You are on page 1of 107

Fingerprint Login System with SMS

Module and Automated Door Lock for


Mapua Institute of Technology

by

Jomari Jay O. Mariano


Jigxy Jones S. San Pedro
Justin Dane M. Sinnung
Frank Adrian F. Zaragoza

A Design Report Submitted to the School of Electrical Engineering,


Electronics Engineering, and Computer Engineering in Partial
Fulfilment of the Requirements for the Degree

Bachelor of Science in Computer Engineering

Mapua Institute of Technology


March 2012
ii
Acknowledgement

We thank the Lord Almighty for giving us strength and directing our
path to the following persons who have been instrumental in the completion of
our design.

We would like to extend our appreciation to our professor, Lilibeth D.


Mendoza for sharing her knowledge, and every piece of advice for us to be
successful in our design.

A special thanks to our adviser, Engr. Dionis Padilla for guidance and
patience throughout the course of this project by giving us some ideas on what
we need to accomplish and consulting on some parts of the design that we need
to know to make the process of designing and creating the prototype much
easier and less complicated if possible.

For our distinguish panel for the defense Engr. Joshua B. Cuesta, Engr.
Ayra G . Panganiban and Engr. Analyn N. Yumang for allotting time for us in
spite of their hectic schedule. We stretch our outmost respect and gratitude.

To our parents and friends for supporting us in every way that they could;
wededicatethis for you.

To our members, thanks for the camaraderie, unity and cooperation.The


experience and the knowledge that was incorporated to us by our school Mapua
Institute of Technology shaped us to become better person for our future
journeys to success.

Jomari Jay O. Mariano


Jigxy Jones S. San Pedro
Justin Dane M. Sinnung
Frank Adrian F. Zaragoza

iii
Table of Contents

TITLE PAGE i
APPROVAL SHEET ii
ACKNOWLEDGEMENT iii
TABLE OF CONTENTS iv
LIST OF TABLES vi
LIST OF FIGURES vii
ABSTRACT x

Chapter 1: Design Background and Introduction 1

Background 1
Customer 2
Needs 3
Solution 4
Objective 5
Impact 5
Constraints 6
Differentiation 7
Benefits 8
Definition of Terms 9

Chapter 2: REVIEW OF RELATED DESIGN 11


LITERATURE AND STUDIES

Chapter 3: DESIGN PROCEDURES 18

Hardware Development 18
Block Diagram 18
Schematic Diagram 20
MCU FlowChart 23
Biometric Fingerprint Reader 25
GSM Module 25
Software Development 26
Activity Diagram 26

Chapter 4: Testing, Presentation and Interpretation of Data 31

Thumb Condition Accuracy Test 31

iv
Chapter 5: Conclusion and Recommendation 39

Conclusion 39
Recommendation 40

References 41

Appendix: 42

Appendix A: Operations Manual 42


Appendix B: Pictures of Prototype 63
Appendix C: Program Listing 68
Appendix D: Datasheets 69

v
List of Tables

Table 4.1 Rough Thumb Condition Accuracy Test 32


Table 4.2 Smooth Thumb Condition Accuracy Test 33
Table 4.3 Deformed Fingerprint Accuracy Test 34
Figure B.7 Bill of Materials 66

vi
List of Figures

Figure 3.1 Block Diagram 18


Figure 3.2 Schematic Relay Driver for Doorlock 20
Figure 3.3 Schematic UART Converter 21
Figure 3.4 Schematic MCU with Power Supply 22
Figure 3.5 MCU Flowchart 23
Figure 3.6 In/Out Display Activity Diagram 26
Figure 3.7 Enroll Fingerprint and Delete 27
Fingerprint Activity Diagram
Figure 3.8 View Student Records, 28
View Guardian Records and
Guardian Registration Activity Diagram
Figure 3.9 Start Send and Stop Send Activity Diagram 29
Figure 3.10 Attendance Logs and Send 30
Notifications Activity Diagram
Figure A.1 Control Panel Interface 43
Figure. A.2 Enroll Fingerprint Interface Form 44
Figure A.3 Enroll Fingerprint Interface Enrollment 45
Successful
Figure A.4 Enroll Fingerprint Interface Error No Name 45

