55
Department Of ECE 1. INTRODUCTION 1.1 Introduction Embedded systems plays a crucial role in critical infrastructure, which is recognized as essential to national security, health and economy. There is an increasing concern of security threats, as embedded systems are moving towards networked applications. Model based approaches have proven to be an effective for embedded system design. Security is the important aspect of embedded system design. The characteristics of embedded system give rise to a number of novel vulnerabilities. Network connectivity opens even more avenues for remote exploits. In response, security solutions are being developed to provide robustness, protection from attacks, and recovery capabilities. Fingerprint identification is used in many ways, for identification and also for the security purposes. In these days, somewhere sometimes bikes are stolen by the stranger’s reason is that they don’t have security system. In the present generation we are using the fingerprint based security system for door locking, EVM’s for any kind of the identification. 1.2 Literature Survey Biometrics is derived from Greek word “bios” means life and “metron” means measure. It is the study of methods for uniquely recognizing human based upon one or more physical or behavioral traits. 1.2.1 Fingerprint Authentication: It refers to the automated method of verifying a match between two human fingerprints. Fingerprints are one of many forms of biometrics used to identify an individual and verify their identity. This article touches two major classes of algorithms (minutia and pattern) and four sensor designs (optical, ultrasonic, passive capacitance and active capacitance).The simple fact is that passwords don’t work very well. Other authentication mechanisms such as tokens, smart cards, etc. require you to carry something. This is better than a password, but easies to lose. Think about losing your credit card or driving 1 SVS Institute Of Technology

Finger print authentication for bikes

Embed Size (px)

Citation preview

Page 1: Finger print authentication for bikes

Department Of ECE

1. INTRODUCTION

1.1 Introduction

Embedded systems plays a crucial role in critical infrastructure, which is

recognized as essential to national security, health and economy. There is an increasing

concern of security threats, as embedded systems are moving towards networked

applications. Model based approaches have proven to be an effective for embedded

system design. Security is the important aspect of embedded system design. The

characteristics of embedded system give rise to a number of novel vulnerabilities.

Network connectivity opens even more avenues for remote exploits. In response, security

solutions are being developed to provide robustness, protection from attacks, and

recovery capabilities.

Fingerprint identification is used in many ways, for identification and also for the

security purposes. In these days, somewhere sometimes bikes are stolen by the stranger’s

reason is that they don’t have security system. In the present generation we are using the

fingerprint based security system for door locking, EVM’s for any kind of the

identification.

1.2 Literature Survey

Biometrics is derived from Greek word “bios” means life and “metron” means

measure. It is the study of methods for uniquely recognizing human based upon one or

more physical or behavioral traits.

1.2.1 Fingerprint Authentication:

It refers to the automated method of verifying a match between two human

fingerprints.

Fingerprints are one of many forms of biometrics used to identify an individual

and verify their identity. This article touches two major classes of algorithms (minutia

and pattern) and four sensor designs (optical, ultrasonic, passive capacitance and active

capacitance).The simple fact is that passwords don’t work very well. Other authentication

mechanisms such as tokens, smart cards, etc. require you to carry something. This is

better than a password, but easies to lose. Think about losing your credit card or driving 1

SVS Institute Of Technology

Page 2: Finger print authentication for bikes

Department Of ECE

license. Losing your corporate network access is a lot worse. Information is valuable and

harder to track than money.

Fingerprints can also acts as a simple, trusted and convenient user-interface to a

well thought security architecture. The two components need each other to provide truly

effective security. A user authenticated via fingerprints can take advantage of a solid

security system minimal education. Fingerprints have been used for identification for

over 100 years. They are the standard without question. In addition to signatures,

fingerprints are the only other form of identification that has a legal standing. A key issue

of trust is privacy. The best way to maintain that is to store a template of unique

fingerprint characteristics instead of entire print. This is sufficient for one to one or too

many matching and eliminates the need for a database of searchable fingerprints.

1.2.2 Biometric System:

The diagram below shows a simple block diagram of a biometric system. The

main operations a system can perform are enrollment and test. During the enrollment

biometric information of an individual are stored, during the test, and during the test

information are detected and compared with the stored information.

Fig 1.0: Biometric System

2SVS Institute Of Technology

Page 3: Finger print authentication for bikes

Department Of ECE

Biometric System Diagram:

The first block (sensor) is the interface between the real world (user) and our

system (biometric system), it has to acquire all the necessary data. Most of the time it is

an image acquisition system, but it can change according to the characteristics we want to

consider.

The second block performs all the necessary pre-processing; it has to remove

artifacts from the sensor, to enhance the input (e.g. remove some kind of noise.), to use

some kind of normalization, etc.

In third block we have to extract the features we need. This step is really

important; we have to choose which features it extract and how. Moreover we have to do

it with certain efficiency (it can’t take hours). After that, we can have a vector of numbers

or an image with particular properties: all those data are used to create the template.

A template is a synthesis of all the characteristics we could extract from the

source; it has to be as short as possible (to improve efficiency) but we can’t discard to

many details, thus losing discrimination.

Then if it is performing enrollment, then the template is simply stored somewhere

(it can be stored in on a card or within a database). If it is performing the matching phase,

the obtained template is passed to matcher that compares it with other existing templates,

estimating the distance between them using any algorithm (e.g. Hamming distance). The

decision matcher has taken is sent as output, so that it can be used for any purpose (e.g. it

can allow the entrance in restricted areas).

1.2.3 Patterns and Features:

The analysis of fingerprints for matching purposes generally requires the

comparison of several features of the print pattern. These include print patterns, which

are aggregate characteristics of ridges, and minutia points, which are unique features

found within patterns. It is also necessary to know the structure and properties of human

skin in order to successfully employ some of the imaging technologies.

Patterns:

There are three basic patterns of fingerprint ridges are the Arch, Loop, and Whorl.

3SVS Institute Of Technology

Page 4: Finger print authentication for bikes

Department Of ECE

Arch Pattern:

An arch is a pattern where the ridges enter from one side of a finger, rise in the

centre forming an arc, and them exit the other side of the finger.

