0% found this document useful (0 votes)
15 views94 pages

Fingerprint Identification Technology Using Arduino With Short Message Service

The document presents a capstone project focused on developing a fingerprint identification locking system using Arduino and SMS technology, aimed at enhancing security for households. It outlines the project's design, hardware and software components, and evaluates its performance in terms of accuracy and reliability. The study highlights the importance of biometric authentication in preventing unauthorized access and aims to provide a practical solution for secure access control.

Uploaded by

savetheracoon04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views94 pages

Fingerprint Identification Technology Using Arduino With Short Message Service

The document presents a capstone project focused on developing a fingerprint identification locking system using Arduino and SMS technology, aimed at enhancing security for households. It outlines the project's design, hardware and software components, and evaluates its performance in terms of accuracy and reliability. The study highlights the importance of biometric authentication in preventing unauthorized access and aims to provide a practical solution for secure access control.

Uploaded by

savetheracoon04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 94

Locking System: Fingerprint Identification

Technology using Arduino with Short Message Service

A Capstone Project Presented to the Faculty of the


College of Computer Studies
ICCT Colleges Foundation Inc.

In Partial Fulfilment
of the Course Requirements in
Bachelor of Science in information Technology

Presented by:

JHON CEDRICK KING BARTOLOME

MICHAIL KENT DELOS REYES ENGRACIA

FRANCIS RAMOS FERANCULIO

RODOLFO SALAK IBAÑEZ III

MA. ERICA LAURAS

JAYLLOYD SAMILING MAMURI

VINCENT ADRIAN CELIS MARCELO

JATHNIEL SALENGA MEDICO

ARON GEMUEL MAGDAONG SABORNIDO

MARK ANTHONY CADILO YU

AUGUST 2024
ACKNOWLEDGEMENT

The researchers would like to extend their sincere

appreciation to the following people who willingly took part in

making this study a reality

To the researchers FAMILY, for the financial, moral, spiritual

support and guidance that gives inner strength for us.

To FRIENDS and CLASSMATES for their care and support

that made this research successful.

To FACULTY for taking care our research and guiding us.

To ICCT COLLEGES for the opportunity that are given to us

for providing us knowledge.

And above all, to ALMIGHTY GOD for the strength, wisdom

guidance and endless blessing he pours to the research.

ii
APPROVAL SHEET

This capstone project entitled “Fingerprint Identification

Technology using Arduino with Short Message Service”

prepared and submitted by Aron Gemuel M. Sabornido, Mark

Anthony C. Yu, Jathniel S. Medico, Ma. Erica Lauras, Vincent

Adrian C. Marcelo, Jaylloyd S. Mamuri, Francis R. Feranculio,

Michail Kent D. Engracia, Jhon Cedrick K. Bartolome, and

Rodolfo S. Ibañez III in partial fulfillment of the requirements for

the degree of Bachelor of Science in Information Technology

has been examined and is recommended for acceptance and

approval.

Mr. JERICO M. VILOG


Adviser

APPROVED BY

____________________ ____________________
Panel Evaluator Panel Evaluator

____________________ ____________________
Panel Evaluator Panel Evaluator

Accepted as partial fulfillment of the requirements for the degree of


Bachelor of Science in Information Technology to be
Completed by the students.

Mr. JERICO M. VILOG


Officer in Charge, College of Computer Study

iii
ABSTRACT

In this project, the researchers present the design and


development of a strong locking mechanism utilizing Arduino
microcontroller technology and a biometric fingerprint scanner. With
an increasing demand for secure access control systems, the
biometric authentication offers enhanced security and convenience.
The system employs a fingerprint scanner to authenticate users,
minimizing the need for traditional keys or access codes. The
Arduino microcontroller facilitates the integration of the fingerprint
scanner with the locking mechanism, enabling real-time processing
of biometric data and control of the locking mechanism. The
researchers discuss the hardware and software components utilized
in the system, including sensor interfacing, and data processing
algorithms. Furthermore, the researchers evaluate the performance
of the developed locking mechanism in terms of accuracy, response
time, and reliability. Overall, this study contributes to the
advancement of biometric-based locking mechanisms, offering a
practical solution for enhancing security and access control.

iv
TABLE OF CONTENTS

ACKNOWLEDGEMENTS.............................................................

.. ii

APPROVAL

SHEET...................................................................... iii

ABSTRACT.............................................................................

... iv

TABLE OF

CONTENTS................................................................... v

LIST OF

TABLES..........................................................................vi

Page

Chapter 1.

INTRODUCTION................ ............................................1

1.1 Background of the

Study...........................................1

1.2 Statement of the

Problem..........................................2

1.3 Significance of the

Study...........................................2

1.4 Scope and Delimitation of the

Study.............................3

Chapter 2. TECHNICAL BACKGROUND………………...……….

……………..5

v
2.1 Hardware…………………….……………………………...

….5

2.2 Software…………………….………………………….…....

….9

Chapter 3. REVIEW OF RELATED LITERATURE AND

STUDIES…...........…10

3.1 Review of Local Literature……………….………………..

…10

3.2 Review of Local

Studies……………………………………….11

3.3 Review of Foreign Literature…………………………….

….12

3.4 Review of Foreign

Studies………………………………......13

3.5 Conceptual Model of the Study

………………………….....15

3.6 Definition of

Terms…………………………………………...16

Chapter 4. RESEARCH DESIGN…......................

………………………….18

4.1 Methods of

Research………………………………………….18

4.2 Sources of Data…………………………………………….

….23

v
Chapter 5. PRESENTATION, ANALYSIS, AND INTERPRETATION OF

DATA.24

5.1 Tabular Presentation of

Data.....................................24

5.2 Graphical Analysis of

Data.......................................32

5.3 Interpretation of

Data.............................................37

Chapter 6. SUMMARY, CONCLUSION, AND

RECOMMENDATION………..41

6.1 Summary of

Findings..............................................41

6.2

Conclusion..........................................................42

6.3

Recommendations.................................................42

BIBLIOGRAPHY.......................................................................

...44

APPENDIXES..........................................................................

...45

1. Research

Profile.....................................................45

2. Copy of Project

Design.............................................55

LIST OF TABLES

vi
Page

Table

1.....................................................................................25

Table

2.....................................................................................27

Table

3.....................................................................................29

vi
Chapter I

INTRODUCTION

This chapter presents the background of the study, the

statement of the problem, the significance of the study and the

scope and delimitations.