Figure A.5 Enroll Fingerprint Interface Error No 46


Student Number
Figure A.6 Enroll Fingerprint Interface Error Wrong 46
Student Number
Figure A.7 Enroll Fingerprint Interface Error Student 47

vii
Number Exists
Figure A.8 Enroll Fingerprint Interface Error Enrollment 47
Failed
Figure A.9 Enroll Fingerprint Interface Error Fingerprint 48
Already Enrolled
Figure A.10 Delete Fingerprint Interface Form 48
Figure A.11 Delete Fingerprint Interface Form Confirm 49
Delete
Figure A.12 Delete Fingerprint Interface Deletion Cancelled 50
Figure A.13 Delete Fingerprint Interface Deletion Complete 50
Figure A.14 View Student Records Interface 51
Figure A.15 Guardian Registration Interface Error No 52
Name
Figure A.16 Guardian Registration Interface Error No 53
Mobile Number
Figure A.17 Guardian Registration Interface Error Wrong 53
Mobile Number
Figure A.18 Guardian Registration Interface Error No 54
Student Number
Figure A.19 Guardian Registration Interface Error Wrong 54
Student Number
Figure A.20 Guardian Registration Interface Error Student 55
Number Already Have a Guardian
Figure A.21 Guardian Registration Interface Registration 55
Successful
Figure A.22 View Guardian Records Interface 56
Figure A.23 IN/OUT Display Not Recognized 57
Figure A.24 IN/OUT Display User Login 58
Figure A.25 IN/OUT Maintenance 59
Figure A.26 Attendance Logs Interface 60

viii
Figure A.27 SMS Notification Interface 60
Figure A.28 SMS Maintenance Interface 61
Figure A.29 Error RS232 Cable Missing 61
Figure B.1 Fingerprint Reader Closed Casing 63
Figure B.2 Inside Circuits of the Prototype 63
Figure B.3 MCU of the Design 64
Figure B.4 Minidoor 64
Figure B.5 Automated Doorlock and Blocking Sensor 65
Figure B.6 Sample Program and Broadband for SMS 65

ix
ABSTRACT

The Development of Information Technology (DOIT) of Mapua Institute of


Technology (MIT) always aims for the next step in technology for the benefit of
the campus. Innovative login system is one of the targets of the department.
This design aims to create an improved login system for Mapua by replacing the
RF ID System with a Fingerprint Scanner. Also, the design adds the automated
doorlock and the SMS capability activated by the fingerprint. Changing the login
requirement from the card to the fingerprint as well as the added automated
doorlock and SMS will give more security for the whole campus.

Keywords: RF ID, Biometric System, Fingerprint Scanner, SMS

x
Chapter 1

Design Background and Introduction

The Mapua Institute of Technology (MIT) is a renowned school for

engineering courses located at Muralla Street, Intramuros, Manila. It is the

biggest school of engineering in the Philippines, not only because it has a lot of

enrolled students but also because it offers courses that are accredited by the

Philippine Association of Colleges and Universities Commision on Accreditation

(PACUCOA). But not only locally is MIT renowned but internationally as well for

having courses recognized by the Accreditation Board for Engineering and

Technology (ABET), thus making MIT a very renowned and reliable school for

engineering.

The Development of Information Technology (DOIT) Department of the

MIT is responsible for technology innovation in the school premises. Currently,

the log in system of the campus is done through an RF ID system and a

magnetic card reader. The entrance of the school must be manned by a security

guard who is always actively looking at the login monitor, as unregistered or

blocked IDs of students identified by the monitor must be seen by the guards

first before they can block anyone unauthorized trying to go in.

1
The department wants to take a step further with the log in system of the

school which is currently done by the RF ID system. This innovation will cope

with the growing number of students as well as provide for the security of the

whole campus.

Customer

The customer for this design is the DOIT department of Mapua Institute

of Technology Intramuros, Manila which is headed by Engr. Danillo Tiongco, the

Senior Deputy for ICT I/O. It is located on the 4th Floor, Administration Building

of Mapa Institute of Technology, Muralla Street, Intramuros, Manila Philippines.

