Bank Security System

Embed Size (px)

Citation preview

  • 7/28/2019 Bank Security System

    1/23

    Bank Security System

    BACKGROUND

    One day at the evening time I was talking with my uncle on telephone. He asked me

    some question base on my learning means what are you learning? which type of

    engineering are you doing? He ask me that have you made something new during your

    engineering? That time I dont have any answer. But the time comes in final year. He is

    officer in bank . once he told me that because of one rap our security system break and

    because of that I have to go there at night. Can u prevent this and can make the system

    batter than this?.that day I have decided to make security system of bank which is more

    reliable than this one. We have combine all type of security system in this one. You can

    secure all type of security which is useful for one organization. Simply anyone can say

    that project of 50$ can prevent more than 50000$..!!!!

    INTRODUCTION

    We are going to make a that project which every one required. Now days it is very

    important to prevent bank from thief. We are saving our money in bank so it is equally

    important to save bank from thief. Now, day by day the number of larceny is increasing

    so it is very important to prevent bank from burglar. This BSS saves your bank from

    burglar. This circuit can prevent bank from thief. MSG automatically sent when any thief

    came into your bank or they try to break lock of your Locker. Can you ever imagine that

    you are getting MSG about yourbank security!!

    http://www.engineersgarage.com/contribution/bank-security-system?page=1http://www.engineersgarage.com/contribution/bank-security-system?page=1
  • 7/28/2019 Bank Security System

    2/23

    b

    MICROCONROLLER

    http://www.engineersgarage.com/microcontrollerhttp://www.engineersgarage.com/microcontrollerhttp://www.engineersgarage.com/microcontroller
  • 7/28/2019 Bank Security System

    3/23

    Basically used for control actions.It is used to control the operation of machine using

    fixed program that is stored in ROM/EPROM and that does not change over the life

    time.

    The AT89C51 is a low-power, high-performance CMOS 8-bit microcomputer with 4K

    bytes of Flash programmable and erasable read only memory (PEROM). The device is

    manufactured using Atmels high-density nonvolatile memory technology and is

    compatible with the industry-standard MCS-51 instruction set and pinout. The on-chip

    Flash allows the program memory to be reprogrammed in-system or by a conventional

    nonvolatile memory programmer. By combining a versatile 8-bit CPU with Flash on a

    http://www.engineersgarage.com/electronic-components/at89c51-microcontroller-datasheethttp://www.engineersgarage.com/electronic-components/at89c51-microcontroller-datasheethttp://www.engineersgarage.com/articles/what-is-cmos-technologyhttp://www.engineersgarage.com/articles/what-is-cmos-technologyhttp://www.engineersgarage.com/electronic-components/at89c51-microcontroller-datasheet
  • 7/28/2019 Bank Security System

    4/23

    monolithic chip, the Atmel AT89C51 is a powerful microcomputer which provides a

    highly-flexible and cost-effective solution to many embedded control applications

    The 3310 is a compact but somewhat heavy (133 g) phone featuring an 84 x 48

    monochrome display. It has a lighter 115 g battery variant which has fewer features; for

    example the 133g battery version has the start-up image of two hands touching while

    the 115 g version doesn't. It is a slightly rounded rectangular unit that is typically held in

    the palm of a hand, with the buttons operated with the thumb. The blue button is the

    main button for selecting options, with "C" button as a "back" or "undo" button. Up and

    down buttons are used for navigation purposes. The on/off/profile button is a stiff black

    button located on the top of the phone. It has a very sturdy design which was a big

    contribution for its success. However, radiation is high with SAR = 0.96 W/kg.

  • 7/28/2019 Bank Security System

    5/23

    SENSOR

    1. Infrared sensor

    Infrared (IR) radiation is part of the electromagnetic spectrum,which includes radio

    waves, microwaves, visible light, and ultraviolet light, as well as gamma rays and X-

    rays. The IR range falls between the visible portion of the spectrum and radio waves. IR

    wavelengths are usually expressed in microns, with the lR spectrum extending from 0.7

    to 1000 microns. Only the 0.7-14 micron band is used for IR temperature measurement.

    Using advanced optic systems and detectors, noncontact IR thermometers can focus on

    nearly any portion or portions of the0.7-14 micron band. Because every object (with the

    exception of a blackbody) emits an optimum amount of IR energy at a specific point

    along the IR band, each process may require unique sensor models with specific optics

    and detector types.