Background of the Study

In this study, the researchers are going to make a locking

system that we call FITA SMS that can unlock a door using only their

fingerprint. A household is having a hard time when it comes to

making sure that only their residents have access to unlock their

door and only their residents can go inside the household to avoid

any crime that can be dangerous.

There are a lot of people who are experts when it comes to

opening a traditional door lock without even using a key, the

researchers will be going to establish a device that will only allow

authorized person to enter the household, we are going to use

biometric scanner to make sure that only registered person can

unlock the door to ensure that no intruder can access the door

without the owner consent.

Fingerprint Scanners are used for recognizing and

authenticating the fingerprint of an individual. Fingerprint readers

and the scanners are safe and reliable devices for any security.

1
Statement of the Problem

The rising cases of trespassing incidents highlight the urgent

need to improve the security measures, Intruders entering

establishment personal rooms not only disrupt operations but also

threaten the safety of the person. These incidents often involve

criminals and put the safety of people in those places at risk. The

researchers raise a question on how effective the current security

measures are in protecting the rooms. Given this situation, the

researchers study aims to enhance the security by focusing on

fingerprint access. The researchers will look into current security

methods and find any weaknesses that intruders might exploit. By

using advanced security tools and better ways to control who can

enter, it can protect the personal belongings of the person better

and keep everyone safe.

This study aims to investigate the security aspects of normal

locks with fingerprint recognition systems.

1) What is the significant difference of using FITA SMS to a

traditional lock? 2) How does integrating SMS technology improve

security and monitoring? 3) What is the performance level of FITA

SMS in terms of:

3.1 Security

3.2 Accessibility

3.3 Monitoring

Significant of the Study

2
This FITA SMS is conducted to benefits the following:

Household- maintaining personal data and making sure it isn't

accessed without permission. Ensuring that sensitive data, such as

personal information is only accessed by authorized individuals.

2
Educators- Educators who plan to do relevant research on lock

mechanisms will find this study to be a useful reference. They can

use it as a guide when conducting similar studies.

Scope and Delimitations of the study

The unique aspects of the biometric system used in the FITA

SMS will be discussed in this study. This study will show and

illustrate how locks have changed throughout time, from basic metal

locks to electronic locks, and it will provide a quick overview of

biometrics.

This study aims to understand how biometric technology can

offer trustworthy user authentication, which is essential for a safe

locking system. We researchers will be focusing mainly on the

security of a household. This will benefit security of their household

to prevent the exploitation of private information inside the

household and preventing unauthorized persons from accessing the

device.

In the enrollment process user will only need to register their

biometric on the device. If an enrolled person accesses the device

the lock mechanism will trigger to unlock the door, however when

an unenrolled person tried to access the device it will automatically

trigger the warning buzzer to alarm the owner that there is an

intruder who is trying to access the device without permission.

The FITA SMS project has its limits, which help us stay focused

and practical with the resources and time we have. Looking ahead,

we're excited about adding new features to support people with

3
disabilities (PWDs) who might struggle with our fingerprint scanner.

For example, imagine someone who can't use the scanner because

they don't have a hand. We're planning

3
to introduce a feature where they can unlock the system by sending

a simple SMS through their device. They just register their number,

and no need for a fingerprint scan. Since our budget is tight and

we're still learning, our first step is to set up notifications. This way,

users will know whenever someone tries to access the system. It is a

small but important step towards making FITA SMS more accessible

and secure. As we grow and learn from user feedback, we'll keep

improving FITA SMS to meet the needs of everyone, especially those

with different abilities. Our goal is to create a system that's not only

easy to use but also inclusive and empowering for all users

4
Chapter II

TECHNICAL BACKGROUND

This chapter presents the Hardware of the study that

researcher will use in order for the FITA SMS mechanism to process

as well as the purpose of each device.

Hardware

DC Male Plug - Power supply for the Arduino Uno and other

components.

Figure 1

Battery - Power source for portable operation.

Figure 2

Button – Use to interact with the hardware

Figure 3

5
Solenoid Door lock - Actuator or mechanism controlled by

Arduino to lock/unlock a door.

Figure 4

Jump Wires - Used for making connections between

components on the breadboard.

Figure 5

Arduino Uno board – Microcontroller used as the brain of the

project. Fingerprint sensor: Biometric sensor used for authentication.

Figure 6

6
Buzzer - Used for generating sound alerts or signals.

Figure 7

LCD screen with I2c - Display for showing information or

feedback.

Resistors. Used to limit current flow, adjust signal levels, or provide

voltage division in the circuit.

Figure 8

GSM Module - A GSM module is a device that allows

electronic devices to communicate with each other over the GSM

network.

7
Figure 9

7
Relay - A solenoid lock typically requires a relatively high

amount of current to operate. Using a relay allows you to control

the power supply to the solenoid lock using a low-power signal. This

is particularly useful when integrating the lock into electronic

systems, such as access control systems or automated locking

mechanisms.

Figure 10

Fingerprint Reader Sensor Module - The fingerprint

module is largely divided into a sensor that captures a fingerprint

image and a processing board that processes the fingerprint

recognition algorithm and stores/deletes the fingerprint template.

Figure 11

8
Software - This chapter presents the Software of the study that

researcher will use in order for the FITA SMS mechanism to process

as well as the purpose of each device.

Arduino IDE - This is the software we used to program our

system.

Library used:

Liquid Crystal- The library allows to control I2C

displays with functions extremely similar to LiquidCrystal library.

Software Serial- is a library that enables serial

communication with a digital pin other than the serial port.

Adafruit Fingerprint Sensor- refers to a specific

fingerprint recognition module developed by Adafruit Industries.

This sensor is designed to integrate fingerprint scanning capabilities

into various electronic projects, typically controlled via

microcontrollers like Arduino or Raspberry Pi. It allows users to enroll

fingerprints, verify identities, and integrate biometric security

features into their applications.

Programming Language C++- is a general-purpose programming

language that was developed as an extension of the C programming

language. It supports both procedural and object-oriented

programming paradigms, making it versatile for a wide range of

applications, from system software and game development to

enterprise applications and embedded systems.

9
Chapter III

REVIEW OF RELATED LITERATURE AND STUDIES

This chapter includes the Review of Related Literature and

Studies, Conceptual Model of the Study, and the Definition of Terms.

Review of Local Literature

According to Alvin Jason A. V. and Enrique D. F. (2019), In order

to create a safer community, this paper presents an exploratory

study on users' intentions to accept and embrace a face recognition-

based identity verification system embedded in a mobile device.

