Sie sind auf Seite 1von 84

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

CHAPTER 1 INTRODUCTION
1.1 Introduction to Embedded System
An embedded system is a special-purpose system in which the computer is completely encapsulated by or dedicated to the device or system it controls. Unlike a general-purpose computer, such as a personal computer, an embedded system performs one or a few predefined tasks, usually with very specific requirements. Since the system is dedicated to specific tasks, design engineers can optimize it, reducing the size and cost of the product. Embedded systems are often mass-produced, benefiting from economies of scale. Personal digital assistants (PDAs) or handheld computers are generally considered embedded devices because of the nature of their hardware design, even though they are more expandable in software terms. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today. Embedded systems are controlled by one or more main processing cores that are typically either microcontrollers or digital signal processors (DSP). The key characteristic, however, is being dedicated to handle a particular task. They may require very powerful processors and extensive communication, for example air traffic control systems may usefully be viewed as embedded, even though they involve mainframe computers and dedicated regional and national networks between airports and radar. Physically, embedded systems ranges from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. In terms of complexity embedded systems can range from very simple with a single microcontroller chip, to very complex with multiple units, peripherals and networks mounted inside a large chassis or enclosure.

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 1. A simple Embedded System Examples of Embedded Systems Home automation products, such as thermostats, air conditioners, sprinklers, and security monitoring systems Handheld calculators Handheld computers Household appliances, including microwave ovens, washing machines, television sets, DVD players and recorders Medical equipment Personal digital assistant Computer peripherals such as routers and printers. Industrial controllers for remote machine operation.

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

1.2 Organization of Report


Chapter 1 gives the introduction to embedded systems and some examples, chapter 2 discusses about the technology review that is about previously used technology and the existing technology, chapter 3 tells about the design and implementation of the project, basic components and about the software, chapter 4 gives the results, applications and advantages of the project, chapter 5 is about the future scope of the project.

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

CHAPTER 2 TECHNOLOGY REVIEW


2.1 Previous Technology
On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by customer entering a personal identification number (PIN). Using an ATM, customers can access their bank accounts in order to make cash withdrawals, debit card cash advances, and check their account balances as well as purchase prepaid cell phone credit. If the currency being withdrawn from the ATM is different from that which the bank account is denominated in (e.g.: Withdrawing Japanese Yen from a bank account containing US Dollars), the money will be converted at an official wholesale exchange rate. Thus, ATMs often provide one of the best possible official exchange rates for foreign travellers, and are also widely used for this purpose.

Fig 2. Over view of an ATM machine

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

ATMs rely on authorization of a financial transaction by the card issuer or other authorizing institution via the communications network. This is often performed through an ISO messaging system. An ATM is typically made up of the following devices: CPU (to control the user interface and transaction devices) Magnetic and/or Chip card reader (to identify the customer) PIN Pad (similar in layout to a Touch tone or Calculator keypad), often manufactured as part of a secure enclosure.
Secure crypto processor, generally within a secure enclosure.

Display (used by the customer for performing the transaction)


Function key buttons (usually close to the display) or a Touch screen (used to select

the various aspects of the transaction) Record Printer (to provide the customer with a record of their transaction)
Vault (to store the parts of the machinery requiring restricted access)

Housing (for aesthetics and to attach signage to) Due to heavier computing demands and the falling price of Personal Computer-like architectures, ATMs have moved away from custom hardware architectures using microcontrollers and/or application-specific integrated circuits to adopting the hardware architecture of a Personal Computer, such as, USB connections for peripherals, Ethernet and IP communications, and use personal computer operating systems. Although it is undoubtedly cheaper to use shelf hardware, it does make ATMs potentially vulnerable to the same sort of problems exhibited by conventional Personal Computers. ATM's card slot and the use of a wireless surveillance camera or a modified digital camera or a false PIN keypad to observe the user's PIN. Card data is then cloned into a duplicate card and the criminal attempts a standard cash withdrawal. The availability of low-cost commodity wireless cameras, keypads, card readers, and card writers has made it a relatively simple form of fraud, with comparatively low risk to the fraudsters. To stop these frauds finger print module is used.

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

2.2 Present Technology


To increase the security that customer use the ATM machine finger print module is used. Once user's bank card is lost and the if password is known to others , that person will draw all the cash in the shortest time, which will bring enormous financial losses to customer. As the previous technology has this drawback, finger print module is used. In recent years, the algorithm that the fingerprint recognition continuously updated, which has offered new verification means for us, the original password authentication method combined with the biometric identification technology verify the clients' identity better and achieve the purpose that use of ATM machines improve the safety effectively. The embedded ATM client authentication system is based on fingerprint recognition which is designed after analyzed existed ATM system. The LPC 2148 chip is used as the core of this embedded system which is associated with the technologies of fingerprint recognition and current high speed network communication. The primary functions are shown as follows: Fingerprint recognition: The masters' fingerprint information was used as the standards of identification. It must certify the feature of the human fingerprint before using ATM system. Remote authentication: System can compare current client's fingerprint information with remote fingerprint data server. Telephone alarming: Once an exception happens, such as log in as the fake identity, the system will start the phone alarm to inform client and bank staff as soon as possible. Message alarming: the message can be send to the relevant staffs mobile phone without any noise, in order to carry on emergency processing. Police network connection: The system can call the police via the police network. Before using the ATM terminal, the client's fingerprint feature will be connected to the remote fingerprint data server to match fingerprint data with the master's, if the result

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

isn't correct, the system will call police automatically and send alarm to the credit card owner.

2.3 Hardware Components


1. Micro Controllers(ARM-7) 2. Power Supply 3. GSM Modem 4. LCD. 5. MAX 232 6. BUZZER 7. FINGER PRINT MODULE 8. KEYBOARD

2.3.1. Micro Controller In this project work the micro-controller plays a major role. Microcontrollers were originally used as components in complicated process-control systems. However, because of their small size and low price, Micro-controllers are now also being used in regulators for individual control loops. In several areas Micro-controllers are now outperforming their analog counterparts and are cheaper as well. 2.3.2. Power Supply This section is meant for supplying Power to all the sections mentioned above. It basically consists of a Transformer to step down the 230V ac to 18V ac followed by diodes. Here diodes are used to rectify the AC to DC. After rectification the obtained rippled dc is filtered using a capacitor Filter. A positive voltage regulator is used to regulate the obtained dc voltage.

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

But here in this project two power supplies 7805 and 7812 are used one is meant to supply operating voltage for Microcontroller and the other is to supply control voltage for GSM module. 2.3.3. LCD Display Section This section is basically meant to show up the status of the project. This project makes use of Liquid Crystal Display to display / prompt for necessary information. 2.3.4. GSM Modem We are using GSM MODEM to communicate with the mobile phone to which we are going to send the message. When ever an authorized person wants to know the status of parameter or whenever parameters values increases above the threshold value then a message will be sent through modem.This fault is indicated by displaying in LCD. This project will facilitates us to monitor as well as control different parameters at a time which increase accuracy and speed. 2.3.5. Buzzer Section The buzzer is used to alert/indicate the completion of process. It is sometimes used to indicate the start of the embedded system by alerting during start-up. 2.3.6. Finger Print Scanner A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. It supports wide range of fingerprint sensor interoperability giving you a freedom to select suitable biometric sensor that most fits to this application. Furthermore, the fingerprint data for enrollment and verification are compatible among different sensors, even if they are based on different technologies. This feature of unification presents application manufacturers and system integrators with much more flexibility than ever before. 2.3.7. EEPROM

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

This section acts as a backend database for the project. This section is realized using an EEPROM integrated circuit chip.