The DOIT department offers support for the campus for operations such as

Intranet, monitoring of LAN, laboratory room reservation, on-line requests for

software installation, available software, downloads, policies and procedure

documents (PAPD), GLIMPSE, E-learning, ID printing status, network operations

manual, and IT standard procedure manuals. They have also provided MIT with

services such as the access points or hotspots for Wi-Fi, Cardinal Plus cards,

Smart identification, tech info kiosk, and much more.

2
Needs

The DOIT department has been working to enable Mapua to keep up with

technology, developing software and applied hardware that will help the school

give quality service to the students as well as for the students parents or

guardians. It has been thinking of ways to improve such facilities as the log-in

system of the school.

The department wants to try improve the log in system of Mapua to give

better security and reliability for the whole campus.

The login system of the school is currently done through an RF ID system

but it cannot be solely relied upon for guards are still needed to attend the

entrance looking through everyone trying to log in. Another factor that makes it

hard for the guards is that the school does not require the students to wear

uniforms. In this type of system there will be some instances that, due to fast

queuing, some may slip past the guard unnoticed even if they have not tapped

their ID, or if they do not have their ID with them, or even if they are using

somebody elses ID. The department is looking at addressing the security lapses

of the login system by implementing a system that will give better user

verification.

It is also planning to involve the guardians by keeping them informed of

their wards whereabouts, at least as far as having reached the Mapua campus is

concerned.

3
Solution

The idea is to enhance the log in system of the school using a biometric

system and use a GSM module to send messages of the individuals to their

respective parents or guardians and add an automated door lock to separate the

enrolled students from those who are only visitors or outsiders. The integration

of the login system aims to create an alternative system for the campus which

will give better security and will greatly improve the speed of authorization, thus

avoiding long queues.

The standard login system uses verification to detect who the user is; in

verification the user will tell the system who they are and the system will verify if

they truly are who they claim to be, but in a biometric system such as the

fingerprint scanner the login system will be turned to an identification system in

which the system will tell who the user is when the user presents a unique

physical identity such as the fingerprint which one and only one user has. With

this innovation the login system will be more reliable and the work load will be

lessened for the manning guards, since the user identification will be done by the

system, and identification errors will be eliminated.

Using a GSM module, SMS messages can be sent to the registered mobile

phone numbers registered for each student; this will allow their guardians to

know if the students have reached the campus premises. For added security, an

automated doorlock system can be added to prevent any forced entrance and to

filter those enrolled from those who are not.

4
Objective

The design aims to combine a fingerprint scanner with a GSM Module and

an automated door lock to create an alternative log in system for the campus.

to create a system with better security by implementing an

identification system and an automated door lock for the

entrance.

to notify the guardians of their students arrival at the campus.

to minimize the delay of processing speed even with heightened

security.

Impact

In terms of the impact of the design on safety and security, this design

will allow the parents or guardians to know if their children have reached the

school premises. In terms of security for the school, the biometric scanner will

allow one person and one person alone to access his or her own database using

their fingerprint, unlike with using the old ID system, lost IDs could be used to

tap in to the machine even by those who do not own it; also with the

implementation of the door lock, only students can pass through the entrance

door while the visitors will take another route to the guard house, making it safer

for the students inside the campus by preventing strangers from entering easily

the school premises without the guards knowing it. In terms of sustainability, the

5
biometric log-in system with GSM is fairly easy to maintain; aside from

maintaining the load for the GSM to send SMS, it will be easy to use.

Constraints

The constraints of the design is that the students who would only log in

with their fingerprints and would not go inside the campus will not be detected

by the system, which means that a student can log in and leave after fingerprint

reading, which will still send an SMS message to their guardians stating that they

have arrived at the campus vicinity but will not send information if they really

went in or not.

As well as with the automated door lock, the trigger will only activate the

lock if the door shuts from open to closed which means that if the door does not

close at all before the second user enters, the door will only count the two users

as one user and will not lock.