    Working of IR Sensor:

    The basic idea is to send infra red light through IR-LEDs, which is then reflected by any

    object in front of the sensor.

    Then all you have to do is to pick-up the reflected IR light. For detecting the reflected IR

  • 7/28/2019 Bank Security System

    6/23

    light, we are going to use a very original technique: we are going to use another IR-

    LED, to detect the IR light that was emitted from another led of the exact same type!

    This is an electrical property of Light Emitting Diodes (LEDs) which is the fact that a led

    Produce a voltage difference across its leads when it is subjected to light. As if it was a

    photo-cell, but with much lower output current. In other words, the voltage generated by

    the leds can't be - in any way - used to generate electrical power from light, It can barely

    be detected. that's why Opams are mostly used for accurately detection of low voltages.

    how the receiver of the sensor measures the distance of the intruding object:

    As you know This is an electrical property of Photo Voltaic Cells(Light Emitting Diodes

    (LEDs)) which is the fact that a led Produce a voltage difference across its leads when it

    is subjected to light. So By using this property you can measure the distance of an

    object

    The output of these sensor is in Analog voltage format. It varies from Distance from

    Object. So you can interface it with an ADC and then read this analog voltage by using

    micro controller and calibrate it into any scale.

  • 7/28/2019 Bank Security System

    7/23

    for more details visit the link given bellow which can five you an idea how to interface

    sharp sensor with Micro controller.

    Advantages of IR Sensor:

    1. Easily available in Market.

    2. Easy to interface.

    Disadvantages of IR Sensor:

    1. Higly influenced by Environmental Noises like Ambient light, radiations etc.

    2. Audio sensor

  • 7/28/2019 Bank Security System

    8/23

    Audio sensor

    The sound level channel works over the 55dB to 100dB range (approximately from

    quiet conversation to a loud motorcycle). The human ear does does not respond equally

    to all frequencies (it peaks at about 3kHz which corresponds to a baby crying). To allow

    for this non linearity, sound level has been 'A-Law' weighted to approximately match the

    response of the human ear. Typical uses for this channel include.

    3. LDR:-

    A or light dependent resistor or cadmium sulphide (CdS) cell is

    a resistor whose resistance decreases with increasing incident light intensity. It can also

    be referred to as a photoconductor.

  • 7/28/2019 Bank Security System

    9/23

    A photo resistor is made of a high resistance semiconductor. If light falling on the device

    is of high enough frequency, photons absorbed by the semiconductor give

    bound electrons enough energy to jump into the conduction band. The resulting free

    electron (and its hole partner) conduct electricity, thereby lowering resistance.

    A photoelectric device can be either intrinsic or extrinsic. An intrinsic semiconductor has

    its own charge carriers and is not an efficient semiconductor, e.g. silicon. In intrinsic

    devices the only available electrons are in the valence band, and hence the photon

    must have enough energy to excite the electron across the entire band gap. Extrinsic

    devices have impurities, also called do pants, added whose ground state energy is

    closer to the conduction band; since the electrons do not have as far to jump, lower

    energy photons (i.e., longer wavelengths and lower frequencies) are sufficient to trigger

    the device. If a sample of silicon has some of its atoms replaced by phosphorus atoms

    (impurities), there will be extra electrons available for conduction. This is an example of

    an extrinsic semiconductor.

    SWITCH:

    In electronics, a switch is an electrical component that can break an electrical circuit,

    interrupting the current or diverting it from one conductor to another. [1][2] The most

    familiar form of switch is a manually operated electromechanical device with one or

    more sets of electrical contacts. Each set of contacts can be in one of two states: either

  • 7/28/2019 Bank Security System

    10/23

    'closed' meaning the contacts are touching and electricity can flow between them, or

    'open', meaning the contacts are separated and nonconducting.

    A switch may be directly manipulated by a human as a control signal to a system, such

    as a computer keyboard button, or to control power flow in a circuit, such as a light

    switch. Automatically-operated switches can be used to control the motions of

    machines, for example, to indicate that a garage door has reached its full open position

    or that a machine tool is in a position to accept another workpiece. Switches may be

    operated by process variables such as pressure, temperature, flow, current, voltage,

    and force, acting as sensors in a process and used to automatically control a system.