CHAPTER 3 DESIGN AND IMPLEMENTATION


The power supply for the LPC2148 is produced by using available 1 230VAC with the help of conversion AC to DC supply which includes four most basic steps of step down the available power to required level of power supply, Rectification of 1 supply to the pulsated DC supply, filtering of Pulsated DC supply to non regulated DC supply and then through regulator a pure regulated DC supply is produced.

3.1 Block Diagram

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 3. ATM terminal design block diagram

3.1.1. Circuit description


The project ATM terminal design is based on fingerprint recognition is used to

provide the high security for ATM access. The project will use ARM7 TDMI-S based NXPs (national semiconductors and Philips) LPC 2148 microcontroller in LQFP (Liquid Quad Flat package) with 64 pins. The Power requirement of LPC2148 Microcontroller is 3.3VDC and VSS ground. The power supply for the LPC2148 is produced by using available 1 230VAC with the help of conversion AC to DC supply which includes four most basic steps of step down the available power to required level of power supply, Rectification of 1 supply to

10

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

the pulsated DC supply, filtering of Pulsated DC supply to non regulated DC supply and then through regulator a pure regulated DC supply is produced. This project mainly consists of the LPC2148 microcontroller, GSM modem, and Fingerprint Module and ATM terminal with key pad. The fingerprint module is used to enroll the fingerprint and verification of the finger tips of that person. This can also be used to identify the persons fingerprint, which is already stored in the database. The fingerprint module is connected to the microcontroller using the serial communication port UART0.GSM module is connected to the microcontroller using the serial communication port UART1. The fingerprint module consists of the finger print scanner and the driver circuit for the fingerprint. Every person is given with a unique account number and password for that account. Each and every person has to enter the account number which is stored in the database (EEPROM). If the entered account number is matched with the existed account, it will request for the password to access that account. If the entered account number is wrong, it will buzz the buzzer. If the entered account number and the entered password are correct, it will request for the finger print verification. If the entered password and the account number are not matched then microcontroller will send a message to the account holder with the GSM technology. If the finger print of that person is matched with the details of that account, then that person will be able to do the ATM transactions like balance check, mini statement, deposit and withdrawal. If the finger print of that person is not matched then microcontroller will send a message to the account holder with the GSM technology. The ATM terminal is constructed as in general. The balance checking, Deposit required amount, the withdrawal amount and mini statement. The result of that transaction is stored in the EEPROM for the further transactions. This project is useful for the advanced security for the ATM transactions and also for the Locker system.

3.2 ARM processor overview


ARM stands for Advanced RISC Machines. It is a 32 bit processor core, used for high end application.It is widely used in Advanced Robotic Applications.

11

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 4 ARM Processor

3.2.1. History and Development

ARM was developed at Acron Computers ltd of Cambridge, England between 1983 and 1985. RISC concept was introduced in 1980 at Stanford and Berkley. ARM ltd was found in 1990. ARM cores are licensed to partners so as to develop and fabricate new microcontrollers around same processor cores.

3.2.2. Key Features 1. 16-bit/32-bit ARM7TDMI-S microcontroller in a tiny LQFP64 package. 2. 8 kB to 40 kB of on-chip static RAM and 32 kB to 512 kB of on-chip flash memory. 128-bit wide interface/accelerator enables high-speed 60 MHz operation. 3. In-System Programming/In-Application Programming (ISP/IAP) via on-chip boot loader software. Single flash sector or full chip erase in 400 ms and programming of 256 bytes in 1ms.

12

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

4. EmbeddedICE RT and Embedded Trace interfaces offer real-time debugging with the on-chip Real Monitor software and high-speed tracing of instruction execution. 5. USB 2.0 Full-speed compliant device controller with 2kB of endpoint RAM. In addition, the LPC2146/48 provides 8kB of on-chip RAM accessible to USB by DMA. 6. One or two (LPC2141/42 vs. LPC2144/46/48) 10-bit ADCs provide a total of 6/14 analog inputs, with conversion times as low as 2.44s per channel. 7. Single 10-bit DAC provides variable analog output (LPC2142/44/46/48 only). 8. Two 32-bit timers/external event counters (with four capture and four compare Channels each), PWM unit (six outputs) and watchdog. 9. Low power Real-Time Clock (RTC) with independent power and 32 kHz clock input. 10. Multiple serial interfaces including two UARTs (16C550), two Fast I2C-bus (400 kbit/s), SPI and SSP with buffering and variable data length capabilities. 11. Vectored Interrupt Controller (VIC) with configurable priorities and vector addresses. 12. Up to 45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64 package. 13. Up to 21 external interrupt pins available. 14. 60 MHz maximum CPU clock available from programmable on-chip PLL with settling time of 100 s. 15. On-chip integrated oscillator operates with an external crystal from 1 MHz to 25 MHz 16. Power saving modes include idle and Power-down. 17. Individual enable/disable of peripheral functions as well as peripheral clock scaling for additional power optimization. 18. Processor wake-up from Power-down mode via external interrupt or BOD. 19. Single power supply chip with POR and BOD circuits: 20. CPU operating voltage range of 3.0 V to 3.6 V (3.3 V 10 %) with 5 V tolerant I/O Pads.

13

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.3. LPC2148 Pin Diagram

14

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 5 LPC2148 Pin Diagram

15

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.4. Block diagram

Fig 6 LPC2148 Block diagram

16

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.5. Pin Description

17

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

18

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

19

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

20

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Table 1 Pin Description

21

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.6. Core Data path Architecture is characterized by Data path and control path. Data path is organized in such a way that, operands are not fetched directly from memory locations. Data items are placed in register files. No data processing takes place in memory locations. Instructions typically use 3 registers. 2 source registers and 1 destination register. Barrel Shifter preprocesses data, before it enters ALU - Barrel Shifter is basically a combinational logic circuit, which can shift data to left or right by arbitrary number of position in same cycle. Increment or Decrement logic can update register content for sequential access

3.2.7. Pipeline

In ARM 7, a 3 stage pipeline is used. A 3 stage pipeline is the simplest form of pipeline that does not suffer from the problems such as read before write. In a pipeline, when one instruction is executed, second instruction is decoded and third instruction will be fetched. This is executed in a single cycle.

3.2.8. Register Bank


ARM 7 uses load and store Architecture. Data has to be moved from memory location to a central set of registers. Data processing is done and is stored back into memory. Register bank contains, general purpose registers to hold either data or address. It is a bank of 16 user registers R0-R15 and 2 status registers. Each of these registers is 32 bit wide.

22

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.9. Data Registers- R0-R15 R0-R12 - General Purpose Registers R13-R15 - Special function registers of which, R13 - Stack Pointer, refers to entry pointer of Stack. R14 - Link Register, Return address is put to this when ever a subroutine is called. R15 - Program Counter Depending upon application R13 and R14 can also be used as GPR. But not commonly used.

Fig 7 CPSR

In addition there are 2 status registers


CPSR - Current program status register, status of current execution is stored. SPSR - Saved program Status register, includes status of program as well as processor.

3.2.10. CPSR CPSR contains a number of flags which report and control the operation of ARM7 CPU.

23

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 8 Flags of CPSR

Conditional Code Flags N - Negative Result from ALU Z - Zero result from ALU C - ALU operation carried out
V - ALU operation overflowed

3.2.11. Interrupt Enable Bits I - IRQ, Interrupt Disable F - FIQ, Disable Fast Interrupt
.

3.2.12. ARM features

Barrel Shifter in data path that maximize the usage of hardware available on the chip. Auto increment and Auto decrement addressing modes to optimize program loop. This feature is not common in RISC architecture. Load and Store instruction to maximize data throughput. Conditional execution of instructions, to maximize execution throughput.

All registers in the VIC are word registers. Byte and half word reads and write are not Supported.