Loop Pattern:

The loop pattern is a pattern where the ridges enter from one side of a finger, from

a curve, and tend to exit from the same side they enter.

Whorl Pattern:

In the whorl pattern, ridges form a circular pattern around a central point on the

finger. Scientists have found that of family members often share the same general

patterns, leading to the belief that these patterns are inherited.

Fig 1.1: Human Fingerprint Pattern

Features:

Minutia based feature:

The major minutia features of fingerprint ridges are: ridge ending, bifurcation and

short point ridge (or dot). The ridge ending is the point at which a ridge terminates.

Bifurcations are points at which a single ridge splits into two ridges. Short ridges (or

dots) are the ridges which are significantly shorter than the average ridge length on the

fingerprint.

4SVS Institute Of Technology

Page 5: Finger print authentication for bikes

Department Of ECE

Sequential design based on the following modules: Segmentation, local ridge

orientation estimation (singularity and more detection), local ridge frequency estimation,

fingerprint enhancement, minutiae detection, and minutiae filtering and post-processing.

Ridge based feature:

Size and shape of fingerprint, number, type, and position of singularities (cores

and deltas), spatial relationship and geometrical attributes of the ridge lines, shape

features, global and local texture information, sweat pores, fractal features.

Fig 1.2: Ridge based feature

5SVS Institute Of Technology

Page 6: Finger print authentication for bikes

Department Of ECE

2.BLOCK DIAGRAM

+5vFig 2.1: BLOCK DIAGRAM

6SVS Institute Of Technology

AT89C51 BUZZER

DRIVER RELAY

Bike connection

L.C.D

Max 232

FINGERPRINTMODULE

POWER SUPPLY (5V DC)

Page 7: Finger print authentication for bikes

Department Of ECE

2.1 Block diagram description:

8051 MICROCONTROLLER:

The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller

with 4k bytes of Flash Programmable and erasable read only memory (EROM).AT89C51

has many functions and to this microcontroller many other various components are

connected for the functioning of their particular operations and to get the particular

required output. This is very necessary in each and every embedded project.

FINGERPRINT MODULE:

Fingerprint module is interconnected to 8051 microcontroller and this module is

used for the recognization and identification of the fingerprint and also to verify the

recognized fingerprint. So fingerprint module is necessary for identification.

MAX 232:

Max 232 is used as a voltage converter, as 8051 microcontroller need TTL

voltage level, as fingerprint module voltage is cmos voltage level ,but by using the

max232 we can convert one voltage level to the other voltage level.

LCD:

LCD is used to display the functioning of the project or particular operation, as

our project is needed to identify and also to recognize the fingerprint, the LCD shows it

on the screen and total verification depends on the LCD.

BIKE BATTERY:

Bike battery is connected to the 8051 microcontroller and it has the main

functioning of our project. In this bike battery the power supplies and the ignition key

lock on and off conditions totally depends on the bike battery.

7SVS Institute Of Technology

Page 8: Finger print authentication for bikes

Department Of ECE

POWER SUPPLY:

Power supply is needed for each and every IC and also the modules, so it supplies

the required amount of power to all the components and has major part the project, it

supplies a high power but by using the voltage regulator we can supply the required

amount of power to the components.

RELAY:

Relay is used as switch and when ever it gets the power it starts the vehicle and

when ever it doesn’t get any power until and unless it won’t starts the vehicle.

2.2 Schematic diagram

Fig 2.2: Schematic diagram

8SVS Institute Of Technology

Page 9: Finger print authentication for bikes

Department Of ECE

2.3 Working principle

The working principle of “fingerprint based vehicle access control system” is

switching (act as switch).

In our project, from the fingerprint module the wires are connected to the battery

of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get

the power, green wire is connected for earthing, red black is connected for the display

purpose the power from the battery generates from the black wire then the total display

will appear.

In the ignition lock there are certain conditions when the bike is on and as well as

off condition, in the on condition the green wire is shorted with black and white wire then

there is short circuit hence the bike doesn’t start and when there is open circuit with in the

green wire then the bike begins to start, at the starting moment of the bike fingerprint

module ask for the verification of the fingerprint impression if matches they can use

otherwise it gives a sound from the buzzer.

9SVS Institute Of Technology

Page 10: Finger print authentication for bikes

Department Of ECE

3. HARDWARE & SOFTWARE REQUIREMENTS

HARDWARE:

3.1 AT89C51:

A microcontroller is a general purpose device, but that is meant to read data,

perform limited calculations on that data and control its environment based on those

calculations. The prime use of a microcontroller is to control the operation of a machine

using a fixed program that is stored in ROM and that does not change over the lifetime of

the system.

The microcontroller design uses a much more limited set of single and double

byte instructions that are used to move data and code from internal memory to the ALU.

The microcontroller is concerned with getting data from and to its own pins, the

architecture and instruction set are optimized to handle data in bit and byte size.

The AT89C51 is a low-power, high-performance CMOS 8-bit microcontroller

with 4k bytes of Flash Programmable and erasable read only memory (EROM). The

device is manufactured using Atmel’s high-density nonvolatile memory technology and

is functionally compatible with the industry-standard 80C51 microcontroller instruction

set and pin out. By combining versatile 8-bit CPU with Flash on a monolithic chip, the

Atmel’s AT89c51 is a powerful microcomputer, which provides a high flexible and cost-

effective solution to many embedded control applications.

10SVS Institute Of Technology

Page 11: Finger print authentication for bikes

Department Of ECE

Pin Configuration of AT89c51 Microcontroller

Fig 3.1: Pin Configuration of AT89c51 Microcontroller

11SVS Institute Of Technology

Page 12: Finger print authentication for bikes

Department Of ECE

AT89C51 Block Diagram

Fig 3.2: AT89C51 Block Diagram

PIN DESCRIPTION:

VCC

Supply voltage

GND

Ground

Port 0

Port 0 is an 8-bit open drain bi-directional I/O port. As an output port, each pin

can sink eight TTL inputs. When 1’s are written to port 0 pins, the pins can be used as

high impedance inputs.

Port 0 can also be configured to be the multiplexed low order address/data bus

during access to external program and data memory.