The design will not remove the guards from their work; the intention of

the design is to give greater role to the system and make it more reliable by

shifting the login system to identification. This will make the design do the work

of identifying the people entering the campus while the guards will monitor the

device.

6
As to the economics, this design will be costly to implement, but on the

long term this will be more cost effective as additional students would not

require any additional login equipment such as the RF ID cards, thus minimizing

costs.

Differentiation

The technology used by most schools and universities for identification is

RF ID. This kind of technology is already old fashioned and some researchers

have proven that RFID tags are relatively easy to exploit in a number of cases.

The proposed solution of the designers is to implement a system that will use

biometrics to identify individuals. Using fingerprints as a means of identification

adds more security features as compared to the use of radiofrequencies. Also the

cost of producing RFID tags is still very expensive, whereas in biometrics only

ones fingers are needed for identification.

As an added feature SMS notification will be incorporated into the login

system. This will assure the guardian/s of the students that they have arrived at

the school premises. The hardware to be used in implementing the notification is

a GSM module. This technology will give real-time information whenever it is

needed. The use of the GSM system is selected as the communication medium

because it can serve many users at the same time without the need to add

another set of this equipment.

7
The automated gate is an added security feature before one can enter the

institution. It will be custom made by the designers in accordance in the needs of

the customer. The gates will be installed for registered persons and will not open

for visitors or unregistered entrants. Doors will be attached to a motor that is

controlled by a microcontroller interfaced to a computer where the fingerprint

reader is also connected.

Benefits

This design will benefit both the institution and the guardians of the

students.

The institution will benefit from such a design, for this will give better

security to the school and its students. This will also improve the quality level of

the school for having advanced technology in its login system.

The students guardians will also benefit from the SMS capability of the

design, as this will give them the assurance that their children or wards have

reached the school premises.

8
Definition of Terms

1. Biometric system - advanced methods to induce systematization and

security using biometrics at various places like business organizations,

buildings demanding sophisticated protection and even residential areas.

Utilizing specific attributes, these systems can help maintain the much-

deserved security level.

2. Fingerprint scanner a biometric device used to scan and convert

fingerprint images to digital data for manipulation.

3. GSM - Global System for Mobile communication is a digital telephony

system that digitizes and compresses data, then sends it down a channel

with two other streams of user data, each in its own time slot. It operates

at either the 900 MHz or 1800 MHz frequency.

4. SMS - Short Message Service is a text messaging service component of

phone, web, or mobile communication systems, using standardized

communications protocols that allow the exchange of short text messages

between fixed line or mobile phone devices.

9
5. Database an organized collection of data for one or more purposes,

usually in digital form. The data are typically organized to model relevant

aspects of reality, in a way that supports processes requiring this

information.

6. SIM - subscriber identity module or subscriber identification module is

an integrated circuit that securely stores the International Mobile

Subscriber Identity (IMSI) and the related key used to identify and

authenticate subscribers on mobile telephony devices (such as mobile

phones and computers).

10
Chapter 2

Review of Related Design Literature and Studies

This chapter shows the review of related research for the development of

the design. The following articles helped the group to further understand the

project.

Biometric systems such as fingerprint scanners are widely used to make

more secure login systems. Other security systems such as the RF ID are

verification type systems wherein the user will have to verify his/her identity by

tapping the card on the reader, regardless of who really owns the tapped card.

Fingerprint scanners are an identification type system which uses the fingerprint

as a specific authenticator to identify the user from the database stored in the

system; this makes biometric systems much more reliable and secure compared

to the RF ID system.

