Beruflich Dokumente
Kultur Dokumente
Abstract: First and foremost thing required for mankind security is yet not been discovered.
is a security system, playing a key role in many places
like offices, institutions, libraries, laboratories, etc. in I. Manual Lock and Key
convenience to keep our data confidential so that no other
unauthorized person could have an access to them. One The most preferable first step towards Lock and Key
level of ensuring authentication of a vehicle through a system. Security protocol followed in this system such
biometric sensor, the mainstream of the project is that a key opens up just one lock. Initially, this system
EMBEDDED SYSTEM and BIOMETRIC. Unauthorized was considered utmost security. As per now multiple
access is prohibited by designing a lock that stores the keys can be made duplicating the actual one for any
fingerprints of one or more authorized users as per individual lock system. Hence manual locking is known
requirement. The fingerprint is sensed by sensor and is to be out dated.
validated for authentication. If the fingerprint matches,
the door will be opened automatically, otherwise the II. Pin Verification
buzzer connected to an audio amplifier will be activated
so that the people near surroundings will get an alert. The At times if now being used security system is the
use of GSM MODULE helps the user identify the password, type system, where an authorized person
activity through text message, notifying the user. would know the access key for the system. But for a car
access the main problem that are being faces are, chances
Keywords: Biometric, Fingerprint, Alarm, Security, where a third party can look into the access key when it’s
GSM module. been entered. This system also has a pitfall that password
can be acquired by unauthorized user by continuously
1. Introduction trying all the possible combinations. This is also one
among the hundred of the attempts made for providing
Looking into the competitive world human would security.
gradually implement ideas and try to provide security to
his belongings manually. Instead, suggesting alternative, III. Future Technologies
ideas, providing security as well as though to move
through. In this fast growing society, it’s tough to move In upcoming future intruder alert system are introduced
through if loosing belongings, in particular a key of a such that, near neighbours can be alerted when break
four wheeler, Things get complicated and it’s also tough through, with the help of vibration sensed by sensors
to move through losing a vehicle key for a business which would bring out alarm too near surroundings.
classed person having a meeting to be attended in
particular day. Looking through the existing features is
3. Proposed Methods
still under risk at which one can handle a situation, either
it could be a PIN type, security, or a REMOTE
In biometric technology automated access monitoring
controlled, these technologies are easily hackable and can
system is designed for behavioral and physiological
be bullied in seconds.
characteristics, for authentication. Based on many version
biometric security system are designed. It’s to be
2. Sketch Background
designed such that they are user friendly and very much
reliable and convenient for identification and monitoring.
According to which several attempts are made in order to In vehicle security system, the objective is to prevent the
provide security for all domains. Till date complete theft of the vehicle and ensure safe driving. One level of
365
International Journal of Pure and Applied Mathematics Special Issue
366
International Journal of Pure and Applied Mathematics Special Issue
initialized and recognized print helps unlocking the 3. Highly accurate in terms of security of the vehicle.
vehicle. 4. Manual error is not possible while the use of
Step 6: Else if the unauthorized print is being identified fingerprint module.
the AUDIO AMPLIFIER is initialized such that the 5. Intrusions with false imprint is strictly not
buzzer is triggered, setting an alert to the surrounding possible in this case.
community in order to notify the activity.
Step 7: Also the user and two other numbers will get References
notification via SMS as the use of GSM MODULE
SIM800C, as the number is preloaded into the module. [1] Signals, Systems and Computers, 2004 Conference
Step8: Initialized print gets an access to unlock the car Record of the Thirty-Eighth Asilomar Conference on
and can drive away. In this only 3 can be initialized. Publication 7-Nov-2004 Volume: 1, on page (s): 577-581
Step 9: The process is done and door in unlocked. Vol.1.
The overall expectation of this project is all that the [5] T. Padmapriya and V. Saminadan, “Priority based
safety and assured security is being obtained. The fair resource allocation and Admission Control
initialized setup of this model mentions the precise need Technique for Multi-user Multi-class downlink Traffic
of advancement is the safety and security of the vehicle. in LTE-Advanced Networks”, International Journal of
Fig.3, Tact switch that is present helps the user to Advanced Research, vol.5, no.1, pp.1633-1641, January
initialize the biometric fingerprint into the microchip as 2017.
the user's finger is being observed by the detector.
Which would also acknowledge the request in the form
of SMS as ACCESS GRANTED. In upcoming times
only the respective print is read as a result, the motor
being on the other end runs in order to represent the
unlocking system of the door.
Followed with an SMS that could notify the respective
person with alert message reading, vehicle being
unlocked. On the other side is the unauthorized
fingerprint that is being used, false print is unacceptable
such that the user or the person authorized by the vehicle
gets alert with a text message notifying the trespassing.
Also the buzzer reminds the people in surrounding
regarding a theft alert or misuse.
367
368