12SVS Institute Of Technology

Page 13: Finger print authentication for bikes

Department Of ECE

Port 1

Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The port 1output

buffers can sink/source four TTL inputs. When 1’s are written to port 1 pins, they are

pulled high by the internal pull-ups can be used as inputs. As inputs, Port 1 pins that are

externally being pulled low will source current because of the internal pull-ups.

Port 2

Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The port 2 output

buffers can sink/source four TTL inputs. When 1’s are written to port 2 pins, they are

pulled high by the internal pull-ups can be used as inputs. As inputs, Port 2 pins that are

externally being pulled low will source current because of the internal pull-ups.

Port 3

Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The port 3 output

buffers can sink/source four TTL inputs. When 1s are written to port 3 pins, they are

pulled high by the internal pull-ups can be used as inputs. As inputs, Port 3 pins that are

externally being pulled low will source current because of the internal pull-ups.

Port 3 also receives some control signals for Flash Programming and verification.

Port pin Alternate Functions

P3.0 RXD(serial input port)

P3.1 TXD(serial input port)

P3.2 INT0(external interrupt 0)

P3.3 INT1(external interrupt 1)

P3.4 T0(timer 0 external input)

P3.5 T1(timer 1 external input)

P3.6 WR(external data memory write strobe)

P3.7 RD(external data memory read strobe)

Table 1.1: Pin Description of AT89C51

13SVS Institute Of Technology

Page 14: Finger print authentication for bikes

Department Of ECE

RST

Rest input A on this pin for two machine cycles while the oscillator is running

resets the device.

ALE/PROG:

Address Latch Enable is an output pulse for latching the low byte of the address

during access to external memory. This pin is also the program pulse input (PROG)

during Flash programming.

In normal operation ALE is emitted at a constant rate of 1/16 the oscillator

frequency and may be used for external timing or clocking purpose. Note, however, that

one ALE pulse is skipped during each access to external Data memory.

PSEN

Program Store Enable is the read strobe to external program memory when the

AT89c51 is executing code from external program memory PSEN is activated twice each

machine cycle, except that two PSEN activations are skipped during each access to

external data memory.

EA /VPP

External Access Enable (EA) must be strapped to GND in order to enable the

device to fetch code from external program memory locations starting at 0000h up to

FFFFH. Note, however, that if lock bit 1 is programmed EA will be internally latched on

reset. EA should be strapped to Vcc for internal program executions. This pin also

receives the 12-volt programming enable voltage (Vpp) during Flash programming when

12-volt programming is selected.

XTAL1

Input to the inverting oscillator amplifier and input to the internal clock

operating circuit.

XTAL 2

Output from the inverting oscillator amplifier.

14SVS Institute Of Technology

Page 15: Finger print authentication for bikes

Department Of ECE

OPERATING DESCRIPTION

The detail description of the AT89C51 included in this description is:

• Memory Map and Registers

• Timer/Counters

• Interrupt System

MEMORY MAP AND REGISTERS

Memory

The AT89C51 has separate address spaces for program and data memory. The

program and data memory can be up to 64K bytes long. The lower 4K program memory

can reside on-chip. The AT89C51 has 128 bytes of on-chip RAM.

The lower 128 bytes can be accessed either by direct addressing or by indirect

addressing. The lower 128 bytes of RAM can be divided into 3 segments as listed below

1. Register Banks 0-3:

Locations 00H through 1FH (32 bytes). The device after reset defaults to register

bank 0. To use the other register banks, the user must select them in software. Each

register bank contains eight 1-byte registers R0-R7. Reset initializes the stack point to

location 07H, and is incremented once to start from 08H, which is the first register of the

second register bank.

2. Bit Addressable Area:

16 bytes have been assigned for this segment 20H-2FH. Each one of the 128 bits

of this segment can be directly addressed (0-7FH). Each of the 16 bytes in this segment

can also be addressed as a byte.

3. Scratch Pad Area:

30H-7FH are available to the user as data RAM. However, if the data pointer has

been initialized to this area, enough bytes should be left aside to prevent SP data

destruction.

15SVS Institute Of Technology

Page 16: Finger print authentication for bikes

Department Of ECE

Fig 3.3: Memory Map & Registers

SPECIAL FUNCTION REGISTERS

The Special Function Registers (SFR's) are located in upper 128 Bytes direct

addressing area. The SFR Memory Map in shows that.

Not all of the addresses are occupied. Unoccupied addresses are not implemented

on the chip. Read accesses to these addresses in general return random data, and write

accesses have no effect. User software should not write 1’s to these unimplemented

locations, since they may be used in future microcontrollers to invoke new features. In

that case, the reset or inactive values of the new bits will always be 0, and their active

values will be 1.

The functions of the SFR’s are outlined in the following sections.

Accumulator (ACC)

ACC is the Accumulator register. The mnemonics for Accumulator-specific

instructions, however, refer to the Accumulator simply as A.

16SVS Institute Of Technology

Page 17: Finger print authentication for bikes

Department Of ECE

B Register (B)

The B register is used during multiply and divide operations. For other

instructions it can be treated as another scratch pad register.

Program Status Word (PSW)

The PSW register contains program status information.

Stack Pointer (SP)

The Stack Pointer Register is eight bits wide. It is incremented before data is

stored during PUSH and CALL executions. While the stack may reside anywhere in on

chip RAM, the Stack Pointer is initialized to 07H after a reset. This causes the stack to

begin at location 08H.

Data Pointer (DPTR)

The Data Pointer consists of a high byte (DPH) and a low byte (DPL). Its function

is to hold a 16-bit address. It may be manipulated as a 16-bit register or as two

independent 8-bit registers.

Serial Data Buffer (SBUF)

The Serial Data Buffer is actually two separate registers, a transmit buffer and a

receive buffer register. When data is moved to SBUF, it goes to the transmit buffer,

where it is held for serial transmission. (Moving a byte to SBUF initiates the

transmission.) When data is moved from SBUF, it comes from the receive buffer.

Timer Registers

Register pairs (TH0, TL0) and (TH1, TL1) are the 16-bit Counter registers for

Timer/Counters 0 and 1, respectively.