A Door-Opening System Using a Low-Cost Fingerprint Scanner and a PC

A related article from A&E Systems Magazine (August, 2004) shows how

to create a low cost security system with a fingerprint scanner and a PC that can

emulate a standalone security fingerprint embedded device. This design was

created to help improve schools security in their laboratories. It was designed to

11
allow students to enter the premises of a laboratory at the time they need and

prevent them from entering outside their laboratory hours. The article concluded

that creating a biometric doorlock system could be a cost saver instead of being

an additional cost for the school. The idea of having digital keys for anyone or

everyone rather than distributing physical keys could be more cost efficient,

aside from the security that it gives as physical keys could be stolen or passed on

without knowledge of the authenticators. Moreover, staff members dont need to

often inspect the laboratories to secure them knowing that fingerprint security is

reliable. Another use is that the fingerprint security system creates a list of who

used the facility at any time of the day unlike using the attendance sheet where

one could fake a name or not sign up and therefore would not be responsible for

any misuse of the facility, if any. This will ensure that anyone who uses the

facilities will be careful for they are accountable for. In general biometrics can

offer improved security for access control, and biometric devices can be adapted

to any special requirements and some criterion is needed to choose the best

solution. This article guided the group on how to make the design as well as the

materials that are intended to be used for the project and opinions on how to

perform and specifications of the design.

12
On the Operational Quality of Fingerprint Scanners, Authentication of

Fingerprint Scanners, and Estimating Image Focusing in Fingerprint

Scanners

Also, Cappelli et al. (2008), Ivanov and Baras (2011), and Ferrara et al.

(2007) show that fingerprint scanners are not 100% accurate. There are some

cases and certain factors that should be taken into consideration when using the

scanner. These articles showed the test results and adjustments needed for a

better and more reliable finger print scanner such as creating better image

focusing for the scanner when it converts the detected fingerprint to its digital

form and increasing the frequency of the scanner that depends from finger to

finger.

Doorlock Security with GSM Alert Messaging

Martinez, et al., (date) was also used as a reference to use the GSM

module in part of the proposed system, as well as the use of a sensor with the

doorlock. Their design involves a passive sensor that will trigger the GSM when

activated and the active sensor at the door to lock once the alarm is triggered.

This article was been useful in understanding how to implement the GSM on the

proposed design as well as the use of sensors for the door lock.

13
Subscriber Identity Module (SIM)

The Subscriber Identity Module (SIM) is a small smart card which contains

both programming and information. The SIM card provides the identity for a

subscriber. During initial registration all the relevant subscriber data are inserted

into the SIM card and this activity is known as personalization. A mobile phone

cannot make or receive any calls except emergency calls without a SIM. Each

SIM card is registered in a particular GSM network (HPLMN), and can be

recognized by another network only if the versions HPLMNs have an agreement

between themselves to support the subscriber, i.e., the subscriber has a roaming

facility. One of the advantages of the GSM architecture is that the SIM may be

moved from one mobile station to another. This makes upgrades very simple for

the GSM telephone user. The SIM contains the information personalized by the

user and most importantly the number that identifies the SIM card which makes

it distinctive from other SIM cards. The SIM card allows a mobile handset or any

GSM module to connect to a BTS and communicate by addressing the recipients

SIM card.

14
Active Infrared Motion Detector

In the active system each sensor consists of two housings. One housing contains

an infrared-emitting diode and an infrared-sensitive phototransistor. The other

housing contains an infrared reflector. When positioned in front of an entrance to

a protected area, the two housings establish an invisible beam. A person

entering the area interrupts the beam causing an alarm to be triggered. An

active motion detector is much more reliable than a passive one, but it requires

careful alignment when it is installed. The detector can be falsel y triggered if one

of the housings moves slightly and causes a discontinuous beam.

The project, an ambient-light infrared active motion detector, consists of

two parts: the infrared transmitter housing and the infrared receiver housing. For

the infrared transmitter the design of the motion detector is said to be active. An

active infrared motion detector, as described on the project documentation,

transmits an infrared beam and is received continuously. If transmission of

infrared beam has been interfered with, it will trigger alarms preconfigured on

the receiver side. The projects infrared transmitter uses an asynchronous 555

timer as the oscillator and an infrared LED for the transmission of infrared beam

while the receiver uses an infrared phototransistor and an NPN transistor used as

the switch for the output signaling any security devices or any alarms.