24

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.13. Universal Asynchronous Receiver/Transmitter 0 Features 16 byte Receive and Transmit FIFOs Register locations conform to 550 industry standard Receiver FIFO trigger points at 1, 4, 8, and 14 bytes Built-in fractional baud rate generator with autobauding capabilities. Mechanism that enables software and hardware flow control implementation

Pin description

Table 2 UART0 pin description

Architecture The VPB interface provides a communications link between the CPU or host and the UART0. The UART0 receiver block, U0RX, monitors the serial input line, RXD0, for valid input. The UART0 RX Shift Register (U0RSR) accepts valid characters via RXD0. After a valid character is assembled in the U0RSR, it is passed to the UART0 RX Buffer Register FIFO to await access by the CPU or host via the generic host interface. The UART0 transmitter block, U0TX, accepts data written by the CPU or host and buffers the data in the UART0 TX Holding Register FIFO (U0THR). The UART0 TX Shift Register (U0TSR) reads the data stored in the U0THR and assembles the data to transmit via the serial output pin, TXD0 The UART0 Baud Rate Generator block, U0BRG, generates the timing enables used by the UART0 TX block. The U0BRG clock input source is the VPB clock (PCLK). The main clock is divided down per the divisor specified in the U0DLL and U0DLM registers. This divided down clock is a 16x oversample clock, NBAUDOUT The interrupt interface contains registers U0IER and U0IIR. The interrupt interface receives several one clock wide enables from the U0TX and U0RX blocks

25

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Status information from the U0TX and U0RX is stored in the U0LSR. Control information for the U0TX and U0RX is stored in the U0LCR

Fig 9 UART0 block diagram

26

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.2.14. Universal Asynchronous Receiver/Transmitter 1 Features UART1 is identical to UART0, with the addition of a modem interface. 16 byte Receive and Transmit FIFOs Register locations conform to 550 industry standard Receiver FIFO trigger points at 1, 4, 8, and 14 bytes Built-in fractional baud rate generator with auto bauding capabilities. Mechanism that enables software and hardware flow control implementation Standard modem interface signals included with flow control (auto-CTS/RTS) fully supported in hardware (LPC2144/6/8 only).

27

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 10 UART1 block diagram

28

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.3. INTRODUCTION TO GSM TECHNOLOGY


3.3.1. What is GSM? Global System for Mobile Communication (GSM) is a set of ETSI standards specifying the infrastructure for a digital cellular service. The standard is used in approx. 85 countries in the world including such locations as Europe, Japan and Australia. 3.3.2. GSM Call Routing Mobile Subscriber Roaming When a mobile subscriber roams into a new location area (new VLR), the VLR automatically determines that it must update the HLR with the new location information, which it does using an SS7 Location Update Request Message. The Location Update Message is routed to the HLR through the SS7 network, based on the global title translation of the IMSI that is stored within the SCCP Called Party Address portion of the message. The HLR responds with a message that informs the VLR whether the subscriber should be provided service in the new location. Mobile Subscriber ISDN Number (MSISDN) Call Routing When a user dials a GSM mobile subscriber's MSISDN, the PSTN routes the call to the Home MSC based on the dialed telephone number. The MSC must then query the HLR based on the MSISDN, to attain routing information required to route the call to the subscribers' current location. The MSC stores global title translation tables that are used to determine the HLR associated with the MSISDN. When only one HLR exists, the translation tables are trivial. When more than one HLR is used however, the translations become extremely challenging; with one translation record per subscriber (see the example below). Having determined the appropriate HLR address, the MSC sends a Routing Information Request to it. When the HLR receives the Routing Information Request, it maps the MSISDN to the IMSI, and ascertains the subscribers' profile including the current VLR at which the subscriber is registered. The HLR then queries the VLR for a Mobile Station Roaming Number (MSRN). The MSRN is essentially an ISDN telephone number at which the

29

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

mobile subscriber can currently be reached. The MSRN is a temporary number that is valid only for the duration of a single call.
The HLR generates a response message, which includes the MSRN, and sends it back across the SS7 network to the MSC. Finally, the MSC attempts to complete the call using the MSRN provided

Fig 11 GSM GSM (Global System for Mobile communication) is a digital mobile telephone system that is widely used in many parts of the world. GSM uses a variation of Time Division Multiple Access (TDMA) and is the most widely used of the three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other streams of user data, each in its own time slot. GSM operates in the 900MHz, 1800MHz, or 1900 MHz frequency bands.

GSM has been the backbone of the phenomenal success in mobile telecoms over the last decade. Now, at the dawn of the era of true broadband services, GSM continues to evolve to meet new demands. One of GSM's great strengths is its international roaming capability, giving consumers a seamless service. This has been a vital driver in growth,

30

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

with around 300 million. In the Americas, today's 7 million subscribers are set to grow rapidly, with market potential of 500 million in population, due to the introduction of GSM 800, which allows operators using the 800 MHz band to have access to GSM technology too. GSM together with other technologies is part of an evolution of wireless mobile telecommunication that includes High-Speed Circuit-Switched Data (HCSD), General Packet Radio System (GPRS), Enhanced Data GSM Environment (EDGE), and Universal Mobile Telecommunications Service(UMTS). GSM security issues such as theft of service, privacy, and legal interception continue to raise significant interest in the GSM community. The purpose of this portal is to raise awareness of these issues with GSM security. The mobile communications has become one of the driving forces of the digital revolution. Everyday, millions of people are making phone calls by pressing a few buttons. Little is known about how one person's voice reaches the other person's phone that is thousands of miles away. Even less is known about the security measures and protection behind the system. The complexity of the cell phone is increasing as people begin sending text messages and digital pictures to their friends and family. The cell phone is slowly turning into a handheld computer. All the features and advancements in cell phone technology require a backbone to support it. The system has to provide security and the capability for growth to accommodate future enhancements. General System for Mobile Communications, GSM, is one of the many solutions out there. GSM has been dubbed the "Wireless Revolution" and it doesn't take much to realize why GSM provides a secure and confidential method of communication.

3.3.3. GSM Modems


A GSM modem can be an external modem device, such as the Wavecom FASTRACK Modem. Insert a GSM SIM card into this modem, and connect the modem to an available serial port on your computer. A GSM modem can be a PC Card installed in a notebook computer, such as the Nokia Card Phone. A GSM modem could also be a standard GSM mobile phone with the appropriate cable and software driver to connect to a serial port on your computer. Phones

31

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

such as the Nokia 7110 with a DLR-3 cable, or various Ericsson phones, are often used for this purpose. A dedicated GSM modem (external or PC Card) is usually preferable to a GSM mobile phone. This is because of some compatibility issues that can exist with mobile phones. For example, if you wish to be able to receive inbound MMS messages with your gateway, and you are using a mobile phone as your modem, you must utilize a mobile phone that does not support WAP push or MMS. This is because the mobile phone automatically processes these messages, without forwarding them via the modem interface. Similarly some mobile phones will not allow you to correctly receive SMS text messages longer than 160 bytes (known as concatenated SMS or long SMS). This is because these long messages are actually sent as separate SMS messages, and the phone attempts to reassemble the message before forwarding via the modem interface. (Weve observed this latter problem utilizing the Ericsson R380, while it does not appear to be a problem with many other Ericsson models.) When you install your GSM modem, or connect your GSM mobile phone to the computer, be sure to install the appropriate Windows modem driver from the device manufacturer. To simplify configuration, the Now SMS/MMS Gateway will communicate with the device via this driver. An additional benefit of utilizing this driver is that you can use Windows diagnostics to ensure that the modem is communicating properly with the computer. The Now SMS/MMS gateway can simultaneously support multiple modems, provided that your computer hardware has the available communications port resources.