Control Registers

Special Function Registers IP, IE, TMOD, TCON, SCON, and PCON contain

control and status bits for the interrupt system, the Timer/Counters, and the serial port.

17SVS Institute Of Technology

Page 18: Finger print authentication for bikes

Department Of ECE

TIMER/COUNTERS

The IS89C51 has two 16-bit Timer/Counter registers: Timer 0 and Timer 1. All

two can be configured to operate either as Timers or event counters. As a Timer, the

register is incremented every machine cycle. Thus, the register counts machine cycles.

Since a machine cycle consists of 12 oscillator periods, the count rate is 1/12 of the

oscillator frequency.

As a Counter, the register is incremented in response to a 1-to-0 transition at its

corresponding external input pin, T0 and T1. The external input is sampled during S5P2

of every machine cycle. When the samples show a high in one cycle and a low in the next

Cycle, the count is incremented. The new count value appears in the register during S3P1

of the cycle following the one in which the transition was detected. Since two machine

cycles (24 oscillator periods) are required to recognize a 1-to-0 transition, the maximum

count rate is 1/24 of the oscillator frequency. There are no restrictions on the duty cycle

of the external input signal, but it should be held for at least one full machine cycle to

ensure that a given level is sampled at least once before it changes.

INTERRUPT SYSTEM

An interrupt is an external or internal event that suspends the operation of micro

controller to inform it that a device needs its service. In interrupt method, whenever any

device needs its service, the device notifies the micro controller by sending it an interrupt

signal. Upon receiving an interrupt signal, the micro controller interrupts whatever it is

doing and serves the device. The program associated with interrupt is called as interrupt

service subroutine (ISR).Main advantage with interrupts is that the micro controller can

serve many devices.

Baud Rate

The baud rate in Mode 0 is fixed as shown in the following equation. Mode 0

Baud Rate = Oscillator Frequency /12 the baud rate in Mode 2 depends on the value of

the SMOD bit in Special Function Register PCON. If SMOD = 0 the baud rate is 1/64 of

the oscillator frequency. If SMOD = 1, the baud rate is 1/32 of the oscillator frequency.

18SVS Institute Of Technology

Page 19: Finger print authentication for bikes

Department Of ECE

Mode 2 Baud Rate = 2SMODx (Oscillator Frequency)/64.In the IS89C51, the Timer 1

overflow rate determines the baud rates in Modes 1 and 3.

NUMBER OF INTERRUPTS IN 89C51:

There are basically five interrupts available to the user. Reset is also considered as

an interrupt. There are two interrupts for timer, two interrupts for external hardware

interrupt and one interrupt for serial communication.

Memory location Interrupt name

0000H Reset

0003H External interrupt 0

000BH Timer interrupt 0

0013H External interrupt 1

001BH Timer interrupt 1

0023H Serial COM interrupt

Lower the vector, higher the priority. The External Interrupts INT0 and INT1 can

each be either level-activated or transition-activated, depending on bits IT0 and IT1 in

Register TCON. The flags that actually generate these interrupts are the IE0 and IE1 bits

in TCON. When the service routine is vectored, hardware clears the flag that generated

an external interrupt only if the interrupt was transition-activated. If the interrupt was

level-activated, then the external requesting source (rather than the on-chip hardware)

controls the request flag.

The Timer 0 and Timer 1 Interrupts are generated by TF0and TF1, which are set

by a rollover in their respective Timer/Counter registers (except for Timer 0 in Mode

3).When a timer interrupt is generated, the on-chip hardware clears the flag that is

generated.

The Serial Port Interrupt is generated by the logical OR of RI and TI. The service

routine normally must determine whether RI or TI generated the interrupt, and the bit

must be cleared in software.

All of the bits that generate interrupts can be set or cleared by software, with the

same result as though they had been set or cleared by hardware. That is, interrupts can be

generated and pending interrupts can be canceled in software. 19

SVS Institute Of Technology

Page 20: Finger print authentication for bikes

Department Of ECE

Each of these interrupt sources can be individually enabled or disabled by setting

or clearing a bit in Special Function Register IE (interrupt enable) at address 0A8H.

There is a global enable/disable bit that is cleared to disable all interrupts or to set the

interrupts.

IE (Interrupt enable register) :

Steps in enabling an interrupt:

Bit D7 of the IE register must be set to high to allow the rest of register to take

effect. If EA=1, interrupts are enabled and will be responded to if their corresponding bits

in IE are high. If EA=0, no interrupt will be responded to even if the associated bit in the

IE register is high.

Description of each bit in IE register:

D7 bit: Disable all interrupts. If EA =0, no interrupt is acknowledged, if EA=1 each

interrupt source is individually enabled or disabled by setting or clearing its enable bit.

D6 bit: Reserved.

D5 bit: Enables or disables timer 2 over flow interrupt (in 8052).

D4 bit: Enables or disables serial port interrupt.

D3 bit: Enables or disables timer 1 over flow interrupt.

D2 bit: Enables or disables external interrupt 1.

D1 bit: Enables or disables timer 0 over flow interrupt.

D0 bit: Enables or disables external interrupt 0.

Interrupt priority in 89C51:

There is one more SRF to assign priority to the interrupts which is named as

interrupt priority (IP). User has given the provision to assign priority to one interrupt.

Writing one to that particular bit in the IP register fulfils the task of assigning the priority.

20SVS Institute Of Technology

Page 21: Finger print authentication for bikes

Department Of ECE

Description of each bit in IP register:

D7 bit: Reserved.

D6 bit: Reserved.

D5 bit: Timer 2 interrupt priority bit (in 8052).

D4 bit: Serial port interrupt priority bit.

D3 bit: Timer 1 interrupt priority bit.

D2 bit: External interrupt 1 priority bit.

D1 bit: Timer 0 interrupt priority bit.

D0 bit: External interrupt 0 priority bit.

3.2 POWER SUPPLY

This term covers the power distribution system together with any other primary or

secondary sources of energy.