15
How Fingerprint Scanners Work

Fingerprint scanners have many functions such as the registration,

verification, and deletion of fingerprint data. Operations start with the

registration of the data needed to be stored; to enrol, the user must place his

thumb at the scanner three times (once after a few seconds delay) and have a

specific fingerprint number incorporated with the digital image to be stored. This

assigned fingerprint scanner will be used to link the fingerprint with the pool of

data from the database upon compilation. After registration is done, the

verification function can be used. Verification mode will allow the fingerprint

scanner to compare the currently scanned fingerprint image to its database of

digital fingerprint images. If it finds a match, it will return a value equal to the

assigned fingerprint number, else it will return a value of 0. The deletion function

will delete stored fingerprint values and images from the memory of the

fingerprint scanner, to delete the data stored it requires either the actual

fingerprint image to delete or the fingerprint number assigned.

There are limitations of a fingerprint scanner, namely, one and only one

data of the same fingerprint image can be saved by a person because no two

persons can have the same fingerprint, which makes it unique. This results in

failure of enrolment if a person tries to enrol after already being enrolled. Also

fingerprint image comparison cannot be 100% efficient due to some factors such

16
as very dry skin, finger position, unwanted particles on the finger, scars or any

form of fingerprint deformation, and any factor that will alter image capturing by

the fingerprint scanner. This will result in the fingerprint being unidentified even

though it has been enrolled; in which case one should simply try again and make

sure that the factors mentioned are observed.

17
Chapter 3

Design Procedures

This chapter gives a detailed description of how the group started out and

finished the design. This chapter also includes the block diagram, schematic

diagram and the flow chart for the project.

Hardware Development

Figure 3.1
Block Diagram

18
Figure 3.1 shows the block diagram of the design. Starting at the

fingerprint scanner, the system sends the data taken from the user who logs in

using their fingerprint. That data is sent to the MCU for processing that person

trying to log in. This data will be compared to the registered fingerprints that

were stored during registration from the database of the PC connected to the

MAX232. After the PC has done sending the data to the MCU, the MCU will

compare data from the user to the database; if matched the MCU will trigger the

motor to open the lock and send the database match to the PC displaying the

users info and sending an SMS to the number of the registered guardian of the

user, if any; if not the door will not unlock and will prompt that the user is

unregistered. The door will only lock once it is opened then closed, blocking the

sensor at the door; once the sensor is blocked, the MCU will trigger the motor to

lock the door. At some instances that there will be several entrants at a given

time; each user who logged in will be counted and the door must be opened and

closed equal to the number of users logging in before the MCU triggers the

motor to lock.

19
Schematic Diagram

VDC

D1
LED

R1 VDC
1K

VCC GND(VDC)

K1
R3 1k RELAY-SPDT
Q1
2n2222 J2
2
1 DC MOTOR
CON2

J1
2
1 VCC J3
VCC 2
1 CONTROLLER SUPPLY
CON2
CON2
GND(VDC)
D2
LED
J4
VDC 2
1 DC MOTOR SUPPLY
R2 CON2
1K
GND(VDC)
VDC

VCC GND(VDC)
K2
R4 1K
Q2 RELAY-SPDT
2n2222

Figure 3.2
Relay Driver for Door Lock

Figure 3.2 shows the schematic diagram for the door lock. The diagram

shows that there are two paths where the signal or current will flow, depending

on what activates the port 1 or 2 from J1. The flow of current will trigger either

the upper or lower relay that will continue up to the motor, the activating relay

will justify whether the motor will spin clockwise or counter clockwise to open or

close the door lock.

20
C6 104 VCC

U4
1 16

C5 104
2 15

3 14

4 13

5 12

C4 104 6 11

7 10
TX R2 1K
1
RX 2
C3 104 8 9
3
R1 1K CON3
J232 MAX232

C2 10uf

1
U2 LM7805CT 3
Vin +5V VCC
5 D1 1n4001
4 9

3 8
D2 1n4001 GND
C1 10uf
7 2
2
6
1

1
DB9 2
CON2

Figure 3.3
UART Converter

Figure 3.3 shows how the data processed from the MCU will be

transferred to the PC via a USB to the RS232.This would be connected to the PC

COM port using a serial cable. If the laptop does not have a COM port, a USB to

RS-232 cable may be used to connect it to an available USB port. The PL2303

driver must be installed along with the touch screen calibration program.