Fig 12 GSM smart modem

32

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 13. Internal diagram of GSM modem Installing the modem To install the modem, plug the device on to the supplied SMPS Adapter. For Automotive applications fix the modem permanently using the mounting slots (optional as per your requirement dimensions). Inserting/ Removing the SIM Card: To insert or Remove the SIM Card, it is necessary to press the SIM holder ejector button with Sharp edged object like a pen or a needle. With this, the SIM holder comes out a little, then pulls it out and insert or remove the SIM Card

Fig 14 Inserting/Removing the SIM card into the modem

Make sure that the ejector is pushed out completely before accessing the SIM Card holder do not remove the SIM card holder by force or tamper it (it may permanently damage). Place the SIM Card Properly as per the direction of the installation. It is very important that the SIM is placed in the right direction for its proper working condition

33

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Connecting External Antenna Connect GSM Smart Modem to the external antenna with cable end with SMA male. The Frequency of the antenna may be GSM 900/1800 MHz. The antenna may be ( 0 dbi, 3 dbi or short length L-type antenna) as per the field conditions and signal conditions. DC Supply Connection The Modem will automatically turn ON when connection is given to it. The following is the Power Supply Requirement:

Parameters Supply Voltage Peak Current at 5 V supply Average Current at 5 V supply in idle Mode Average Current at 5 V supply in idle Mode and RS232 Power Saving Activated

MIN 5V

Avg 9V

Max 12 V 1.8 A

(during

transmission) 35 mA 13 mA

Table 3 Power supply requirement

3.4. LED Status Indicator The LED will indicate different status of the modem:

34

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

OFF ON Flashing Slowly Flashing rapidly

Modem Switched off Modem is connecting to the network Modem is in idle mode Modem is in transmission/communication (GSM only)

3.4.1. AT Commands Features


Line settings A serial link handler is set with the following default values Autobaud, 8 bits data, 1 stop bit, no parity, flow control. Command line Commands always start with AT (which means attention) and finish with a <CR> character. Information responses and result codes Responses start and end with <CR><LF>,. If command syntax is incorrect, an ERROR string is returned. If command syntax is correct but with some incorrect parameters, the +CME ERROR: <Err> or +CMS ERROR: <SmsErr> strings are returned with different error codes. If the command line has been performed successfully, an OK string is returned. In some cases, such as AT+CPIN? or (unsolicited) incoming events, the product does not return the OK string as a response.

Services provided by GSM

35

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

GSM was designed having interoperability with ISDN in mind, and the services provided by GSM are a subset of the standard ISDN services. Speech is the most basic, and most important, teleservice provided by GSM. In addition, various data services are supported, with user bit rates up to 9600 bps. Specially equipped GSM terminals can connect with PSTN, ISDN, Packet Switched and Circuit Switched Public Data Networks, through several possible methods, using synchronous or asynchronous transmission. Also supported are Group 3 facsimile service, videotex, and teletex. Other GSM services include a cell broadcast service, where messages such as traffic reports, are broadcast to users in particular cells. A service unique to GSM, the Short Message Service, allows users to send and receive point-to-point alphanumeric messages up to a few tens of bytes. It is similar to paging services, but much more comprehensive, allowing bi-directional messages, storeand-forward delivery, and acknowledgement of successful delivery. Supplementary services enhance the set of basic teleservices. In the Phase I specifications, supplementary services include variations of call forwarding and call barring, such as Call Forward on Busy or Barring of Outgoing International Calls. Many more supplementary services, including multiparty calls, advice of charge, call waiting, and calling line identification presentation will be offered in the Phase 2 specifications.

3.4.2. Architecture of the GSM network


A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. The Mobile Station is carried by the subscriber. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown are the Operations

36

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

A GSM network is composed of several functional entities, whose functions and interfaces are specified. Figure 1 shows the layout of a generic GSM network. The GSM network can be divided into three broad parts. Subscriber carries the Mobile Station. The Base Station Subsystem controls the radio link with the Mobile Station. The Network Subsystem, the main part of which is the Mobile services Switching Center (MSC), performs the switching of calls between the mobile users, and between mobile and fixed network users. The MSC also handles the mobility management operations. Not shown is the Operations intendance Center, which oversees the proper operation and setup of the network. The Mobile Station and the Base Station Subsystem communicate across the Um interface, also known as the air interface or radio link. The Base Station Subsystem communicates with the Mobile services Switching Center across the A interface.

Fig 15 General architecture of a GSM network

Mobile Station The mobile station (MS) consists of the mobile equipment (the terminal) and a smart card called the Subscriber Identity Module (SIM). The SIM provides personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. By inserting the SIM card into another GSM terminal, the user is able to receive calls at that terminal, make calls from that terminal, and receive other subscribed services.

37

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

The mobile equipment is uniquely identified by the International Mobile Equipment Identity (IMEI). The SIM card contains the International Mobile Subscriber Identity (IMSI) used to identify the subscriber to the system, a secret key for authentication, and other information. The IMEI and the IMSI are independent, thereby allowing personal mobility. The SIM card may be protected against unauthorized use by a password or personal identity number. Base Station Subsystem The Base Station Subsystem is composed of two parts, the Base Transceiver Station (BTS) and the Base Station Controller (BSC). These communicate across the standardized Abis interface, allowing (as in the rest of the system) operation between components made by different suppliers. The Base Transceiver Station houses the radio transceivers that define a cell and handles the radio-link protocols with the Mobile Station. In a large urban area, there will potentially be a large number of BTSs deployed, thus the requirements for a BTS are ruggedness, reliability, portability, and minimum cost. The Base Station Controller manages the radio resources for one or more BTSs. It handles radio-channel setup, frequency hopping, and handovers, as described below. The BSC is the connection between the mobile station and the Mobile service Switching Center (MSC). Network Subsystem The central component of the Network Subsystem is the Mobile services Switching Center (MSC). It acts like a normal switching node of the PSTN or ISDN, and additionally provides all the functionality needed to handle a mobile subscriber, such as registration, authentication, location updating, handovers, and call routing to a roaming subscriber. These services are provided in conjunction with several functional entities, which together form the Network Subsystem. The MSC provides the connection to the fixed networks (such as the PSTN or ISDN). Signalling between functional entities in the Network Subsystem uses Signalling System Number 7 (SS7), used for trunk signalling in ISDN and widely used in current public networks.

38

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

The Home Location Register (HLR) and Visitor Location Register (VLR), together with the MSC, provide the call-routing and roaming capabilities of GSM. The HLR contains all the administrative information of each subscriber registered in the corresponding GSM network, along with the current location of the mobile. The location of the mobile is typically in the form of the signaling address of the VLR associated with the mobile as a distributed database station. The actual routing procedure will be described later. There is logically one HLR per GSM network, although it may be implemented The Visitor Location Register (VLR) contains selected administrative information from the HLR, necessary for call control and provision of the subscribed services, for each mobile currently located in the geographical area controlled by the VLR. Although each functional entity can be implemented as an independent unit, all manufacturers of switching equipment to date implement the VLR together with the MSC, so that the geographical area controlled by the MSC corresponds to that controlled by the VLR, thus simplifying the signalling required. Note that the MSC contains no information about particular mobile stations --- this information is stored in the location registers. The other two registers are used for authentication and security purposes. The Equipment Identity Register (EIR) is a database that contains a list of all valid mobile equipment on the network, where each mobile station is identified by its International Mobile Equipment Identity (IMEI). An IMEI is marked as invalid if it has been reported stolen or is not type approved. The Authentication Center (AUC) is a protected database that stores a copy of the secret key stored in each subscriber's SIM card, which is used for authentication and encryption over the radio channel.