The quantitative analysis empirical findings indicate that design,

security, perceived utility, and perceived usability are the key

factors that influence a user's intention to adopt new technology.

According to Anna Liza R. et. al, (2019) In accordance with

new technological applications like facial recognition, security

protects people, data, and property along with the associated

safeguards. By sending signals to a Raspberry PI Controller, their

study seeks to examine the impacts of lighting models on the

performance of recognition together with various angles and

distances utilized for door access. The study created 240 training

datasets and used the top techniques, including Euclidean Distance

for recognition, Support Vector Machine for classification, Haar-

Cascade for face detection, and Principal Component Analysis for

extraction. Five people were used in the study to evaluate the

model, which resulted in scores of 100% for fluorescent light,

10
74.65% for candlelight, and 88% for flashlights, with an average

percentage accuracy of 89.5.

9
By using research methodology steps like analysis and data

collection, as well as by designing tools by describing some of the

main supporting tools, it can be concluded that this occurs because

the house door security system still uses conventional, which is

categorized as unsafe or easily broken into. The problem can be

minimized by using technology that is currently developing and is

already well systemized, namely using a micro contour. The door

can later be controlled using Android via a WIFI network as a remote

control and an alarm buzzer, which will function if the fingerprint

identification process fails, the alarm will sound as a warning sign,

and it will be determined to design a safety device. The fingerprint

sensor is used as a process for recording and identifying

fingerprints, and a NodeMCU is used to connect to a WIFI network.

For a better system, the door employs an Arduino-based fingerprint

and alert buzzer. Only fingers that are registered can open the door.

In order to reduce crimes like theft, it is anticipated that this

research will be able to improve the security of doors in people's

homes.

Review of Local Studies

As eloquently stated by Melanie M. R. and Ariane M. T. (2020),

Every firm should strategically prioritize attendance tracking.

Utilizing biometrics, radio- frequency identification, Bluetooth and

smart technologies, Internet of Things (loT), cloud computing, or

face recognition technology have replaced the use of paper-based

attendance monitoring. Tempus is an automatic attendance tracking

11
system that accepts data using facial recognition technology,

processes it in real- time using loT, and outputs it

9
using portable mobile platforms. Both hardware and software are

included in it.

Review of Foreign Literature

In this project of Fingerprint identification-based system with

SMS notification, we are developing a system that is fully capable of

automatically marking and storing the attendance of individual

students. This stored data can further be calculated in order to

determine the percentage of the individual’s attendance. Further,

with the help of this project we are also able to send an SMS to the

desired mobile number using a GSM module which contains

information regarding the time and date of the individual’s “Entry”

and “Exit” into the classroom, workspace etc.

According to Venkatesh Seerapu (2022) attendance plays a

very vital role in any student’s life. It is one of the important criteria

that are strictly monitored, apart from giving detailed attention to a

student’s academic and co-curricular performs many institutes also

give proper attention to the attendance of the individual student.

Though the attendance is given such importance many institutes fail

to maintain a proper mechanism for taking and storing the

attendance. The major reason for developing this project is to

overcome the various drawbacks which are present in the current

manual system of marking the attendance. The major reason for

developing this project is to overcome the various drawbacks which

are present in the current manual system of marking the

attendance.

12
According to Saroj Singh (2020) Bio metric systems have

overtime served as robust security mechanisms in various domains.

Fingerprints are the oldest and most widely used form of bio metric

identification. The use of

9
fingerprint for identification has been employed in law enforcement

for about a century. This project highlights the development of

fingerprint verification. Verification is completed by comparing the

data of authorized fingerprint image with incoming fingerprint

image. Then the information of incoming fingerprint image will

undergo the comparison process to compare with authorized

fingerprint image. Fingerprint door lock incorporates the proven

technology. Fingerprint reader scanning is the most mature and

tested type of bio metric technology. Recent studies on bio metrics

have shown that compared to the hand method, fingerprint is more

accurate and cost-effective. The duplication of bio metric fingerprint

technology is virtually impossible, only one in one billionth of a

chance. Bio metric security guarantees a positive method of user

identification with something that cannot be lost, replicated or

stolen. fingerprint based door lock system can achieve all these

features.

Review of Foreign Studies

According to Tole Sutikno (2023), crime cases in Indonesia

reached 105,133. Cases of theft with aggravation dominate the

majority of cases. Everyone is concerned about safety, but doors are

typically opened and closed using physical keys. This is vulnerable

to being tampered with fake keys, which can lead to house break-

ins and theft. In this research, we propose a fingerprint-based

wireless door lock design using Arduino and a smartphone. The

results of the fingerprint-based wireless door lock using Arduino and

13
a smartphone can function well, with an average response time of

1.20 seconds. Furthermore, testing the HC-05 Bluetooth when

sending

9
signals to a smartphone shows that it can read data accurately with

an average response time of 1.54 seconds.

In 2023, crime cases in Indonesia increased by 30.7% from

2022, with a total of 105,133 cases. According to data from the

National Police of the Republic of Indonesia, 30,019 cases of

aggravated theft make up the majority of these cases. One of the

crimes of cheating is theft in the house or yard by damaging and

uncovering it to enter the house and cause a criminal case. The

National Police of the Republic of Indonesia urges everyone to

always be alert and to always provide a proper security system for

their homes. Currently, the only doors available on the market have

physical keys to securely open or close the door of a building.

However, physical keys are vulnerable to being tampered with fake

keys, which can lead to house break-ins and theft. With rapidly

developing technology, people are looking for devices to ensure

safety and comfort in their homes. There are currently several types

of security device technology, such as facial recognition, finger

geometry (finger size and position), iris recognition, vein

recognition, retina scan, and voice recognition. Smart door locks

using biometrics have the advantage of higher security. In a smart

home, the security system is a very important part. Fingerprint

recognition is one of the most secure systems because a person's

fingerprint is never coordinated with anyone else's. So, someone's

access to the door lock can be limited. The expected result is the

14
ability to unlock home doors automatically using a fingerprint sensor

and hardware that is connected to a smartphone.

9
Conceptual Model of the Study

Startup

Initialize
components
and display
the welcome
message on
the LCD

Output:
Main
LCD: Update based on Menu:
menu navigation and
actions.
Buzzer: Sound on Display
actions (e.g., beep 3 options
times on unauthorized
access ). (Enroll,
Door Lock: Unlock if Delete,
fingerprint verification is Unlock,
successful. Settings)
SMS: Send notification on Process
specific events.
Loop: Continuously Input:
monitor inputs and
process accordingly.
Enroll Fingerprint:
Navigate to enroll menu
and scan fingerprint.
Delete Fingerprint:
Navigate to delete
menu, choose
fingerprint to delete.
Unlock Door: Scan
fingerprint for
verification.
Settings: Navigate
using up, down, and
back buttons.