21
VDD
UI
Y1 18.432 Mhz 25 7 PA0
R3 220 Vref PA0 1
16 6 PA1
AVDD PA1 2
26 5 PA2
AVSS PA2
4
3
R2 100K 15
PA3
38
4
PARX
14
Xin PA4
37
5
Xout PA5
PATX
J5 PA6
36 PA6 CON5
1 DBGPIN 35 PA7
C4 18pf C5 18pf 29
PA7
17
2 1 DBG PB0 1
18
CON2 2 PB1 2
24
3 PB2 3
23
4 R31 10K PB3 4
9 19
RST PB4 5
4PINS PB5
20
6
21
PB6
22
7
VDD 13
PB7
27
8
12
PD0 PC0
28
1 CON8
VCMU U2 7805 U5 LM317T 2
PD1 PC1
8
2
1
Vin +Vout
3 3
Vin +Vout
2 PD3 PC2
33
3
1
PC3
39
4
PD4 PC4 5
PD5 40 3
PD5 PC5 6
34 30
PD6 PC6 7
GND C1 0.1uf ADJ
R4 220 C2 1000uf C3 0.1uf
2 1 CON7
Z8F1601

R32 330

J4
J1 C8 C9 1
1 2
2 3
4
CON2 5
6

C6 2200uf C7 440uf CON6


C10 C11
R19 1K R9 1K R8 1K R7 1K

PARX PA6
PATX

Figure 3.4
MCU with Power Supply

Figure 3.4 shows the microcontroller (MCU) port assignments and the

power supply. The MCU used by the designer is Zilog Z8F1601 which is powered

by a DC power supply attached to it. The power supplies 12V, 5V, and 3.3V for

all the module devices. The desktop application sends commands to the MCU

and processes them. Modules like the relay driver for door lock and fingerprint

reader are connected to the MCU. The UART converter is also connected to the

MCU to be able to interface with the computer.

22
START

MCU Flowchart

INTIALIAZE
UART;
INITIALIZE
FINGERPRINT
READER;

m = FETCHUART();
loc = FP_VERIFY();

If m =
Yes ENROLL FP; A
ENROLL

No

If m =
Yes DELETE FP; A
DELETE

No

No OPEN DOOR;

If m = OPEN Yes INITIALIZE DOOR A


SENSOR (CLOSE
DOOR);

No

If
loc is not Yes SENDUART(loc); A
empty

Figure 3.5

MCU Flowchart

23
The MCU flowchart describes how it interacts with different devices like

the fingerprint reader, passive sensor, and relay driver for the door lock. For this

development a microcontroller unit (MCU) ZILOG Z8F4821 was used. Coding for

the implementation was made in Zilog Developer Studio II, a software

development kit (SDK) that uses C programming language. After gathering all

resources for making the prototype the designers programmed all the necessary

commands to interact with these devices. The basic commands are Verify

Fingerprint, Enroll Fingerprint, Delete Fingerprint, Open/Close Door. UART

transmission is also required for developing the MCU for communicating between

the MCU and the personal computer (PC) and it is made possible through using

MAX232. On creating the code for MCU it first initialized the UART transmission

and fingerprint reader (FR). Upon initializing the UART and FR it simultaneously

fetched the command from the PC and verifes the fingerprint. If the fetch

command is ENROLL it will enroll the fingerprint placed on the FR; if the

command is DELETE it will delete the fingerprint placed on the FR; if the

command is OPEN the door will open and the sensor will count the number of

correct verified fingerprints; this will also trigger to close the door; and if no

command is fetch and the content of verify fingerprint reader is not empty UART

will send the data from the PC. It will again process the fetching of command

and verifying of fingerprint after the command and operation are made.

24
BIOMETRIC FINGERPRINT READER

The biometric fingerprint reader used by the designer is a development kit

module with a digital signal processing (DSP) controller, Texas TMS320VC5416,

for faster image acquisition. The DSP also makes for easy integration with Zilog

Z8F1601. A logic level-UART Serial (TTL) is the I/O communication for the

microcontroller. Rate of detection is less than 1 second with a 0.00001%

false/failed recognition.