3.5. LCD (Liquid Crystal Display)


Liquid crystal displays (LCD s) have materials which combine the properties of both liquids and crystals. Rather than having a melting point, they have a temperature range within which the molecules are almost as mobile as they would be in a liquid, but are grouped together in an ordered form similar to a crystal. An LCD consists of two glass panels, with the liquid crystal material sand witched in between them. The inner surface of the glass plates are coated with transparent electrodes which define the character, symbols or patterns to be displayed polymeric layers

39

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

are present in between the electrodes and the liquid crystal, which makes the liquid crystal molecules to maintain a defined orientation angle. One each polarisers are pasted outside the two glass panels. These polarisers would rotate the light rays passing through them to a definite angle, in a particular direction When the LCD is in the off state, light rays are rotated by the two polarisers and the liquid crystal, such that the light rays come out of the LCD without any orientation, and hence the LCD appears transparent. When sufficient voltage is applied to the electrodes, the liquid crystal molecules would be aligned in a specific direction. The light rays passing through the LCD would be rotated by the polarisers, which would result in activating / highlighting the desired characters. The LCDs are lightweight with only a few millimeters thickness. Since the LCDs consume less power, they are compatible with low power electronic circuits, and can be powered for long durations. The LCD s wont generate light and so light is needed to read the display. By using backlighting, reading is possible in the dark. The LCDs have long life and a wide operating temperature range. Changing the display size or the layout size is relatively simple which makes the LCDs more customer friendly. The LCD s used exclusively in watches, calculators and measuring instruments is the simple seven-segment displays, having a limited amount of numeric data. The recent advances in technology have resulted in better legibility, more information displaying capability and a wider temperature range. These have resulted in the LCD s being extensively used in telecommunications and entertainment electronics. The LCD s has even started replacing the cathode ray tubes (CRTs) used for the display of text and graphics, and also in small TV applications. Overview Each pixel of an LCD typically consists of a layer of molecules aligned between two transparent electrodes, and two polarizing filters, the axes of transmission of which are

40

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

(in most of the cases) perpendicular to each other. With no actual liquid crystal between the polarizing filters, light passing through the first filter would be blocked by the second (crossed) polarizer. The surfaces of the electrodes that are in contact with the liquid crystal material are treated so as to align the liquid crystal molecules in a particular direction. This treatment typically consists of a thin polymer layer that is unidirectionally rubbed using, for example, a cloth. The direction of the liquid crystal alignment is then defined by the direction of rubbing. Electrodes are made of a transparent conductor called Indium Tin Oxide (ITO). The Liquid Crystal Display is intrinsically a passive device, it is a simple light valve. The managing and control of the data to be displayed is performed by one or more circuits commonly denoted as LCD drivers. Before applying an electric field, the orientation of the liquid crystal molecules is determined by the alignment at the surfaces of electrodes. In a twisted nematic device (still the most common liquid crystal device), the surface alignment directions at the two electrodes are perpendicular to each other, and so the molecules arrange themselves in a helical structure, or twist. This induces the rotation of the polarization of the incident light, and the device appears grey. If the applied voltage is large enough, the liquid crystal molecules in the center of the layer are almost completely untwisted and the polarization of the incident light is not rotated as it passes through the liquid crystal layer. This light will then be mainly polarized perpendicular to the second filter, and thus be blocked and the pixel will appear black. By controlling the voltage applied across the liquid crystal layer in each pixel, light can be allowed to pass through in varying amounts thus constituting different levels of gray illumination. As LCD panels produce no light of their own, they require an external lighting mechanism to be easily visible. On most displays, this consists of a cold cathode fluorescent lamp that is situated behind the LCD panel. For battery-operated units (e.g. laptops) this requires an inverter to convert DC to AC. Passive-matrix displays are usually not backlit, but active-matrix displays almost always are, with a few exceptions such as the display in the original Game boy Advance. Recently, two types of LED backlit displays have appeared in some televisions as an alternative to conventional backlit LCDs. In one scheme, the LEDs are used to backlight the entire LCD panel. In another scheme, a set of red, green and blue LEDs is used to illuminate a small cluster of pixels, which can improve contrast and black level in some

41

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

situations. For example, the LEDs in one section of the screen can be dimmed to produce a dark section of the image while the LEDs in another section are kept bright. Both schemes also allow for a slimmer panel than on conventional displays. Passive-matrix and active-matrix addressed LCDs Monochrome passive-matrix LCDs were standard in most early laptops (although a few used plasma displays) and the original Nintendo Game Boy until the mid-1990s, when color active-matrix became standard on all laptops. The commercially unsuccessful Macintosh Portable (released in 1989) was one of the first to use an active-matrix display (though still monochrome). Passive-matrix LCDs are still used today for applications less demanding than laptops and TVs. In particular, portable devices with less information content to be displayed, where lowest power consumption (no backlight), low cost and/or readability in direct sunlight are needed, use this type of display. Displays having a passive-matrix structure are employing super-twisted nematic STN or double-layer STN (DSTN) technology (the latter of which addresses a colorshifting problem with the former), and color-STN (CSTN) in which color is added by using an internal filter. STN LCDs have been optimized for passive-matrix addressing. They exhibit a sharper threshold of the contrast-vs-voltage characteristic than the original TN LCDs. This is important, because pixels are subjected to partial voltages even while not selected. Crosstalk between activated and non-activated pixels has to be handled properly by keeping the RMS voltage of non-activated pixels below the threshold voltage, while activated pixels are subjected to voltages above threshold. STN LCDs have to be continuously refreshed by alternating pulsed voltages of one polarity during one frame and pulses of opposite polarity during the next frame. Individual pixels are addressed by the corresponding row and column circuits. This type of display is called passive-matrix addressed, because the pixel must retain its state between refreshes without the benefit of a steady electrical charge. As the number of pixels (and, correspondingly, columns and rows) increases, this type of display becomes less feasible. Slow response times and poor contrast are typical of passive-matrix addressed LCDs with too many pixels.

42

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Code (hex)
1 2 4 6 5 7 8 A C E F 10 14 18 1C 80 C0 38

Command to LCD Instruction Register


Clear display screen Return home Decrement cursor Increment cursor Shift display right Shift display left Display off, cursor off Display off, cursor on Display on, cursor off Display on, cursor on Display on, cursor blinking Shift cursor position to left Shift cursor position to right Shift the entire display to the left Shift the entire display to the right Force cursor to beginning of 1st line Force cursor to beginning of 2nd line 2 lines and 5x7 matrix

Table 4 LCD Command Codes

In our project we used 162 LCD display for displaying the advertisement. 162 LCD display

43

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Features i. ii. iii. iv. v. vi. vii. viii. ix. x. xi. COB with metal frame 57 dot with cursor Built in controller KS0066 or equivalent +5v single power supply 1/16 duty cycle LED B/L pins:15/16 or A/K or Option: LED array/edge, B/L,EL/Bl Option: +3v single power supply Option: -ve voltage built in external Option: FFC cable Option: LCD Vop fix on 5v.