    For example, a thermostat is a temperature-operated switch used to control a heating

    process. A switch that is operated by another electrical circuit is called a relay. Large

    switches may be remotely operated by a motor drive mechanism. Some switches are

    used to isolate electric power from a system, providing a visible point of isolation that

    can be pad-locked if necessary to prevent accidental operation of a machine during

    maintenance, or to prevent electric shock.

    In the simplest case, a switch has two conductive pieces, often metal, called contacts

    that touch to complete (make) a circuit, and separate to open (break) the circuit. The

    contact material is chosen for its resistance to corrosion, because most metals form

    insulating oxides that would prevent the switch from working. Contact materials are also

    chosen on the basis of electrical conductivity, hardness (resistance to abrasive wear),

    mechanical strength, low cost and low toxicity.

  • 7/28/2019 Bank Security System

    11/23

    Sometimes the contacts are plated with noble metals. They may be designed to wipe

    against each other to clean off any contamination. Nonmetallic conductors, such as

    conductive plastic, are sometimes used.

    Toggle switch

    A toggle switch is a class of electrical switches that are manually actuated by a

    mechanical lever, handle, or rocking mechanism.

    Toggle switches are available in many different styles and sizes, and are used in

    countless applications. Many are designed to provide, e.g., the simultaneous actuation

    of multiple sets of electrical contacts, or the control of large amounts of electric current

    or mains voltages.

    The word "toggle" is a reference to a kind of mechanism or joint consisting of two arms,

    which are almost in line with each other, connected with an elbow-like pivot. However,

    the phrase "toggle switch" is applied to a switch with a short handle and a positive snap-

    action, whether it actually contains a toggle mechanism or not.

    Toggle switch:

  • 7/28/2019 Bank Security System

    12/23

    A toggle switch is a class of electrical switches that are manually actuated by a

    mechanical lever, handle, or rocking mechanism.

    Toggle switches are available in many different styles and sizes, and are used in

    countless applications. Many are designed to provide, e.g., the simultaneous actuation

    of multiple sets of electricalcontacts, or the control of large amounts of electric current

    or mains voltages.

    Max 232

  • 7/28/2019 Bank Security System

    13/23

    DESCRIPTION

    MAX232 is compatible with RS-232 standard, and consists of dual transceiver. Each

    receiver converts TIA/EIA-232-Elevels into 5V TTL/CMOS levels. Each driver converts

    TTL/COMS levels into TIA/EIA-232-E levels. The MAX232 ischaracterized for operation

    from -40C to +85C for allpackages.

    MAX232 is purposed for application in high-performance information processing

    systems and control devices of wide application.

    APPLICATION:

    Battery-Powered RS232 Systems

    Terminals

    Modems

    Computers

    POWER SUPPLY:

    http://www.engineersgarage.com/articles/what-is-cmos-technologyhttp://www.engineersgarage.com/articles/what-is-cmos-technology
  • 7/28/2019 Bank Security System

    14/23

    This circuit is a small +5V power supply.The circuit will provide a regulated voltage to

    the external circuit which may also I am required in any part of the external circuit or the

    whole external circuit.The best part is that you can also use it to convert AC voltage to

    DC and then regulate it ,simlpy You need a transformer to make the AC main drop

    down to a safe value i.e 12-15 volts and then us a rectifier to convert AC into DC.

    This circuit can give +5V output at about 150 mA current, but it can be increased to 1 A

    when good cooling is added to 7805 regulator chip. The circuit has over overload and

    therminal protection. The capacitors must have enough high voltage rating to safely

    handle the input voltage feed to circuit. The circuit is very easy to build for example into

    a piece of veroboard.

    If you need other voltages than +5V, you can modify the circuit by replacing the 7805

    chips with another regulator with different output voltage from regulator 78xx chip family.

  • 7/28/2019 Bank Security System

    15/23

    The last numbers in the the chip code tells the output voltage. Remember that the input

    voltage muts be at least 3V greater than regulator output voltage ot otherwise the

    regulator does not work well.

    Dont forget to check the pin diagram before connecting the IC.

    WORKING

    Most Nokia phones have F-Bus and M-Bus connections that can be used to connect a

    phone to a PC or in our case a microcontroller. The connection can be used for

    controlling just about all functions of the phone, as well as uploading new firmware etc.