Figure 12: Input Process Output

Figure 12 shows the data of stored fingerprint that are

scanned directly to the sensor, the Arduino then process the

obtained data sending it the board to find the match of the

fingerprint and if the stored fingerprint has matched the data, it

sends a signal to the board to unlock the door.

15
Definitions of Terms

The following are the terms used by the researcher in the

study to have a parallel understanding with the readers.

Fingerprint Sensor - A device that captures an image or

other data related to a person's fingerprint. It may use various

technologies such as optical, capacitive, or ultrasonic methods to

capture the fingerprint data.

Door Lock Mechanism - The physical mechanism

responsible for securing or releasing the door. It can be an electric

strike, a servo motor, or a solenoid, controlled by signals from the

Arduino microcontroller.

Arduino - An open-source electronics platform based on easy-

to-use hardware and software. It consists of a microcontroller and a

development environment for writing code to control electronic

devices.

Microcontroller - A small computer on a single integrated

circuit containing a processor core, memory, and programmable

input/output peripherals. The Arduino Uno is a popular

microcontroller board used in many projects due to its simplicity and

versatility.

Authentication - The process of verifying the identity of an

individual. In the context of a fingerprint sensor door lock,

authentication involves comparing the captured fingerprint data

with stored templates to determine if there's a match.

16
Biometric Security - A security measure that uses unique

biological characteristics, such as fingerprints, iris patterns, or facial

features, for authentication purposes. Fingerprint sensor door locks

utilize biometric security by verifying the fingerprint of an individual

before granting access.

18
Template Matching - The process of comparing the captured

fingerprint data with stored fingerprint templates to determine if

there's a match. This involves analyzing the unique features of the

fingerprint, such as ridge endings and bifurcations.

Internet of Things (IoT) - describes devices with sensors,

processing ability, software and other technologies that connect and

exchange data with other devices and systems over the Internet or

other communications networks.

Traditional lock – this are the most common locks used in

residential places. They ‘re the ones needed to be engaged

manually to make it work.

17
CHAPTER IV

RESEARCH DESIGN

This chapter will discuss the method used in this research and

the sources of data will conducting this research project.

Methods of Research

To empirically investigate, an agile approach would be more

appropriate for “Locking System: Fingerprint Identification

Technology using Arduino with Short Message Service (SMS)”

project. Agile methodologies are recommended for projects with

changing requirements, iterative development and quick feedback

loops that mirror the dynamic nature of developing FITA SMS.

Researchers use Cluster sampling when looking for a

respondent to test our project, cluster sampling is a way to pick a

sample from a big group of people. Instead of picking each person

one by one, you divide them into clusters based on things like where

they live or their job. Then, you randomly pick some clusters and

include everyone in those clusters in your sample. It's useful when

the group is large and spread out because it makes sampling easier

and cheaper. The goal is to have a sample that represents the whole

group by randomly choosing clusters.

These practices encourage iterative development, continuous

integration and incremental improvement. They best facilitate

team’s response to changes in the system as it is developed. The

agile principles are considered flexible, cooperative and adaptable

thus making them most applicable in projects with complex

18
technology integration such as Arduino, Fingerprint, Short Message

Service (SMS) and Arduino.

18
Extreme Programming (XP) was also chosen for this project

alongside Agile because of its compatibility with web development

and its step-by-step process. Additionally, the principles of XP like

User Stories, Release Planning, Pair Programming, Test-Driven

Development (TDD), Continuous Integration (CI), Refactoring,

Simple Design. Collective Code Ownership. Onsite Customer and

Small Releases among others offer focused approaches which add

value to Agile thereby enhancing efficiency and ensuring high

quality results. Testing and validation are frequently performed

during the XP process to ensure that it works accordingly.

Throughout the development cycle, unit testing, integration testing

and system testing are done iteratively. This guarantees that each

component works well and can be successfully integrated with

others. The identification of issues in time and addressing them

early reduces delays, thereby leading to higher quality end product.

The researchers begin by conducting interviews, surveys, and

literature review to gather both functional and non-functional

requirements for the system. They are then ranked according to

their importance to the success of the system. Thereafter, a detailed

requirement document is developed with all the identified

requirements, descriptions and acceptance criteria.

The research of this study is to create a fingerprint

identification technology integrated with Arduino and SMS in order

to secure locking system. It will be an inventive method of

19
regulating access to restricted areas or devices. In order to achieve

this, it is very important for a

19
comprehensive research methodology that will guarantee the

creation of a dependable and effective system.

Security systems have been changed by the technology of

identifying a person’s fingerprint, making it more traditional and

reliable. Arduino microcontrollers have further contributed to its

integration into different systems such as sophisticated locking

devices having additional features.

The discussion will cover details of fingerprint identification

technology, Arduino based implementation and the use of Short

Message Service (SMS) for better security measures and alerts.

Fingerprint identification technology works on the basis that each

person has a unique pattern in their fingerprints which can be used

to identify them. Systems are able to authenticate individuals with

high accuracy through capturing and analyzing these patterns.

There are numerous advantages for using fingerprint

identification for security reasons: unlike conventional methods like

passwords or keys that can be easily duplicated or stolen,

fingerprints offer an extremely safe way of verifying someone’s

identity. The flexible open-source platform called Arduino is

commonly preferred in implementing the fingerprint identification

technology mainly because of its flexibility and ease to work with.

20
Data Analysis

Data Analysis is to understand the responses from the survey

and know how to design and develop a meaningful system. It helps

researchers to find out common trends, preferences and areas of

concern among its users using statistical analysis methods.

Prioritizing features, refining system requirements and optimizing

user experience are some of the benefits of this analysis. For

example, majority of users may prefer voice control in place of

mobile app control as revealed by survey data analysis. This would

make it necessary to prioritize voice recognition during

implementation.

Data Collection Methods

Data collection for this research is critical for understanding

user preferences, needs, and expectations for FITA SMS. Surveys

are an effective method for gathering information on a variety of

user needs and preferences. To address the subproblems of

accessibility, Security, Monitoring and challenges or considerations,

the survey may include particular questions that user may answer

based on their experience on using FITA SMS.