Mechanical Data Tab. 3.9. Mechanical Data of LCD

Item

Standard Value

Unit

Module Dimension

80.036.0

mm

Viewing area

66.016.0

mm

Dot size Character size

0.560.66 2.965.56

mm mm

Pin Assignment Tab. 3.10. Pin assignment of LCD Pin Symbol Function

44

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

1 2 3 4 5 6 7~14 15

Vss Vdd Vo Rs R/w E DB0~7 A/Vee

GND +5v(optional +3v) Contrast adjustment H/L register select signal H/L read/write signal HL enable signal H/L data bus line Power supply for B/L(+)/Negative voltage output

16

Power supply for B/L(GND)

Electronic characteristics Tab. 3.11. Electronic characteristics of LCD

Item Input voltage Supply current

Symbol Vdd Idd

Condition Vdd = +5V Vdd = +5V

Value 5.0 1.2

Unit V mA

Typ LCD driving voltage Vdd V0 70C 25C -25C


Array LED forward current

Option 5.0 5.0 5.0 V

3.6 4.0 5.2

If

25C

100

mA

45

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Edge LED forward current EL power voltage Vel Vel = 110Vac/400Hz V If 25C 20 mA

3.5.1. Uses
The LCDs used exclusively in watches, calculators and measuring instruments are the simple seven-segment displays, having a limited amount of numeric data. The recent advances in technology have resulted in better legibility, more information displaying capability and a wider temperature range. These have resulted in the LCDs being extensively used in telecommunications and entertainment electronics. The LCDs have even started replacing the cathode ray tubes (CRTs) used for the display of text and graphics, and also in small TV applications. 3.5.2. LCD Interfacing

46

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 16 Sending commands and data to LCDs with a time delay

To send any command from table 2 to the LCD, make pin RS=0. For data, make RS=1.Then place a high to low pulse on the E pin to enable the internal latch of the LCD. 3.6. Buzzer The "Piezoelectric sound components" introduced herein operate on an innovative principle utilizing natural oscillation of piezoelectric ceramics. These buzzers are offered in lightweight compact sizes from the smallest diameter of 12mm to large Piezo electric sounders. Today, piezoelectric sound components are used in many ways such as home appliances, OA equipment, audio equipment telephones, etc. And they are applied widely, for example, in alarms, speakers, telephone ringers, receivers, transmitters, beep sounds, etc.

47

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 17 Types of Buzzers

3.7. EEPROM
EEPROM (also written E2PROM and pronounced e-e-prom or simply e-squared), which stands for Electrically Erasable Programmable Read-Only Memory, is a type of non-volatile memory used in computers and other electronic devices to store small amounts of data that must be saved when power is removed, e.g., calibration tables or device configuration.When larger amounts of more static data are to be stored (such as in USB flash drives) other memory types like flash memory are more economical. EEPROMs are realized as arrays of floating-gate transistors. 3.7.1. History In 1983, Greek American George Perlegos at Intel developed the Intel 2816, which was built on earlier EPROM technology, but used a thin gate oxide layer so that the chip could erase its own bits without requiring a UV source. Perlegos and others later left Intel to form Seeq Technology, which used on-device charge pumps to supply the high voltages necessary for programming EEPROMs. 3.7.2. Functions of EEPROM There are different types of electrical interfaces to EEPROM devices. Main categories of these interface types are:

Serial bus Parallel bus

Other operations supported by some EEPROM devices are:


Program Sector Erase

48

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Chip Erase commands

3.8. MAX-232 The MAX232 from Maxim was the first IC which in one package contains the necessary drivers and receivers, to adapt the RS-232 signal voltage levels to TTL logic. It became popular, because it just needs one voltage (+5V) and generates the necessary RS232 voltage levels (approx. -10V and +10V) internally. This greatly simplified the design of circuitry. Circuitry designers no longer need to design and build a power supply with three voltages (e.g. -12V, +5V, and +12V), but could just provide one +5V power supply, e.g. with the help of a simple 78x05 voltage converter. The MAX232 has a successor, the MAX232A. The ICs are almost identical, however, the MAX232A is much more often used (and easier to get) than the original MAX232, and the MAX232A only needs external capacitors 1/10th the capacity of what the original MAX232 needs. It should be noted that the MAX 232(A) is just a driver/receiver. It does not generate the necessary RS-232 sequence of marks and spaces with the right timing, it does not decode the RS-232 signal, it does not provide a serial/parallel conversion. All it does is to convert signal voltage levels. Generating serial data with the right timing and decoding serial data has to be done by additional circuitry, e.g. by a 16550 UART or one of these small micro controllers (e.g. Atmel AVR, Microchip PIC) getting more and more popular. The MAX232 and MAX232A were once rather expensive ICs, but today they are cheap. It has also helped that many companies now produce clones (ie. Sipex). These clones sometimes need different external circuitry, e.g. the capacities of the external capacitors vary. It is recommended to check the data sheet of the particular manufacturer of an IC instead of relying on Maxim's original data sheet.

3.9. Finger Print Scanner


A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching.

49

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.9.1. Features

On-line and off-line fingerprint identification incorporated Identification rate 1:1 and 1:N; FAR: 1/100.000 y FRR: 1/1.000 Algorithm and high hardness optical sensor It provides high recognition ratio even to small size, wet, dry, calloused fingerprint. Fast acquisition of difficult finger types under virtually any condition. Memory capacity for 100 fingerprints Memory events: up to 2,000 authentications Access host can be protected by fingerprint or password It offers convenient development environment. Two communication ports: RS-232 or host ( on-line applications ) ASCII protocol Supply voltage: 5V Small size and robust durability, it has longer life span.

3.10. Biometrics
3.10.1. What is Biometrics? The study of automated identification, by use of physical or behavioral traits.

50

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.10.2. Physical vs. Behavioral Physical Both Fingerprint Iris Ear Face Retina Hands Signature Walking gait Typing patterns

Behavioral

Voice
3.10.3. Why Biometrics? Authentication the process of verifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa. Conventional authentication methods something that you have key, magnetic card or smartcard something that you know PIN or password

Biometric authentication uses personal features something that you are

Advantages
Biometrics has no risk of Forgetting it Loosing it

51

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Getting it stolen Getting it copied Being used by anyone else.

Essential Properties of a Biometric Universal Everyone should have the characteristic Uniqueness No two persons have the same characteristic Permanence Characteristic should be unchangeable Collectability Characteristic must be measurable

3.10.4. Biometric System Process Flow

52

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Why Fingerprint biometry? Fig 18. Biometric System Process Flow High Universality A majority of the population (>96%) have legible fingerprints More than the number of people who possess passports, license and IDs

High Distinctiveness Even identical twins have different fingerprints (most biometrics fail) Individuality of fingerprints established through empirical evidence

High Permanence Fingerprints are formed in the fetal stage and remain structurally unchanged through out life.

High Performance One of the most accurate forms of biometrics available Best trade off between convenience and security

High Acceptability Fingerprint acquisition is non intrusive. Requires no training.

3.10.5. Advantages Uniqueness Surety over the Cards and Keypads

53

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Against to Cards Duplication, misplacement and improper disclosure of password No excuses for RF/Magnetic Cards forget ness No need to further invest on the Cards Cost No need to further manage the Cards Writing Devices

Fingerprint Patterns Loops Whorls Arches Ridge lines enter from one side of print and exit out the other 5% of population Rounded or circular ridge pattern 30-35% of population Ridge lines enter from one side and curve around to exit from the same side 60-65% of population

Fig 19. Finger print pattern

54

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Power Supply Overview of power supply operation

The basic design model for a power supply consists of a control element in series with a rectifier and load device. Figure 4.1 shows a simplified schematic of a seriesregulated supply with the phase-controlled pre-regulator depicted as a power switch and the series element depicted as a variable resistor. The phase-controlled pre-regulator minimizes the power dissipated at the series element by maintaining a low and constant voltage drop across the series element. Feedback control circuits continuously monitor the output and adjust the series resistance to maintain a constant output voltage. The variable resistance series element of the supply shown in Figure 4.1 is actually produced by one or more power transistor operating in the linear (class A) mode; supplies with this type of regulator are often called linear power supplies. Linear power supplies have many advantages. Because they provide sufficient power with stable regulation and little noise, they usually are the simplest, most effective solution for providing bench power.

