
quartz crystal connected to pins 18 and 19 provides basic clock to the microcontroller.
Power-on reset is provided by the combination of electrolytic capacitor C3 and resistor
R1. Port pins P2.0 through P2.7 of the microcontroller are connected to data port pins D0
through D7 of the LCD, respectively. Port pins P3.7 and P3.6 of the microcontroller are
connected to register-select (RS) and enable (E) pins of the LCD, respectively. Read/write
R/W pin of the LCD is grounded to enable for write operation. All the data is sent to the
LCD in ASCII format for display. Only the commands are sent in hex form. Register-
select (RS) signal is used to distinguish between data (RS=1) and command (RS=0).
Preset RV1 is used to control the contrast of the LCD. Resistor 10k limits the current
through the backlight of the LCD. Port pins P3.0 (RXD) and P3.1 (TXD) of the
microcontroller are used to interface with the RFID reader through Max232(1) and GSM
Modem are used to interface through Max232(2). When an allowed person having the tag
enters the RF field generated by the RFID reader, RF signal is generated by the RFID
reader to transmit energy to the tag and retrieve data from the tag. Then the RFID reader
communicates through RXD and TXD pins of the microcontroller for further processing.
Thus on identifying the authorized person, the authorized person enters the password
through keyboard and send to the microcontroller. If the password is correct then the
microcontroller send the SMS to the account holder person, account holder again send the
password through SMS to the microcontroller. The microcontroller verifies the password
and received password through GSM mobile. If this password is correct, the
microcontroller provides high signal to port pin P3.2, transistor Q2 drives into saturation,
and relay RL1 energizes to open the bank locker. Simultaneously, the LCD shows “access
granted” message and send to and port pin P1.7 drives piezo buzzer PZ1 via transistor T1
for aural indication. If the password is not valid, the LCD shows “access denied” and the
bank locker doesn’t open.
15
16
Password entering is the second step in the authentication process. After the RFID
scanning is successfully completed the system asks the user to enter the password set in
the beginning.
GSM Module is used to send a notification to the owner when the locker is being
accessed in an unauthenticated manner. If any of the above steps fail then the notification
is sent via the SMS to the user’s registered phone number.
18
7.CONCLUSION
In this report , we have first reviewed the recently proposed locker key for
banking though they are secured there are some disadvantages .It may provide wrong
person access the account. So in our project we are implementing sensors vibration,
temperature sensor on the door side for security purpose. Two level of authentication
password is needed to provide high security. RFID tag is provided for authentication of
user id. The camera is installed to capture the face of user and the face recognition is done
to recognize the user face. If the thief accesses the bank locker an immediate door lock is
applied and message is intimated to bank manager. This system is secure and less cost it
will be a best banking system. Timer is on for accessing the bank locker it’s locked
automatically while the user exceeds the time as well as message notification also
intimated to the manager
19
ADVANTAGES
Provide high security.
No question arise to hack or crack system.
No need to remember username.
Easy to use
Fully automatic System.
Dual layer security with fingerprint and password
DISADVANTAGES
9.REFERENCES
21