For accessibility, questions may focus on how accessible the

FITA SMS, whether they have any physical problem or disabilities

that can affect their ability to operate the FITA SMS device, and

what features they would like to suggest to enhance accessibility of

the device. For example, researchers might inquire about the need

for button or text message to access the FITA SMS if they have a

21
problem accessing the fingerprint scanner, they can use the

additional features in order to operate the device

21
even if they can’t operate it using the fingerprint scanner.

Regarding the security of the device, surveys questions will answer

how secure the user feels while using the device, it will be

compared to the traditional lock in order to gather information if the

FITA SMS is better when it comes to user security.

On monitoring, survey questions will be used to gathered data

on how the user can monitor people that can access the FITA SMS,

on this device only registered identity can access the device to open

the lock mechanism once a un identified person tried to access the

device the buzzer will be triggered to alarm the user.

To address challenges or considerations, the survey might

inquire about users' experiences with the FITA SMS, including any

issues or limitations they have encountered. Questions may cover

setup difficulties, SMS compatibility with smartphones, and data

privacy and security concerns. Understanding these issues allows

researchers to design a system that addresses user concerns while

also providing solutions to improve usability and pleasure.

Survey information on user’s expectations for system

dependability and responsiveness will be gathered. When it comes

to the system's responsiveness to commands and dependability

under various circumstances, users could have certain expectations.

Possible inquiry topics include the minimum reaction times needed

for different types of instructions and the dependability needed for

connectivity and operation in different environments.

22
In addition, surveys ought to be used to get input on how well

the FITA SMS user interface works and how simple it is to perform

commands. Questions can gauge how satisfied users are with the

accuracy and responsiveness of fingerprint scanner as well as their

preferences for the app's appearance, navigation, and feature

accessibility. Comprehending user preferences and interface design

pain points aids researchers in optimizing the user experience and

guaranteeing that the FITA SMS system fulfills consumers'

requirements and anticipations.

Sources of Data

To gather essential data for this capstone project, we have

developed a Google Form survey focused on understanding user

preferences, requirements, and expectations related to FITA SMS.

The survey includes specific questions aimed at exploring issues

surrounding security mentoring and accessibility. Participants are

asked about their experiences with previous systems, their current

interactions with FITA SMS, and their suggestions for improving

system reliability. In addition to gathering feedback on security

mentoring and accessibility, the survey seeks insights into users'

perceptions of the SMS interface design and interactions with

fingerprint commands. Enhancing user experience is a key goal, and

input from participants is crucial to ensure that the system meets

their standards and improves overall satisfaction. We encourage

broad participation to ensure a comprehensive understanding of

user needs and satisfaction levels with our system's performance in

23
security mentoring and accessibility. Your contributions will greatly

aid in designing a system that aligns with user expectations and

enhances usability.

23
Chapter V

PRESENTATION, ANALYSIS, AND INTERPRETATION OF DATA

This chapter aims to present, analyze, and interpret the data

gathered from the implementation of a fingerprint lock mechanism

with SMS notification (FITA SMS) and a traditional lock. The data

were collected to assess the performance of these two systems in

terms of security, accessibility, and monitoring.

Tabular Presentation of Data

Formula
n = total number of respondent’s

∑ (answer of respondents * ratings)

Scale Interpretation

4.20 – 5 Strongly Agree

3.40 – 4.19 Agree

2.60 – 3.39 Neutral

1.8 – 2.59 Disagree

1 – 1.79 Strongly Disagree

Research Question No.1. What is the significant difference of

using FITA SMS to a traditional lock?

To determine the significance difference of FITA SMS to

traditional lock respondents were given questionnaire to determine

the significance difference of each device. From the computed

weighted mean the level of involvement was identified using the

scale below.

24
Table 1

Strongl Agree Neutra Disagre Strongl Mean


y Agree l e (2) y
(5) (4) (3) Disagre
e (1)
FITA SMS: Uses 16 20 4 0 0 4.30
fingerprint
recognition,
which is unique
to each
individual and
difficult to
duplicate or
forge.
Percentage of 40% 50% 10% 100%
Respondents

Traditional 11 18 7 3 1 3.88
Lock:
Uses physical
keys that can be
lost, stolen, or
duplicated.
27.5% 45% 17.5 7.5% 2.5%
%

25
FITA SMS: 16 18 6 0 0 4.25
Sends
immediate SMS
notifications for
access events,
including
successful and
failed attempts,
providing real-
time awareness
of who is
accessing the
property.
40% 45% 15%

25
Traditional 10 16 8 5 1 3.73
Lock:
No built-in alert
system; users
are unaware of
access events
unless they are
physically
present.
25% 40% 20% 12.5% 2.5%

FITA SMS: 13 20 6 1 0 4.13


Allows quick
access by
scanning a
fingerprint,
eliminating the
need for
carrying keys.
32.5% 50% 15% 2.5%

It can be seen from the Table 1 that the Locking System:

Fingerprint Identification Technology using Arduino with Short

Message Service is much accessible than the traditional lock and it

is also user friendly as reflected in their weighted means of 4.5, 4.3.

4.5,4.1, 4.2. 4.0 and 4.1 respectively.

Research Question No.2. How does integrating SMS

technology improve security and monitoring?

To determine the security and monitoring of the lock

mechanism by integrating SMS in the system the respondents were

26
given questionnaire and their responses were subjected to weighted

mean. From the computed

26
weighted mean the level of involvement was identified using the

scale below.

Table 2

Strongly Agree Neutra Disagre Strongly Mea


Agree l e (2) Disagre n
(5) (4) (3) e (1)
Timely 18 18 4 0 0 4.35
Response:
Prompt
notifications
allow users to
take immediate
action if a
security breach
or suspicious
activity is
detected.
45% 45% 10%

Access 18 14 6 2 0 4.2
Updates:
Users can stay
informed about
who is
accessing their
premises and
when, even
when they are
not physically
present.
45% 35% 15% 5%

27
27
User 14 21 5 0 0 4.23
Accountabilit
y: Tracking
access events
through SMS
helps ensure
that users are
accountable for
their actions
35% 52.5 12.5%
%

Activity Logs: 17 17 5 1 0 4.2


SMS 5
notifications
create a log of
access events,
which can be
reviewed for
patterns or
anomalies in
access behavior.
42.5% 42.5% 12.5% 2.5%

Immediate 22 14 4 0 0 4.45
Alerts: Users
receive instant
SMS
notifications
when specific
events occur,
such as
successful or
failed access
attempts,
unauthorized

28
entry, or
tampering with
the lock.
55% 35% 10%

28
The Table 2 shows that by leveraging SMS technology,

security systems can provide more robust and flexible solutions for

monitoring and managing access, ensuring that property owners

and administrators are always informed and able to respond quickly

to any security concerns. The weighed mean was 4.1,4.1,4.1 4.5 and

4.5 respectively.