Fig 20. Components Of Linear Power Supply

The power supply shown in Figure 3.1 has two ranges, allowing more voltage at a lower current or more current at a lower voltage. Single-range supplies can output maximum power only at full-scale voltages and full-scale current. A linear supply can

55

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

provide output power that is close to maximum at full scale for both ranges. The preregulator in this power supply uses solid-state transformer tap switches on the secondary winding of the power transformer. This technique is very effective in reducing the power dissipated in the series element. In terms of performance, a linear regulated supply has very precise regulating properties and responds quickly to variations of the line and load. Hence, its line and load regulation and transient recovery time are superior to supplies using other regulation techniques. A linear power supply also exhibits low ripple and noise, tolerates ambient temperature changes, and is highly reliable due to its circuit simplicity. The linear regulator is controlled by a DAC driven by a digital circuit that provides a voltage proportional to the program voltage. The power supply sends back to the control circuits a voltage representing the output at the terminals. The control circuits receive information from the front panel and send information to the display. Similarly, the control circuits talks to the remote interface for input and output with the GPIB, RS-232, USB, or LAN interfaces. The remote interface is at earth ground and is optically isolated from the control circuit and the power supply.

Block diagram of the power supply showing the optical isolation Output characteristics An ideal constant-voltage power supply would have zero output impedance at all frequencies. Thus, as shown in Figure 3.3, the voltage would remain perfectly constant in spite of any changes in output current demanded by the load.

56

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Ideal constant-voltage power supply

Output characteristics When the load RL is less than RC, the output current will dominate since the voltage will be less than the set voltage. The power supply is said to be in constant current mode. The load at point 2 has a relatively low resistance, the output voltage is less than the voltage setting, and the output current is at the current setting. The supply is in constant current mode and the voltage setting acts as a voltage limit. Unregulated state If the power supply should go into a mode of operation that is neither CV nor CC, the power supply is unregulated. In this mode the output is not predictable. The unregulated condition may be the result of the AC line voltage below the specifications. The unregulated condition may occur momentarily. For example, when the output is programmed for a large voltage step, the output capacitor or a large capacitive load will charge up at the current limit setting. During the ramp up of the output voltage the power supply will be in\ the unregulated mode. During the transition from CV to CC, as when the output is shorted, the unregulated state may occur briefly during the transition. Extending the voltage and current range A power supply may be able to provide voltages and current greater than its rated maximum outputs if the power-line voltage is at or above its nominal value. Operation can be extended typically up to 3% over the rated output without damage to the power supply, but performance cannot be guaranteed to meet specifications in this region. If the power-

57

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

line voltage is maintained in the upper end of the input voltage range, the power supply will probably operate within its specifications. A power supply is more likely to stay within specifications if only one of the voltage or current outputs is exceeded. Series connections If you need a higher voltage than you can get from a single supply, you can operate two or more power supplies in series up to the output isolation rating of any one supply. You can operate series-connected power supplies with one load across both power supplies or with a separate load for each power supply. A quality bench power supply has a reverse polarity diode connected across the output terminals so that if you operate it in series with other power supplies, damage will not occur if the load is shortcircuited or if one power supply is turned on separately from its series partners. Parallel connections If you have power supplies capable of CV/CC automatic crossover operation, you can connect two or more of them in parallel to obtain a total output current greater than that available from one power supply. The total output current is the sum of the output currents of the individual power supplies. You can set the output of each power supply separately. The output voltage controls of one power supply should be set to the desired output voltage; the other power supply should be set for a slightly higher output voltage. The supply with the higher output voltage setting will deliver its constant current output and drop its output voltage until it equals the output of the other supply, and the other supply will remain in constant voltage operation and only deliver that fraction of its rated output current that is necessary to fulfill the total load demand.

3.11. Transformer
A transformer is an electrical device which is used to convert electrical power from one Electrical circuit to another without change in frequency. Transformers convert AC electricity from one voltage to another with little loss of power. Transformers work only with AC and this is one of the reasons why mains electricity is AC. Step-up transformers increase in output voltage, step-down transformers decrease in output voltage. Most power supplies use a step-down transformer to reduce the dangerously high mains voltage to a safer low voltage. The input coil is called the

58

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

primary and the output coil is called the secondary. There is no electrical connection between the two coils; instead they are linked by an alternating magnetic field created in the soft-iron core of the transformer. The two lines in the middle of the circuit symbol represent the core. Transformers waste very little power so the power out is (almost) The equal to the power in. Note that as voltage is stepped down current is stepped up.

ratio of the number of turns on each coil, called the turns ratio, determines the ratio of the voltages. A step-down transformer has a large number of turns on its primary (input) coil which is connected to the high voltage mains supply, and a small number of turns on its secondary (output) coil to give a low output voltage.

Fig 21. An Electrical Transformer Turns ratio = Vp/ VS = Np/NS Power Out= Power In VS X IS=VP X IP Vp = primary (input) voltage Np = number of turns on primary coil Ip = primary (input) current 3.11.1. Rectifier A circuit which is used to convert a.c to dc is known as RECTIFIER. The process of conversion a.c to d.c is called rectification 3.11.2. Types of Rectifiers Half wave Rectifier Full wave rectifier

59

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

1. Centre tap full wave rectifier. 2. Bridge type full bridge rectifier.

3.11.3. Filter
A Filter is a device which removes the a.c component of rectifier output but allows
the d.c component to reach the load

3.11.4. Regulator
Voltage regulator ICs is available with fixed (typically 5, 12 and 15V) or variable output voltages. The maximum current they can pass also rates them. Negative voltage regulators are available, mainly for use in dual supplies. Most regulators include some automatic protection from excessive current ('overload protection') and overheating ('thermal protection'). Many of the fixed voltage regulator ICs have 3 leads and look like power transistors, such as the 7805 +5V 1A regulator shown on the right. The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the output pin.

60

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 22. A Three Terminal Voltage Regulator


3.11.5. 78XX The Bay Linear LM78XX is integrated linear positive regulator with three terminals. The LM78XX offer several fixed output voltages making them useful in wide range of applications. When used as a zener diode/resistor combination replacement, the LM78XX usually results in an effective output impedance improvement of two orders of magnitude, lower quiescent current. The LM78XX is available in the TO-252, TO-220 & TO-263packages,

Features
Output Current of 1.5A

Output Voltage Tolerance of 5% Internal thermal overload protection Internal Short-Circuit Limited No External Component Output Voltage 5.0V, 6V, 8V, 9V, 10V,12V, 15V, 18V, 24V Offer in plastic TO-252, TO-220 & TO-263 Direct Replacement for LM78XX

Linear Keypad
This section basically consists of a Linear Keypad. Basically a Keypad can be classified into 2 categories. One is Linear Keypad and the other is Matrix keypad.

a. Matrix Keypad. b. Linear Keypad. 1. Matrix Keypad: This Keypad got keys arranged in the form of Rows and Columns. That is why the name Matrix Keypad. According to this keypad, In order

61

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

to find the key being pressed the keypad need to be scanned by making rows as i/p and columns as output or vice versa. This Keypad is used in places where one needs to connect more no. of keys with less no. of data lines. 2. Linear Keypad: This Keypad got n no. of keys connected to n data lines of microcontroller. This Keypad is used in places where one needs to connect less no. of keys. Generally, in Linear Keypads one end of the switch is connected to Microcontroller (Configured as i/p) and other end of the switch is connected to the common ground. So whenever a key of Linear Keypad is pressed the logic on the microcontroller pin will go LOW.

Here in this project, a linear keypad is used with switches connected in a serial manner. Linear keypad is used in this project because it takes less no. of port pins.The Linear Keypad with 4 Keys is shown below.

