0% found this document useful (0 votes)
24 views13 pages

6bit Password Security System3

The document outlines a project on a 6-bit Password Security System developed by a team from the National Institute of Technology, Agartala. It describes the system's functionality using XOR, AND, and NOT gates to compare a static key code with an entered code, triggering visual and auditory signals for correct and incorrect entries. The project aims to introduce the principles of digital logic gates and their application in security systems, while also detailing the components, working principles, and conclusions drawn from the experiment.

Uploaded by

raunak09871
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views13 pages

6bit Password Security System3

The document outlines a project on a 6-bit Password Security System developed by a team from the National Institute of Technology, Agartala. It describes the system's functionality using XOR, AND, and NOT gates to compare a static key code with an entered code, triggering visual and auditory signals for correct and incorrect entries. The project aims to introduce the principles of digital logic gates and their application in security systems, while also detailing the components, working principles, and conclusions drawn from the experiment.

Uploaded by

raunak09871
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

NATIONAL INSTITUTE OF TECHNOLOGY

AGARTALA

DEPARTMENT – ELECTRONICS AND INSTUMENTATION


ENGINEERING
LAB NAME – DIGITAL ELECTRONICS
PROJECT TITLE – 6 BIT PASSWORD SECURITY SYSTEM
SUMBITTED TO – YOGESH SARIYA SIR
❖ TEAM MEMBERS :-

• 1. AMAN KUMAR – 23UEI115


• 2. DHIRENDRA KUMAR – 23UEI121
• 3.ABHISHEK KUMAR – 23UEI179
• 4. ANJALI PATEL – 23UEI148
• 5. SAUMYAA SHREYA – 23UEI157
• 6. ADITI BISWAL – 23UEI175
❖ INTRODUCTION:-

• 6-bit Password Security System using (XOR, AND & NOT):


• The idea is of this system is that the 6 switches “Key Code Switches” acts as
holding the correct password for unlocking the lock. On the other hand, the
other 6 switches “Data Entry Switches” acts as data entry points where the
code is to be entered to open the lock.
• The “Key Code Switches” have static value and is hidden from the person who
is trying to open the lock. If the person who is trying to open the lock enters
the code at “Data Entry Switches” which is similar to the code kept static at the
“Key Code Switches” then the green LED will light up and the lock will open
while, if he enters the wrong code then the red LED will lit up and BUZZER will
be start ringing, which is an alarming situation that some wrong person is
unlocking the lock.
❖ COMPONENTS REQUIRED:-

• 1. XOR IC 74LS86 – 6
• 2. NOT IC 74LS04 – 7
• 3. AND IC 74LS08 – 5
• 4. NOR IC - 1
• 5. RESISTOR(470 OHM) – 1
• 6. RESISTOR(10KOHM) - 1
• 7. DIODES – 6
• 8. LED LIGHTS – 2
• 9. BREADBOARD – 2
• 10.BATTERY(9V) – 1
• 11. JUMPER/CONNECTING WIRES – AS REQUIRED
• 12. SWITCHES – 13
• 13. BUZZEER - 1
❖ PIN DESCRIPTION:-
AND GATE;
❖ INSTRUCTIONS:-

1.This circuit illustrates the use of XOR (Exclusive-OR) gates as bit


comparators. Four of these XOR gates compare the respective bits of
two 6-bit binary numbers.
2. Because six bits provides a mere sixty-four possible combinations, this
lock circuit is not very sophisticated.
3. If it were used in a real application such as a home security system,
the “No go” output would have to be connected to some kind of siren
or other alarming device ,so that the entry of an incorrect code would
deter an unauthorized person from attempting another code entry.
4. The purpose of the experiment is not to make a real security system,
but merely to introduce you to the principle of XOR gate code
comparison
❖ WORKING PRINCIPLE:-
• 1. The XOR gates’ output terminals are connected through a diode network which
functions as a six-input OR gate.
• 2. Any of the six XOR gates outputs a “high” signal-indicating that the entered code and
the key code are not identical then a “high” signal will be passed on to the NOR gate
logic.
• 3. If the two 6-bit codes are identical, then none of the XOR gate outputs will be “high,”
and the pull-down resistor connected to the common sides of the diodes will provide a
“low” signal state to the NOR logic.
❖NOR gate performs:-
• Prevent either of the LEDs from turning on if the “Enter” pushbutton is not pressed.
• Only when this pushbutton is pressed can either of the LEDs energize. o If the Enter
switch is pressed and the XOR outputs are all “low,” the “Go” LED will light up, indicating
that the correct code has been entered.
• If the Enter switch is pressed and any of the XOR outputs are “high,” the “No go” LED
will light up, indicating that an incorrect code has been entered.

❖ CIRCUIT DIAGRAM:-
❖ CIRCUIT DIAGRAM:-

• DIAGRAM WITH CORRECT PASSWORD ;


❖ PROCEDURE:-
❖ APPLICATIONS:-
❖ CONCLUSION:-

• 1.In this project, we will locate the two switches on breadbooards , acts as holding the
correct password for unlocking the lock.
• 2. we are used sound buzzer for alarming situation.
• 3. Here we used to another element of one 6v relay because we need to show something
will be open, that’s why we used DC motor.
• 4.The relay can be defined as a switch which are generally used to close or open the circuit
manually.
• 5. From this project we can learn how we made a security system by using XOR, NOR gate
and other elements.

❖REFERENCES:-
https://www.allaboutcircuits.com/te xtbook/experiments/chpt-
7/simple combination-lock/ https://www.slideshare.net/FatimaQay
yum1/security-system-using-xor-nor

You might also like