Fig 3.4: Power Supply

Introduction

Power supply is a reference to a source of electrical power. A device or system

that supplies electrical or other types of energy to an output load or group of loads is

called a power supply unit or PSU. The first section is the transformer. The transformer

steps up or steps down the input line voltage and isolates the power supply from the

power line. The rectifier section converts the alternating current input signal to a

pulsating direct current. A filter section is used to convert pulsating dc to a purer, more

21SVS Institute Of Technology

Page 22: Finger print authentication for bikes

Department Of ECE

desirable form of dc voltage. The final section is the regulator, it maintains the output of

the power supply at a constant level.

Each of the blocks are described below

1. Transformer - steps down high voltage AC mains to low voltage AC.

2. Rectifier - converts AC to DC, but the DC output is varying.

3. Smoothing - smoothes the DC from varying greatly to a small ripple.

4. Regulator - eliminates ripple by setting DC output to a fixed voltage.

3.3 Voltage Regulator:

A voltage regulator is an electrical regulator designed to automatically maintain a constant voltage level. It may use an electromechanical mechanism, or passive or active electronic components. Depending on the design, it may be used to regulate one or more AC or DC voltages. There are two types of regulators they are:

Positive Voltage Series (78xx)

Negative Voltage Series (79xx)

78xx:’78’ indicate the positive series and ‘xx’indicates the voltage rating. Suppose 7805

produces the maximum 5V.’05’indicates the regulator output is 5V.

79xx:’78’ indicate the negative series and ‘xx’indicates the voltage rating. Suppose 7905

produces the maximum -5V.’05’indicates the regulator output is -5V.

These regulators consists the three pins there are

Pin1: It is used for input pin.

Pin2: This is ground pin for regulator

Pin3: It is used for output pin. Through this pin we get the output.

22SVS Institute Of Technology

Page 23: Finger print authentication for bikes

Department Of ECE

Fig 3.5: Voltage Regulator

3.4 MAX 232

Connection Diagram:

Fig 3.6: MAX 232 Connection Diagram

The MAX232 line drivers/receivers are designed for RS-232 and V.28

communications in harsh environments. Each transmitter output and receiver input is

protected against 15kV electrostatic discharge (ESD) shocks, without latchup.It can

operate from a Single +5V Power Supply.

23SVS Institute Of Technology

Page 24: Finger print authentication for bikes

Department Of ECE

It is an integrated circuit that converts signals from an RS-232 serial port to

signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a dual

driver/receiver and typically converts the RX, TX, CTS and RTS signals.

Fig 3.7: MAX232 line drivers/receivers

The drivers provide RS-232 voltage level outputs (approx. ± 7.5 V) from a single

+ 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for

implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V

to + 5 V range, as power supply design does not need to be made more complicated just

for driving the RS-232 in this case.The receivers reduce RS-232 inputs (which may be as

high as ± 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of

1.3 V, and a typical hysteresis of 0.5 V.

24SVS Institute Of Technology

Page 25: Finger print authentication for bikes

Department Of ECE

Voltage levels:

It is helpful to understand what occurs to the voltage levels. When a MAX232 IC

receives a TTL level to convert, it changes a TTL Logic 0 to between +3 and +15V, and

changes TTL Logic 1 to between -3 to -15V, and vice versa for converting from RS232

to TTL. This can be confusing when you realize that the RS232 Data Transmission

voltages at a certain logic state are opposite from the RS232 Control Line voltages at the

same logic state. To clarify the matter, see the table below.

Table 1.2:RS232 Voltage Levels

FUNCTION TABLE

Table 1.3:RS232 Function Table

25SVS Institute Of Technology

Page 26: Finger print authentication for bikes

Department Of ECE

LOGIC DIAGRAM: (POSITIVE LOGIC)

Fig 3.8:RS232 Logic Diagram

3.5 RS-232 Cable

RS-232 was created for one purpose, to interface between Data Terminal

Equipment (DTE) and Data Communications Equipment (DCE) employing serial binary

data interchange. So as stated the DTE is the terminal or computer and the DCE is the

modem or other communications device. RS-232 is most widely used serial input output

interfacing standards. This standards used in PCs and numerous types of equipment.

However, since the standards were set long before the advent of the TTL logic family, its

input and output levels are not TTL compatible. In RS 232, a 1 is represented by -3 to -25

volt, while 0 bit is +3 to +25 volt, making -3 to +3 undefined. For this reason, we must

use MAX 232 line driver to convert voltage level. It is compatible with PC.

26SVS Institute Of Technology

Page 27: Finger print authentication for bikes

Department Of ECE

Fig 3.9: RS232 cable

3-wire and 5-wire RS-232:

Minimal “3-wire” RS-232 connections consisting only of transmits data,

receive data, and ground, is commonly used when the full facilities of RS-232 are not

required. Even a two-wire connection (data and ground) can be used if the data flow is

one way (for example, a digital postal scale that periodically sends a weight reading, or a

GPS receiver that periodically sends position, if no configuration via RS-232 is

necessary). When only hardware flow control is required in addition to two-way data, the

RTS and CTS lines are added in a 5-wire version

DB9 CONNECTOR

The term "DB9" refers to a common connector type, one of the D-Subminiature or

D-Sub types of connectors. DB9 has the smallest "footprint" of the D-Subminiature

connectors, and houses 9 pins (for the male connector) or 9 holes (for the female

connector).

DB9 connectors were once very common on PCs and servers. DB9 connectors are

designed to work with the EIA/TIA 232 serial interface standard, which determined the

function of all nine pins as a standard, so that multiple companies could design them into

their products. DB9 connectors were commonly used for serial peripheral devices like

keyboards, mice, joysticks, etc. Today, the DB9 has mostly been replaced by more

modern interfaces such as USB, PS/2, Fire wire, and others. However, there are still

many legacy devices that use the DB9 interface for serial communication.