    This bus will allow us to send and receive SMS messages.

    The very popular Nokia 3310/3315 has the F/M Bus connection under the battery

    holder. This is a bit of a pain to get to and requires a special cable to make the

    connection. The left picture above shows the 4 gold pads used for the F and M Bus.

    The right picture shows the F-Bus cable connected to my Nokia 3310.

  • 7/28/2019 Bank Security System

    16/23

    Nokia download cables are available from most mobile phone shops and some

    electronics stores. The cable contains electronics to level convert 3V signals to RS232

    type signals.

    M-Bus is a one pin bi-directional bus for both transmitting and receiving data from the

    phone. It is slow (9600bps) and only half-duplex. Only two pins on the phone are used.

    One ground and one data. M-Bus runs at 9600bps, 8 data bits, odd parity, one stop bit.

    The data terminal ready (DTR) pin must be cleared with the request to send (RTS). This

    powers the electronics in the cable and I think it sets it for M-Bus operation.

    F-Bus is the later high-speed full-duplex bus. It uses one pin for transmitting data and

    one pin for receiving data plus the ground pin. Very much like a standard serial port. It is

    fast 115,200bps, 8 data bits, no parity, one stop bit. For F-Bus the data terminal ready

    (DTR) pin must be set and the request to send (RTS) pin cleared.

    The F-Bus is bi-directional serial type bus running at 115,200bps, 8 data bits. The serial

    cable contains electronics for level conversion and therefore requires power. The first

  • 7/28/2019 Bank Security System

    17/23

    thing to do is supply power to the cable electronics and this is done by setting the DTR

    (Data Terminal Ready) pin and clearing the RTS (Request to Send) pin.

    whenever anyone try to get into your home you will get SMS in your mobile like

    someone is trying to open your door (or window or locker).we have put IR sensorAnd

    4 different sensors at different place(in prototype) and it will send command to

    Microcontroller. Microcontroller will send command to Mobile and that mobile will send

    SMS to your mobile, msg contain exact location of thief and msg would be continues

    tracking location of thief and send SMS to user. In SAFE mode when thieves will break

    your locker at that time police officer will get location of your Home. When you will reply

    with LOCK your home will became locked (In smart home) and thieves will be trap in

    your home. You also you reset whole security system by one SMS from remote place

    How to send a SMS message with F-Bus?

    Now that we know how to send frames on the bus, we should look at sending an SMS

    message. It is not a hard process, once you can pack the message into 7-bit characters!

    Let's say we want to decode the string 'hello'. First I have displayed 'hello' in

    hexadecimal using the character map provided in GSM 03.38. For A to Z and numbers

    its just the standard ASCII conversion.

    h e l l o (ASCII characters)

    http://www.engineersgarage.com/articles/infrared-sensorshttp://www.engineersgarage.com/articles/infrared-sensorshttp://www.engineersgarage.com/articles/infrared-sensorshttp://www.engineersgarage.com/articles/infrared-sensors
  • 7/28/2019 Bank Security System

    18/23

    68 65 6C 6C 6F (In hexadecimal)

    1101000 1100101 1101100 1101100 1101111 (In Binary)

    When dealing with binary, it makes life easier to write everything backwards. The first

    byte in the string is on the right. The least significant bit is then displayed on the left with

    the most significant bit on the left. Shown below is the same string of 'hello' just

    displayed backwards. Then it's just a matter to dividing the binary values into bytes

    starting with the first character in the string. (Start from right and go to left.) The first

    decoded byte is simply the first 7 bits of the first character with the first bit of the second

    character added to the end as shown below. The next decoded byte in then the

    remaining 6 bits from the second character with two bits of the third byte added to the

    end. This process just keeps going until all characters are decoded. The last decoded

    byte is the remaining bits from the last character with the most significant bits packed

    with zeros.

    6F 6C 6C 65 68

    1101111 1101100 1101100 1100101 1101000 (The ASCII characters shown in binary)

    110 11111101 10011011 00110010 11101000 (The above binary just split into 8 bit

    segments)

    06 FD 9B 32 E8 (The 8 bit segments decoded into hex)

    The message hello is therefore E8 32 9B FD 06 when packed.