Research Question No.3 What is the performance level of

FITA SMS in terms of, security, accessibility and monitoring. To

determine the practical considerations in implementing such a

technology in terms of, security, accessibility and monitoring. The

respondents were given questionnaire and their responses were

subjected to weighted mean. From the computed weighted mean

the level of involvement was identified using the scale below.

Table 3

Strongl Agree Neutra Disagre Strongly Mea


y Agree (4) l e (2) Disagre n
(5) (3) e (1)
Unique 18 15 7 0 0 4.28
Identification:
Fingerprints are
unique to each
individual,
significantly
reducing the
likelihood of
unauthorized
access.
45% 37.5% 17.5%

29
Anomaly 12 23 5 0 0 4.1
Detection: 8
Immediate
notifications of
unusual activity,
such as
repeated failed
access
attempts, help
detect and
respond to
potential
security threats
quickly.
30% 57.5% 12.5%

Multiple 18 18 2 1 1 4.2
Users: 8
Fingerprint locks
can store
numerous
fingerprints,
making them
suitable for
households,
offices, or
facilities with
many users.
45% 45% 5% 2.5% 2.5%

30
30
Simple 17 15 4 3 1 4.1
Management: 0
Administrators
can easily add
or remove users'
fingerprints
without needing
to reconfigure
the lock or
distribute new
keys.
42.5% 37.5% 10% 7.5% 2.5%
Table 3, proves that the practical considerations in

implementing such a technology in terms of security, accessibility

and monitoring. The respondents answer the given questionnaire

survey and their responses has a computed weighted of

4.1,4.5,4.1,4.1.4.5,4.3 and 4.3 respectively.

Security: High. Combines biometric security with real-time

SMS notifications, enhancing response to security breaches.

Accessibility: High. Provides quick, keyless access and

flexible user management, along with remote access capabilities.

Monitoring: High. Offers real-time tracking and

comprehensive logs of access events, facilitating detailed

monitoring and quick responses to security issues.

Overall, a fingerprint lock mechanism with SMS notification

provides robust security, convenient access, and effective

monitoring, making it an advanced and reliable option for modern

security needs.

31
31
Graphical Analysis of Data
Table 1 Graph

Figure 13

Figure 14

Figure 15

32
Figure 16

Figure 17

Figure 18

33
Figure 19

Table 2 Graph

Figure 20

Figure 21

34
Figure 22

Figure 23

Figure 24

35
Table 3 Graph

Figure 25

Figure 26

Figure 27

36
Figure 28

Interpretation of Data

1. A mean score of 4.30 indicates that the statement "FITA

SMS: Uses fingerprint recognition, which is unique to each individual

and difficult to duplicate or forge" falls under "Strongly Agree." This

suggests a high level of agreement with the statement regarding

the security and uniqueness of fingerprint recognition.

2. A mean score of 3.88 places the statement "Traditional

Lock: Uses physical keys that can be lost, stolen, or duplicated" in

the "Agree" category. This suggests general agreement that

traditional locks have vulnerabilities related to key management,

such as the risk of loss, theft, or unauthorized duplication.

3. A mean score of 4.25 places the statement "FITA SMS:

Sends immediate SMS notifications for access events, including

successful and failed attempts, providing real-time awareness of

who is accessing the property" in the "Strongly Agree" category.

This indicates a strong consensus that this feature is highly

beneficial and effective for providing real-time awareness of access

events.

37
4. The mean score of 3.73 places the statement "Traditional

Lock: No built-in alert system; users are unaware of access events

unless they are

37
physically present" in the "Agree" category. This suggests general

agreement that traditional locks lack built-in alert systems, resulting

in users being unaware of access events unless physically present,

which could be seen as a limitation compared to systems that

provide real-time notifications.

5. The mean score of 4.13 places the statement "FITA SMS:

Allows quick access by scanning a fingerprint, eliminating the need

for carrying keys" in the "Agree" category. This indicates a

consensus that using fingerprint scanning for quick access

eliminates the inconvenience of carrying keys, which is generally

seen as beneficial.

6. The mean score of 4.35 places the statement "Timely

Response: Prompt notifications allow users to take immediate action

if a security breach or suspicious activity is detected" in the

"Strongly Agree" category. This suggests a high level of agreement

that prompt notifications enable quick responses to security

breaches or suspicious activities, enhancing the overall security

effectiveness.

7. The mean score of 4.2 places the statement "Access

Updates: Users can stay informed about who is accessing their

premises and when, even when they are not physically present" in

the "Strongly Agree" category. This indicates a strong consensus

that the feature allows users to stay informed about access events

38
remotely, enhancing their awareness and security even when they

are not physically present at the premises.

8. The mean score of 4.23 places the statement "User

Accountability: Tracking access events through SMS helps ensure

that users are

38
accountable for their actions" in the "Strongly Agree" category. This

suggests a high level of agreement that SMS-based tracking of

access events enhances user accountability by providing a record of

actions taken, which is seen as beneficial for security and

accountability purposes.

9. The mean score of 4.25 places the statement "Activity

Logs: SMS notifications create a log of access events, which can be

reviewed for patterns or anomalies in access behavior" in the

"Strongly Agree" category. This indicates a strong consensus that

SMS notifications creating a log of access events are effective for

reviewing patterns or anomalies in access behavior, providing

valuable insights for security monitoring and management.

10. The mean score of 4.45 places the statement "Immediate

Alerts: Users receive instant SMS notifications when specific events

occur, such as successful or failed access attempts, unauthorized

entry, or tampering with the lock" in the "Strongly Agree" category.

This indicates a very strong consensus that immediate SMS

notifications for specific events are highly beneficial, providing users

with timely information about critical security events related to

access attempts and potential threats.

11. The mean score of 4.28 places the statement "Unique

Identification: Fingerprints are unique to each individual,

significantly reducing the likelihood of unauthorized access" in the

"Strongly Agree" category. This indicates a strong consensus that

fingerprint-based identification systems are effective in reducing the

39
likelihood of unauthorized access due to the uniqueness of

fingerprints.

39
12. The mean score of 4.18 places the statement "Anomaly

Detection: Immediate notifications of unusual activity, such as

repeated failed access attempts, help detect and respond to

potential security threats quickly" in the "Strongly Agree" category.