27SVS Institute Of Technology

Page 28: Finger print authentication for bikes

Department Of ECE

Fig 3.10: DB9 connector (male and female)

TYPES OF THE DB9 CONNECTOR:

In DB9 connector w have two types of connector

• Male connectors

• Female connectors

Male:

Fig 3.11: DB9 male connector

28SVS Institute Of Technology

Page 29: Finger print authentication for bikes

Department Of ECE

Female:

Fig 3.12:DB9 Female Connector

Pin Functions:

Data: TxD on pin 3, RxD on pin 2

Handshake: RTS on pin 7, CTS on pin 8, DSR on pin 6,

CD on pin 1, DTR on pin 4

Common: Common pin 5(ground)

Other: RI on pin 9

The method used by RS-232 for communication allows for a simple connection of

three lines: TX, Rx, and Ground. The three essential signals for 2 way RS-232

Communications are these:

TXD: carries data from DTE to the DCE.

RXD: carries data from DCE to the DTE

SG: signal ground

Pin Configuration:

The DB9 (originally DE-9) connector is an analog 9-pin plug of the D-Subminiature

connector family (D-Sub or Sub-D). The DB9 connector is mainly used for serial

connections, allowing for the asynchronous transmission of data as provided for by

standard RS-232 (RS-232C).

29SVS Institute Of Technology

Page 30: Finger print authentication for bikes

Department Of ECE

Fig 3.13: DB9male and female pins

Pin number Name

1 CD - Carrier Detect 2 RXD - Receive Data3 TXD - Transmit Data 4 DTR - Data Terminal Ready

5 GND - Signal Ground 6 DSR - Data Set Ready7 RTS - Request To Send

8 CTS - Clear To Send 9 RI - Ring Indicator

Table 1.4: DB9 Pin Configuration

30SVS Institute Of Technology

Page 31: Finger print authentication for bikes

Department Of ECE

3.6 LCD (Liquid Crystal Display)

Fig 3.14: LCDGeneral Description:

The Liquid Crystal Display (LCD) is a low power device (microwatts). Now a

days in most applications LCDs are using rather using of LED displays because of its

specifications like low power consumption, ability to display numbers and special

characters which are difficult to display with other displaying circuits and easy to

program. An LCD requires an external or internal light source. Temperature range of

LCD is 0ºC to 60ºC and lifetime is an area of concern, because LCDs can chemically

degrade these are manufactured with liquid crystal material (normally organic for LCDs)

that will flow like a liquid but whose molecular structure has some properties normally

associated with solids. .

LCD’s are classified as

1. Dynamic-scattering LCDs and

2. Field-effect LCDs

Field-effect LCDs are normally used in such applications where source of

energy is a prime factor (e.g., watches, portable instrumentation etc.).They absorb

considerably less power than the light-scattering type. However, the cost for field-effect

units is typically higher, and their height is limited to 2 inches. On the other hand, light-

scattering units are available up to 8 inches in height. Field-effect LCD is used in the

project for displaying the appropriate information.

31SVS Institute Of Technology

Page 32: Finger print authentication for bikes

Department Of ECE

RS (Command / Data):

This bit is to specify weather received byte is command or data. So that LCD can

recognize the operation to be performed based on the bit status.

RS = 0 => Command

RS = 1 => Data

RW (Read / Write):

RW bit is to specify weather controller wants READ from LCD or WRITE to

LCD. The READ operation here is just ACK bit to know weather LCD is free or not.

RW = 0 => Write

RW = 1 => Read

EN (Enable LCD):

EN bit is to ENABLE or DISABLE the LCD. Whenever controller wants to

write something into LCD or READ acknowledgment from LCD it needs to enable the

LCD.

EN = 0 => High Impedance

EN = 1 => Low Impedance

ACK (LCD Ready):

ACK bit is to acknowledge the MCU that LCD is free so that it can send new

command or data to be stored in its internal Ram locations

ACK = 1 => Not ACK

ACK = 0 => ACK

32SVS Institute Of Technology

Page 33: Finger print authentication for bikes

Department Of ECE

LCD diagram:

16 x 2 Char LCD

R1

R2

GND

Vcc

Vf RS RW EN

D0 – D7

A K D0

D7

ACK

Block Diagram

Fig 3.15: LCD Block Diagram

33SVS Institute Of Technology

Page 34: Finger print authentication for bikes

Department Of ECE

Hardware connections:

CONTROLER PINS

LCD PINS PIN NAME WITH FEATURE

(P1.0) 4 RS (Control Pin)(P1.1) 5 RW (Control pin )(P1.2) 6 EN (Control pin)Port 0 7 to 14 Data Port40 15 & 2 Vcc20 16 & 1 Gnd

Table 1.5: LCD Hardware Connections

3.7 Buzzer Circuit with Unique Functionality

Fig 3.16: Buzzer Circuit with Unique Functionality

Overview

The circuit was constructed using a few components to produce a unique buzzer

with adjustable buzzer tones.

Terminology

Buzzer – an electronic signaling device that produces light and buzzing sound

when activated or triggered

34SVS Institute Of Technology

Page 35: Finger print authentication for bikes

Department Of ECE

Single Pole Double Throw (SPDT)

An electromagnetic switch that has common, normally open and normally closed

connections; the common gets connected to the normally closed connection when the

relay coil is de-energized while the common gets connected to the normally open

connection when the relay coil is energized.

3.8 ULN2804

The eight NPN Darlington connected transistors in this family of arrays are

ideally suited for interfacing between low logic level digital circuitry (such as TTL,

CMOS or PMOS/NMOS) and the higher current/voltage requirements of lamps, relays,

printer hammers or other similar loads for a broad range of computer, industrial, and

consumer applications. All devices feature open–collector outputs and freewheeling

clamp diodes for transient suppression. The ULN2803 is designed to be compatible with

standard TTL families. While the ULN2804 is optimized for 6 to 15 volt high level

CMOS or PMOS

ULN2804 IC FORM

35SVS Institute Of Technology

Page 36: Finger print authentication for bikes

Department Of ECE

High-Voltage, High-Current Darlington

Fig 3.17: Pin diagram of ULN2804

Featuring continuous load current ratings to 500 mA for each of the drivers, the

ULN2804 high voltage, high-current Darlington arrays is ideally suited for interfacing

between low-level logic circuitry and multiple peripheral power loads. Typical power

loads totaling over 260 W (350 mA x 8, 95 V) can be controlled at an appropriate duty

cycle depending on ambient temperature and number of drivers turned on simultaneously.