  • 7/28/2019 Bank Security System

    19/23

    When playing with sending SMS messages a lot of decoding is required. Therefore I

    wrote a few small programs to automatically pack and unpack the data for me. The first

    program allows me to input the string to be packed in the top memo box and when the

    button 'Pack' is pressed the top string is packed ready to go!

    This program below, will both unpack and then pack the message. It was used to read

    the packed messages from my serial protocol analyzer. It also tests my subroutines in C

    for both pack and unpack. Already for my AT90S8535 microcontroller!

  • 7/28/2019 Bank Security System

    20/23

    frame sent to my Nokia 3310 (showed as a Hex dump) 98 Bytes:

    1E 00 0C 02 00 21 00 01 00 01 02 00 0A 91 89 25 00 01 20 00 00 00 15 00 00 00 24

    0A 91 49 62 95 22 68 00 00 00 00 A7 00 00 00 00 00 00

    41 66 51 4A 05 E9 40 49 29 68 5A 1C 56 A5 49 6A 16 84 0C 4E 41 C2 62 D1 09 12 4A 8B C1

    65 91 D8 50 00 43 00 xx xx

  • 7/28/2019 Bank Security System

    21/23

    F-Bus Frame Header

    Byte 0: F-Bus Frame ID. We are on Cable (0x1E)

    Byte 1: Destination address.

    Byte 2: Source address.

    Byte 3: Message Type or 'command'. 0x02 (SMS Handling).

    Byte 4 & 5: Message length. In our case it is 0x0021 bytes long or 83 bytes in decimal.

    (SMS) Short Message Service Frame Header

    Byte 6 to 8: Start of the SMS Frame Header. 0x00, 0x01, 0x00

    Byte 9 to 11: 0x01, 0x02, 0x00 = Send SMS Message

    (SMSC) Short Message Service Centre (12 Bytes)

    Byte 12: SMS Centre number length. 0x07 is 7 bytes long. This includes SMSC Number

    Type and SMS Centre Phone Number

    Byte 13: SMSC number type e.g. 0x81-unknown 0x91-international 0xa1-national

    Byte 14 to 23: (Octet format) SMS Centre Phone Number In this case +9825001002

    (TPDU) Transfer Protocol Data Unit

    Byte 24: Message Type

    XXXX XXX1 = SMS Submit - The short message is transmitted from the Mobile Station

    (MS) to the Service Centre (SC).

    XXXX XXX0 = SMS Deliver - The short message is transmitted from the SC to the MS.

  • 7/28/2019 Bank Security System

    22/23

    In our case it is 0x15 = 0001 0101 in binary. The message is SMS Submit, Reject

    Duplicates, and Validity Indicator present.

    Byte 25: Message Reference if SMS Deliver & Validity Indicator used (Not used in this

    case).

    Byte 26: Protocol ID. Refer to GSM 3.40 - 9.2.3.9 TP-Protocol-Identifier (TP-PID)

    Byte 27: Data Coding Scheme.

    Byte 28: Message Size is 0x33 in hex or 51 bytes long in decimal. This is the size of the

    unpacked message.

    Destination's Phone Number (12 Bytes)

    Byte 29: Destination's number length.

    Byte 30: Number type e.g. 0x81-unknown 0x91-international 0xa1-national

    Byte 31 to 40: (Octet format) Destination's Phone Number

    Validity Period (VP)

    Byte 41: Validity-Period Code. Time period during which the originator considers the

    short message to be valid.

    Byte 42 to 47: Service Centre Time Stamp

    The SMS Message (SMS-SUBMIT)

    Byte 46 to78 : This is the SMS message packed into 7 bit characters. SMS Point-to-Point Character Packing .

  • 7/28/2019 Bank Security System

    23/23

    ("ALERT : IR SECURITY HAS BEEN BREAKED"41 66 51 4A 05 E9 40 49 29 68 5A 1C 56 A5 49 6A 16 84 0C 4E 41 C2 62 D1 09 12 4A

    8B C1 65 91 D8 50)

    Byte 79: Always 0x00

    The F-Bus usual ending

    Byte 80: Packet Sequence Number

    Byte 81: Padding Byte - String is old and requires to be even!

    Byte 82 & 83: Odd & even checksum bytes.

    APPLICATION

    It can be useful in every place where higher security is required.

    It will provide high security in Bank, Our home.

    Thief detection is very easy.

    Simply this Project of $50 save your millions of $.