This suggests a strong consensus that immediate notifications of

unusual activity are effective in enhancing security by enabling

quick detection and response to potential threats, such as repeated

failed access attempts.

13. The mean score of 4.28 places the statement "Multiple

Users: Fingerprint locks can store numerous fingerprints, making

them suitable for households, offices, or facilities with many users"

in the "Strongly Agree" category. This indicates a strong consensus

that fingerprint locks' ability to store multiple fingerprints makes

them highly suitable for environments with multiple users, such as

households, offices, or facilities, providing convenience and

flexibility in access control.

14. The mean score of 4.10 places the statement "Simple

Management: Administrators can easily add or remove users'

fingerprints without needing to reconfigure the lock or distribute

new keys" in the "Strongly Agree" category. This suggests a strong

consensus that fingerprint locks offer simplified management

capabilities, allowing administrators to conveniently manage user

access by adding or removing fingerprints without the logistical

challenges of reconfiguring locks or distributing new keys.

40
Chapter VI

SUMMARY, CONCLUSION, AND RECOMMENDATION

This chapter presents the Summary of Findings, Conclusion,

and Recommendations

Summary of Findings

The project focused on creating a Locking System using

Arduino with Fingerprint Identification and SMS features. By

combining a fingerprint sensor, GSM module for text messaging,

and LCD display with an Arduino, we achieved better security and

ease of use.

Key Findings:

1. Improved Security: Using fingerprint recognition ensures

only authorized people can unlock the door, which is safer

than using keys or codes that can be lost or shared.

2. Instant Notifications: The GSM module sends text

messages whenever the door is locked or unlocked, keeping

users informed in real-time.

3. User-Friendly: Fingerprint recognition is simple and

convenient, eliminating the need for keys or remembering

codes.

Future Plans:

1. Enhanced Recognition: The researchers aim to make

fingerprint recognition faster and more accurate to reduce

errors.

41
2. More Features: Future updates could include remote locking

and unlocking via a mobile app, allowing users to control

access from anywhere.

41
3. Scaling Up: The researchers plan to expand the system for

larger places like offices or apartments, providing improved

security to more people.

Conclusion

In conclusion, the project on the Locking System: Fingerprint

Identification Technology using Arduino with Short Message Service

has shown how we can improve security using modern technology.

By combining a fingerprint sensor, GSM module, and LCD display

with an Arduino microcontroller, we have created a secure and

reliable locking system. Overall, our project shows that biometric

access control systems, like fingerprint locks, are practical and

effective. They offer a higher level of security and convenience,

which is essential in today’s world. This project lays the groundwork

for future developments in secure access systems, making them

more advanced and widely usable.

Recommendations

Plan Your Components Carefully: Choose reliable and

compatible components such as an Arduino board, a quality

fingerprint scanner, a GSM module with good network coverage, and

a compatible solenoid lock. Ensure they work well together and

meet your project requirements.

Focus on Security: Implement strong security measures to

protect stored fingerprint data and ensure secure communication

between components. Consider encryption methods and secure

storage practices for sensitive information.

42
Simplify User Interaction: Design a user-friendly interface

with clear instructions and feedback using an LCD display. Make the

process of

42
fingerprint enrollment and authentication intuitive and

straightforward for users.

Test Thoroughly: Conduct rigorous testing under various

conditions to validate the reliability and performance of your

system. Test the fingerprint scanner in different lighting conditions

and ensure consistent SMS notifications across different network

environments.

Consider Power Management: Implement power-saving

techniques to prolong the operational life of your system, especially

if it will be used in environments where continuous operation is

required.

Document and Support: Provide comprehensive

documentation including setup instructions, troubleshooting tips,

and technical specifications. This will help users understand and

maintain your system effectively.

Future Expansion: Design your system with scalability in

mind to accommodate future updates or additional features.

Consider possibilities like remote access via a mobile app or

integration with other smart home devices.

Compliance and Regulations: Ensure your project complies

with relevant regulations, especially regarding data privacy and

telecommunications standards. Take necessary steps to protect

user privacy, particularly with biometric data handling.

43
43
BIBLIOGRAPHY

Albarado Kristoffer Marion, Alpe Franz Vladimir, Maranan and Justine


Paul C. “Arduino-Controlled Locking System Using Fingerprint Module
in Jacobo Z. Gonzales Memorial School of Arts and Trade”

https://www.studocu.com/ph/document/jacobo-z-gonzales-memorial-
national-high-school/technology-and-lively-hood-education/arduino-
controlled-locking-system-using-fingerprint-module/95881416

Ardabe, Rydel Clyde


Bello, Jayson
Gonzales, Therese
Joan A.
Ramirez, John
Mathew B.
Ardabe, Rydel Clyde
Bello, Jayson
Gonzales, Therese
Joan A.
Ramirez, John
Mathew B.
Ardabe, Rydel Clyde
44
Bello, Jayson
Gonzales, Therese
Joan A.
Ramirez, John
Mathew B.
Ardabe, Rydel Clyde
Bello, Jayson
Gonzales, Therese
Joan A.
Ramirez, John
Mathew B.
Ardabe Rydel Clyde, Bello Jayson, Gonzales Therese Joan A, Ramirez,
John Mathew B. and et.al. (2022)

AUTOMATED
DOOR LOCK

44
SYSTEM WITH
FACIAL
RECOGNITION,
FINGERPRINT
SCANNER AND
DISINFECTANT
USING ARDUINO
AND SENSOR
DEVICES
“Automated Door Lock System with Facial Recognition, Fingerprint
Scanner and Disinfectant Using Arduino and Sensor Devices”

https://www.studocu.com/ph/document/bestlink-college-of-the-
philippines/bachelor-of-science-in-information-technology/group-2-
automated-door-lock-system-with-facial-recognition-fingerprint-
scanner-and-disinfectant-using-arduino-and-sensor-devices/
63127762

Venkatesh Seerapu, S. V. Vishal, N. Sridar, K. Sagar, M. Charan


“Fingerprint Identification Based Attendance System with SMS
Notification”

44
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://
ijcrt.org/papers/IJCRT2205303.pdf

Tole Sutikno1,2,3, Moh Ainur Faqih Ubaidillah2, Watra Arsadiando3,


Hendril Satrian Purnama3
“Fingerprint Based Smart Door Lock System Using Arduino and
Smartphone Application”
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://
ijcrt.org/papers/IJCRT2205303.pdf