Typical loads include relays, solenoids, stepping Motors, magnetic print hammers,

multiplexed LED and incandescent displays, and heaters. All devices feature open-

collector outputs with integral clamp diodes.

The ULN2003 has series input resistors selected for operation directly with 5 V

TTL or CMOS. These devices will handle numerous interface needs — particularly those

beyond the capabilities of standard logic buffers. The ULN2804 has series input resistors

for operation directly from 6 V to 15 V CMOS or PMOS logic outputs.

36SVS Institute Of Technology

Page 37: Finger print authentication for bikes

Department Of ECE

The ULN is the standard Darlington arrays. The outputs are capable of sinking

500 mA and will withstand at least 50 V in the off state. Outputs may be paralleled for

higher load current capability. The ULN2804 will withstand 95 V in the off state.

These Darlington arrays are furnished in 18-pin dual in-line plastic packages (suffix

‘A’) or 18-lead small-outline plastic packages (suffix ‘LW’). All devices are pinned with

outputs opposite inputs to facilitate ease of circuit board layout. Prefix ‘ULN’ devices are

rated for operation over the temperature range of -20°C to +85°C; prefix ‘ULQ’ devices

are rated for operation to -40°C.

1. Output Voltage, VCE

2. Input Voltage, VIN ..............................30 V

3. Continuous Output Current, IC .... 500 mA

4. Continuous Input Current, IIN ....... 25 mA

5. Power Dissipation, PD

6. (one Darlington pair) .................. 1.0 W

7. Storage Temperature Range….-55°C to +150°

3.9 Fingerprint module:

System parameter and interface

serial number

Index Parameter Condition

1 Power supply 5V2 Working current 170mA3 Peak value current 200mA4 Fingerprint input

time<250ms

5 1:1 matching time <600msMatching features + matching

fingerprint

61:900 searching

time<2s

7Fingerprint

capacityMax. 960

8 FAR(False Acceptance Rate)

<0. 001 %

9 FRR(False Rejection

Rate)<1.5 %

10 Fingerprint template size

512bytes

37SVS Institute Of Technology

Page 38: Finger print authentication for bikes

Department Of ECE

11 Outer interface UART

Commands / Datasheet format

Commands / datasheet:Pack mark =01 CommandPack mark=02 Data, and has Follow-up package Pack mark=08 the last data pack, overAll data packets have to add: 0xEF01

Command packs format:

Byte 2bytes 4bytes1

byte2

bytes1byte … …

2 bytes

NamePack head

Chip add

Pack mark

Pack length

command Parameter1 …Parameter

nCheck sum

Content 0xEF01 Xxxx 01 N=

Data pack format:

Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes

NamePack head

Chip addPack mark

Pack length DataCheck sum

Content 0xEF01 xxxx 02

Over Pack format:

Byte 2bytes 4bytes 1 byte 2 bytes N bytes… … 2 bytes

namePack head

Chip addPack mark

Pack length dataCheck sum

content 0xEF01 xxxx 08

Data packs cannot ingress into executive flow alone, it has to follow behind the

command pack or respond pack.

Upload or upload data pack are the same format.

Pack length = the total bytes of pack length to check sum (command, parameter or data)

including check sum, but excludes the bytes of pack length itself.

38SVS Institute Of Technology

Page 39: Finger print authentication for bikes

Department Of ECE

Check sum includes all the bytes of the pack mark to check sum, in excess of 2-

byte binary are ignored.

Chip address are default as 0xFFFFFFFF before created, once the host computer

through the command to generate the chip address, all packets must be generated in

accordance with the address to send and receive. Chip will refuse to address the wrong

packet.

Command response

Response is to report for the implementation of the orders and results execution.

Response includes all the parameter and the follow-up data packets, PC only confirm by

receiving the SOC response and order execution.

Response packet format: 2bytes 4bytes 1 byte 2 bytes 1 byte N bytes 2 bytes

0xEF01 Chips add.Pack mark

07Pack

lengthConfirm

codeReturn

parameterCheck sum

Table 1.6: Commands / Datasheet formats

Fig 3.18: Fingerprint Verification System

39SVS Institute Of Technology

Page 40: Finger print authentication for bikes

Department Of ECE

Application

NGE - OP 67 can be used on all fingerprint verification systems, such as

R&D, Embedded interface development.

Complicated door-guard system;

Fingerprint IC card Identification Terminal;

Fingerprint identification and verification system associated with PC or embedded

environment.

Developer can develop various fingerprint verification application systems based on the

technical data.

3.10 Bike battery:

Bike battery consists of four wires red ,green,black,black and white, from these

four wires green wire is used for earthing and red wire is the battery power supplier and

black and white is used for starting the bike and stopping the bike and black wire is used

for display purpose .The four wires functions are given as;

RED: battery power supplier to all others

GREEN: only for earthing

BLACK: used for display (speed meter etc)

BLACK AND WHITE: used for start and stop the vehicle

Generally there are two conditions for the purpose of starting and stopping of the

bike the two conditions are shown in diagrammatically;

40SVS Institute Of Technology

Page 41: Finger print authentication for bikes

Department Of ECE

Key off condition

Key on condition

Fig 3.19: Key off/on Condition

When ever the green wire is earthed with black and white wire then the bike stops

and when ever the green wire is open circuit with the black and white wire then the bike

begins to start, all this process depends on the ignition lock of the bike, if on the key and

also to off the key it must satisfy certain condition to accept the condition.

41SVS Institute Of Technology

Page 42: Finger print authentication for bikes

Department Of ECE

SOFTWARE:

Operating System: WINDOWS XP

Software Used: KEIL, MICRO ‘C’ FLASH, EXPRESS PCB

3.11 KEIL SOFTWARE

Installing the Keil software on a Windows PC:

• Insert the CD-ROM in your computer’s CD drive

• On most computers, the CD will “auto run”, and you will see the Keil installation

menu. If the menu does not appear, manually double click on the Setup icon, in

the root directory: you will then see the Keil menu.