62

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Fig 23. Linear key pad

3.12. Software Description


3.12.1. About Software

Software used: *Keil software for c programming 3.12.2. About Keil Software It is possible to create the source files in a text editor such as Notepad, run the Compiler on each C source file, specifying a list of controls, run the Assembler on each

63

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Assembler source file, specifying another list of controls, run either the Library Manager or Linker (again specifying a list of controls) and finally running the Object-HEX Converter to convert the Linker output file to an Intel Hex File. Once that has been completed the Hex File can be downloaded to the target hardware and debugged. Alternatively KEIL can be used to create source files; automatically compile, link and covert using options set with an easy to use user interface and finally simulate or perform debugging on the hardware with access to C variables and memory. Unless you have to use the tolls on the command line, the choice is clear. KEIL Greatly simplifies the process of creating and testing an embedded application. 3.12.3. Simulator/Debugger The simulator/ debugger in KEIL can perform a very detailed simulation of a micro controller along with external signals. It is possible to view the precise execution time of a single assembly instruction, or a single line of C code, all the way up to the entire application, simply by entering the crystal frequency. A window can be opened for each peripheral on the device, showing the state of the peripheral. This enables quick trouble shooting of mis-configured peripherals. Breakpoints may be set on either assembly instructions or lines of C code, and execution may be stepped through one instruction or C line at a time. The contents of all the memory areas may be viewed along with ability to find specific variables. In addition the registers may be viewed allowing a detailed view of what the microcontroller is doing at any point in time.

3.13. Arm Software


3.13.1. About Keil ARM

1. 2.

Click on the Keil u Vision3 Icon on Desktop The following fig will appear

64

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

3.Click on the Project menu from the title bar 4.Then Click on New Project

65

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

5.Save the Project by typing suitable project name with no extension in u r own folder sited in either C:\ or D:\

66

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

6.Then Click on Save button above. 7.Select the component for u r project. i.e.NXP 8.Click on the + Symbol beside of NXP

67

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

9.Select LPC2148 as shown below

68

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

10.Then Click on OK 11.The Following fig will appear

69

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

12.Then Click YES 13.Now your project is ready to USE 14.Now double click on the Target1, you would get another option Source group 1 as shown in next page.

70

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

15.Click on the file option from menu bar and select new

71

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

16.The next screen will be as shown in next page, and just maximize it by double clicking on its blue boarder. 17.Now start writing program in either in C or ASM 18.For a program written in Assembly, then save it with extension . asm and for C based program save it with extension .C

72

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

19.Now right click on Source group 1 and click on Add files to Group Source

73

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

20.Now you will get another window, on which by default C files will appear

74

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

21.Now select as per your file extension given while saving the file 22.Click only one time on option ADD 23.Now Press function key F7 to compile. Any error will appear if so happen.

75

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

24.If the file contains no error, then press Control+F5 simultaneously. 25.The new window is as follows

76

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

26.Then Click OK

27.Now Click on the Peripherals from menu bar, and check your required port as shown in fig below

77

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

29.Drag the port a side and click in the program file

78

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

29.Now keep Pressing function key F11 slowly and observe. 30.You are running your program successfully

79

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

CHAPTER 4 RESULTS
A fingerprint is made of a number of ridges and valleys on the surface of the finger. Ridges are the upper skin layer segments of the finger and valleys are the lower segments. The ridges form so-called minutia points: ridge endings (where a ridge end) and ridge bifurcations (where a ridge splits in two). Many types of minutiae exist, including dots (very small ridges), islands (ridges slightly longer than dots, occupying a middle space between two temporarily divergent ridges), ponds or lakes (empty spaces between two temporarily divergent ridges), spurs (a notch protruding from a ridge), bridges (small ridges joining two longer adjacent ridges), and crossovers (two ridges which cross each other). The uniqueness of a fingerprint can be determined by the pattern of ridges and furrows as well as the minutiae points. There are five basic fingerprint patterns: arch, tented arch, left loop, right loop and whorl. Loops make up 60% of all fingerprints, whorls account for 30%, and arches for 10%. Fingerprints are usually considered to be unique, with no two fingers having the exact same dermal ridge characteristics. How does fingerprint biometrics work The main technologies used to capture the fingerprint image with sufficient detail are optical, silicon, and ultrasound. There are two main algorithm families to recognize fingerprints:

Minutia matching compares specific details within the fingerprint ridges. At registration (also called enrollment), the minutia points are located, together with their relative positions to each other and their directions. At the matching stage, the fingerprint image is processed to extract its minutia points, which are then compared with the registered template.

Pattern matching compares the overall characteristics of the fingerprints, not only individual points. Fingerprint characteristics can include sub-areas of certain

80

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

interest including ridge thickness, curvature, or density. During enrollment, small sections of the fingerprint and their relative distances are extracted from the fingerprint. Areas of interest are the area around a minutia point, areas with low curvature radius, and areas with unusual combinations of ridges. Issues with fingerprint systems The tip of the finger is a small area from which to take measurements, and ridge patterns can be affected by cuts, dirt, or even wear and tear. Acquiring high-quality images of distinctive fingerprint ridges and minutiae is complicated task. People with no or few minutia points (surgeons as they often wash their hands with strong detergents, builders, people with special skin conditions) cannot enroll or use the system. The number of minutia points can be a limiting factor for security of the algorithm. Results can also be confused by false minutia points (areas of obfuscation that appear due to low-quality enrollment, imaging, or fingerprint ridge detail). There is some controversy over the uniqueness of fingerprints. The quality of partial prints is however the limiting factor. As the number of defining points of the fingerprint become smaller, the degree of certainty of identity declines. There have been a few well-documented cases of people being wrongly accused on the basis of partial fingerprints. Benefits of fingerprint biometric systems

Easy to use Cheap Small size Low power Non-intrusive Large database already available

81

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

Applications of fingerprint biometrics Fingerprint sensors are best for devices such as cell phones, USB flash drives, notebook computers and other applications where price, size, cost and low power are key requirements. Fingerprint biometric systems are also used for law enforcement, background searches to screen job applicants, healthcare and welfare. Because it is one of the cheapest biometric solutions, fingerprint recognition already knows many different applications. We only list a few examples here:

Logical access control, for example there exist numerous fingerprint reader devices and softwares for access control to personal computers Physical access control, for example locks with a fingerprint reader Time and attendance management Biometric alternative to loyalty card systems

Suitability of fingerprint recognition How suitable is fingerprint recognition as a biometric solution? We use the following 7 criteria to evaluate the suitability of fingerprint recognition: Universality Only very few people miss all 10 fingers. Most fingerprint recognition software allows to enroll multiple fingers which avoids that an individual is no longer granted access after injury. Uniqueness It is generally accepted that fingerprints are unique to an individual. However, there is a risk that fingerprints of two different individuals match if the fingerprint image is of

82

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

insufficient quality. Therefore the False Acceptance Rate (FAR) is highly dependent on the quality of the fingerprint reader. Permanence Fingerprints do not change with ageing, but as people age they lose collagen which makes their fingerprint harder to read and this can lead to significantly more false rejects with elderly people. Injuries, such as fire wounds, can damage a fingerprint but if multiple fingers are enrolled the likelihood of an authorized individual being denied access is reduced. Collectability Fingerprints are easy to acquisition, the cheapest fingerprint readers available use a digital camera. Fingerprint readers that are more difficult to fool, such as CMOS readers, are even not overly expensive. In some environments, where for example people are unable to wash their hands, more expensive means might be necessary to acquire a useable fingerprint im age. Acceptability Fingerprints are easily accepted as soon as people reflect that they leave their fingerprints everywhere and that no sensitive information, such as medical conditions, can be derived from fingerprints. Performance In terms of speed, accuracy and robustness the devices actually on the market should cover any need, except maybe for big corporations and government applications where matching algorithms might become a bottleneck.

83

ATM TERMINAL DESIGN BASED ON FINGER PRINT RECOGNITION

CONCLUSION
The project ATM TERMINAL DESIGN IS BASED ON FINGERPRINT RECOGNITION has been successfully designed and tested. Integrating features of all the hardware components used have developed it. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit. Secondly, using highly advanced ICs and with the help of growing technology the project has been successfully implemented.

84

Das könnte Ihnen auch gefallen