44
APPENDIXES

1. RESEARCHERS PROFILE

a. Curriculum Vitae

BARTOLOME, JOHN CEDRICK KING

BLK 5 LOT 46 VILLA SAN MATEO 6 DULONG


BAYAN 2
09454180575

Senior High: ABE International Business


Colleges
(2019-2021)

Junior High: Center for Positive Futures


(2015-2019)

Elementary: San Mateo Elementary School


(2009-2015)

Skills
Adaptability

Technical Skills

Time Management

45
ENGRACIA, MICHAIL KENT DELOS REYES

226 ROAD 1 BAGONG PAG-ASA QUEZON CITY


09615371189

Senior High: St. Augustine College


(2019-2021)

Junior High: San Francisco High School


(2015-2019)

Elementary: Bagong Pag-asa Elementary


School
(2009-2015)

Skills
Creativity

Technical Skills

Adaptability

46
FERANCULIO, FRANCIS RAMOS

1707 AREA 17 BARANGAY UP CAMPUS


DILIMAN QUEZON CITY
09390015603

Senior High: Gardner College


(2017-2019) Marikina

Junior High: Krus na Ligas High School


(2013-2017)

Elementary: Krus na Ligas Elementary School


(2007-2013)

Skills
Teamwork and Collaboration

Technical Skills

Creativity

47
IBAÑEZ III, RODOLFO SALAK

7 BATUHAN ST. AMPID 1 SAN MATEO RIZAL


09920443150

Senior High: Nuestra Senora De Guia


Academy of (2019-2021) Marikina

Junior High: Ampid National High School


(2015-2019)

Elementary: Manga Elementary School


(2009-2015)

Skills
Teamwork and Collaboration

Technical Skills

Cooking

48
LAURAS, MA. ERICA

BLK 17 LOT 1 PINALAD VILLE, CENTINIAL 2


PINALAD PINAGBUHATAN PASIG CITY

Senior High: Arellano University


(2019-2021)

Junior High: Nagpayong High School


(2015-2019)

Elementary: Nagpayong Elementary School


(2009-2015)

Skills
Adaptability

Technical Skills

Creativity

49
MAMURI, JAYLLOYD SAMILING

PUROK 6 7UP CUPANG ANTIPOLO CITY


09683206344

Senior High: ICCT Colleges Foundation Inc.


(2019-2021)

Junior High: Cupang National High School


(2015-2019)

Elementary: Cupang Elementary School


(2009-2015)

Skills
Teamwork and Collaboration

Multitasking

Creativity

Adaptability

50
MARCELO, VINCENT ADRIAN CELIS

PUROK 5 ZONE 8 CUPANG ANTIPOLO CITY


09948993533

Senior High: ICCT Colleges Foundation Inc.


(2019-2021)

Junior High: Cupang National High School


(2015-2019)

Elementary: Cupang Elementary School


(2009-2015)

Skills
Adaptability

Technical Skills

Multitasking

Time Management

51
MEDICO, JATHNIEL SALENGA

565 B 32 L 1 PH BAGONG NAYON II SAN ISIDRO


ANTIPOLO CITY RIZAL
09952543836

Senior High: ICCT Colleges Foundation Inc.


(2019-2021)

Junior High: Don Antonio De Zuzuarregui, SR.


(2015-2019) Memorial Academy

Elementary: Bagong Nayon II Elementary


School
(2009-2015)

Skills
Organizational Skills

Creativity

Adaptability

52
SABORNIDO, ARON GEMUEL MAGDAONG

130 CHAMPACA ST. MARIKINA HEIGHTS


09514471502

Senior High: ICCT Colleges Foundation Inc.


(2019-2021)

Junior High: Marikina Heights High School


(2015-2019)

Elementary: Kapitan Moy Elementary School


(2009-2015)

Skills
Teamwork and Collaboration

Technical Skills

Multitasking

Creativity

53
YU, MARK ANTHONY CADILO

135 BALUBAD ST. NANGKA, MARIKINA CITY


09614703125

Senior High: Nuestra Senora De Guia


Academy of (2019-2021) Marikina

Junior High: Nangka High School


(2013-2019)

Elementary: Del Carmen Elementary School


(2007-2013)

Skills
Teamwork and Collaboration

Technical Skills

Leadership

Organizational Skills

54
Copy of Project Design

Project Design: Fingerprint Locking System with SMS

Notifications

Components:

Arduino Board: The brain of the system that controls

everything.

Fingerprint Scanner: Identifies users based on their

fingerprints.

GSM Module: Sends text messages to notify users about the

door's status.

LCD Screen: Displays messages and prompts for users.

Solenoid Lock: Physical lock that opens and closes based on

commands from the Arduino.

How It Works:

1. Fingerprint Enrollment:

- Users register their fingerprints

by placing their finger on the

scanner.

2. Authentication Process:

- When a user wants to unlock the

door, they place their finger on the

scanner.

55
- The Arduino compares the

scanned fingerprint with the stored

ones.

- If there's a match, the Arduino

sends a signal to unlock the door.

55
3. Unlocking the Door:

- Upon successful fingerprint

verification, the Arduino activates

the solenoid lock to open the door.

4. Sending SMS Notifications:

- Whenever the door is unlocked,

the Arduino uses the GSM module

to send a text message to

predefined phone numbers.

- This keeps users informed about

the status of the door, no matter

where they are.

5. LCD Display Interaction:

- The LCD screen shows messages

like "Place Finger to Unlock" or

"Door Locked" to provide real-time

feedback.

- It also displays error messages if

there's a problem with the

fingerprint scan or if someone tries

an invalid fingerprint.

56
6. User Experience:

Users interact mainly by placing their finger on the scanner

and receiving text messages.

The LCD screen gives visual updates, making it easy for users

to understand what's happening with the door.

Future Plans for Improvement:

Remote Access: Create a mobile app so users can lock or

unlock the door from their phones, even when they're not nearby.

Better Fingerprint Recognition: Improve the system to

quickly and accurately recognize fingerprints, reducing any

mistakes.

Expandability: Design the system to work with multiple

doors or larger buildings, providing security for more areas.

This project design outlines a secure and user-friendly locking

system using Arduino, combining fingerprint recognition with SMS

notifications. It aims to enhance security and convenience, with

future plans to expand its capabilities and improve its functionality

in various settings.

This detailed design plan provides a straightforward approach

to developing your project, emphasizing simplicity and functionality.

Adjustments can be made based on specific hardware choices and

project requirements.

57

You might also like