• On the Keil menu, please select “Install Evaluation Software”. (You will not

require a license number to install this software).

• Follow the installation instructions as they appear.

Loading the Projects:

The example projects for this book are NOT loaded automatically when you

install the Keil compiler. These files are stored on the CD in a directory “/Pont”. The files

are arranged by chapter: for example, the project discussed in Chapter 3 is in the

directory “/Pont/Ch03_00-Hello”. Rather than using the projects on the CD (where

changes cannot be saved), please copy the files from CD onto an appropriate directory on

your hard disk.

Note: you will need to change the file properties after copying: file transferred from the

CD will be ‘read only’.

42SVS Institute Of Technology

Page 43: Finger print authentication for bikes

Department Of ECE

Configuring the Simulator:

1. Open the Keil µVision2

2. Go to Project – Open Project and browse for Hello in Ch03_00 in Pont and open

it.

3. Go to Project – Select Device for Target ‘Target1’

4. Select 8052(all variants) and click OK

5. Now we need to check the oscillator frequency

6. Go to project – Options for Target ‘Target1’

7. Make sure that the oscillator frequency is 11.5902MHz.

8. Building the Target:

9. Build the target as illustrated in the figure below

10. Running the Simulation

11. Having successfully built the target, we are now ready to start the debug session

and run the simulator.

12. First start a debug session

13. The flashing LED we will view will be connected to Port 1. We therefore want to

observe the activity on port

14. To ensure that the port activity is visible, we need to start the ‘periodic window

update’ flag

15. Go to Debug - Go

16. While the simulation is running, view the performance analyzer to check the

delay durations.

17. Go to Debug – Performance Analyzer and click on it

18. Double click on DELAY_LOOP_Wait in Function Symbols: and click Define

button

43SVS Institute Of Technology

Page 44: Finger print authentication for bikes

Department Of ECE

Go to Project:

Go to Project – Select Device for Target ‘Target1’

Select 8052(all variants) and click OK

44SVS Institute Of Technology

Page 45: Finger print authentication for bikes

Department Of ECE

Now we need to check the oscillator frequency:Go to project – Options for Target ‘Target1’

Make sure that the oscillator frequency is 12MHz.

45SVS Institute Of Technology

Page 46: Finger print authentication for bikes

Department Of ECE

Building the Target

Build the target as illustrated in the figure below

Running the Simulation Having successfully built the target, we are now ready to start the debug session and run the simulator.First start a debug session

46SVS Institute Of Technology

Page 47: Finger print authentication for bikes

Department Of ECE

The flashing LED we will view will be connected to Port 1. We therefore want to observe the activity on this port

47SVS Institute Of Technology

Page 48: Finger print authentication for bikes

Department Of ECE

To ensure that the port activity is visible, we need to start the ‘periodic window update’ flag

48SVS Institute Of Technology

Page 49: Finger print authentication for bikes

Department Of ECE

Go to Debug - Go

While the simulation is running, view the performance analyzer to check the delay durations.

49SVS Institute Of Technology

Page 50: Finger print authentication for bikes

Department Of ECE

Go to Debug – Performance Analyzer and click on it

Double click on DELAY LOOP Wait in Function Symbols: and click Define button

50SVS Institute Of Technology

Page 51: Finger print authentication for bikes

Department Of ECE

Fig 3.20: Configuring the Simulator

51SVS Institute Of Technology

Page 52: Finger print authentication for bikes

Department Of ECE

Advantages & Applications

Advantages

The main advantage of our project is

• It is used to reduce the vehicle thieves

• It is used to build the own security of your own vehicle

• It is used to identify the thieves (while they are stealing the buzzer or alarm makes sound)

Disadvantages

• Whenever neighbor needs your vehicle he can’t start without you(vehicle owner).

• Else one of your friend or son has to move with him (friend or neighbor fingerprint identity is stored)

Applications

House hold based equipments

• It is used in vehicles and also the household equipments (such as door locks and almaris etc)

Automobiles

• It is used in each and every security things which are needed for us.

• It is used in identification purpose (person identification by using the thumb impression etc)

52SVS Institute Of Technology

Page 53: Finger print authentication for bikes

Department Of ECE

4. RESULTS

In our project, from the fingerprint module the wires are connected to the battery

of the vehicle .the wires from the ignition lock, red wire is connected to the battery to get

the power, green wire is connected for earthing, red black is connected for the display

purpose the power from the battery generates from the black wire then the total display

will appear.

In the ignition lock there are certain conditions when the bike is on and as well as

off condition, in the on condition the green wire is shorted with black and white wire then

there is short circuit hence the bike doesn’t start and when there is open circuit with in the

green wire then the bike begins to start, at the starting moment of the bike fingerprint

module ask for the verification of the fingerprint impression if matches they can use

otherwise it gives a sound from the buzzer.

53SVS Institute Of Technology

Page 54: Finger print authentication for bikes

Department Of ECE

5. CONCLUSION & FUTURE SCOPE

5.1 Conclusion

This project may helpful to the people who are earning a very less salaries and the people

who are richest, earning high salaries by keeping a powerful security on their own

vehicles, they can move anywhere they want by parking the vehicle at unknown place.

This may useful to each and every person in day to day life and they will never afraid of

the vehicle thefters. By this project people come to existence that our country is

developing and they move forward the leg with full of dareness in their minds.

5.2 Future Scope

In future we want to develop the same project but by adding a default user identifier and

in future we can make this project very bright, by using a snapshot video camera

whenever a thief ready for stealing the vehicle, as it records the total scenario happening

and also it sends the message to the owner of the vehicle by using the GSM and GPRS

technologies.

54SVS Institute Of Technology

Page 55: Finger print authentication for bikes

Department Of ECE

BIBILOGRAPHY

http://www.fingerprint.com/

http://en.wikipedia.org/wiki/Biometric

http://travel.state.gov/fingerprint/eppt/eppt_2788.html

http://www.buslab.org/index.php/content/view/24733/6

http://www.pcworld.com/article/id,103535-page,1/article.html

http://www.modulesfinger.in/site/india

55SVS Institute Of Technology