GSM MODULE

The Global System for Mobile Communication (GSM) module was a

HUAWEI E220 which is a HSDPA access device modem. The module used a USB

interface (USB modem) which was remotely attached to a different personal

computer (PC) that will process the SMS notification. Universal Mobile

Telecommunications System (UMTS) is the mobile cellular technology for a

network based on the GSM Standard. With this set of standards an original

design was developed for the modem and utilizing it for sending SMS.

25
Software Development

This section explains the development of the desktop application that was

used for the whole system. Visual Basic 6.0 was used for the front end while SQL

Server 2008 was used for the back end.

Activity Diagram

This shows the graphical representation of the Use Case or the

work flow of the system. It shows the control flow of the system starting

from the initial state, then the action with support for choice and iteration,

and then the final state.

In/Out Display

Check Record

Figure 3.6
In/Out Display Activity Diagram

26
Figure 3.6 shows the workflow for the In/Out Display for the student user.

In the initial state the user will place the thumb finger for verification, then the

fingerprint will be processed by checking for match in the Check Record, then

the Final State.

Control Panel

Enroll Fingerprint Delete Fingerprint

Figure 3.7
Enroll Fingerprint and Delete Fingerprint Activity Diagram

27
Figure 3.7 shows the workflow for the control panel for the student user.

The user will select from the choices Enroll Fingerprint or the Delete Fingerprint.

View Student Records View Guardian Records Guardian Registration

Figure 3.8
View Student Records, View Guardian Records and Guardian
Registration Activity Diagram

Figure 3.8 shows the workflow for the control panel for the administrator

user. The user will select from the choices View Student Records, View Guardian

Records, or Guardian Registration.

28
SMS Maintenance

Start Send Stop Send

Figure 3.9
Start Send and Stop Send Activity Diagram

Figure 3.9 shows the workflow for SMS Maintenance for the administrator

user. The user will select from the choices Start Send or Stop Send.

29
In/Out Maintenance

Attendance Logs Send Notifications

Figure 3.10
Attendance Logs and Send Notifications Activity Diagram

Figure 3.10 shows the workflow for the In/Out Maintenance for the

administrator user. The user will select from the choices Attendance Logs or

Send Notifications.

30
Chapter 4

Testing, Presentation, and Interpretation of Data

This chapter shows the different tests done to show how the design

worked, as well as other tests to show the projects capabilities or performance.

Thumb Condition Accuracy Test

One important factor to ensure when using the fingerprint scanner is the

accuracy rate or the detection rate of the fingerprint. Knowing how to get high

accuracy fingerprint detection will surely speed up the processes using the

system. The fingerprint scanners ability to read the fingerprint will differ from

one fingerprint to another. The following table will show how finger condition will

affect the fingerprint scanners accuracy.

The following tests were conducted with 10 users and three attempts were made

or until the process succeeded. Only a maximum of three attempts were given,

for attempts that reached more than three indicated bad accuracy. The following

table shows the results for the test.

31
Finger is Clean, Rough (washed with water)

Fingerprint # First Attempt Second Attempt Third Attempt

1 Success n/a n/a

2 Fail Success n/a

3 Success n/a n/a

4 Success n/a n/a

5 Success n/a n/a

6 Success n/a n/a

7 Success n/a n/a

8 Fail Success n/a

9 Success n/a n/a

10 Success n/a n/a

Table 4.1
Rough Thumb Condition Accuracy Test

Table 4.1 shows that a clean and slightly rough finger will have a good to

high rate of accuracy using the fingerprint scanner. According to the tests only

32
two trials were needed for the second attempt to verify the fingerprint while the

rest only required one.

Finger is Smooth (washed with soap or with lotion)

Fingerprint # First Attempt Second Attempt Third Attempt

1 Fail Fail Fail

2 Fail Success n/a

3 Fail Fail Fail

4 Fail Fail Success

5 Fail Fail Fail

6 Fail Fail Fail

7 Fail Fail Success

8 Fail Success n/a

9 Fail Fail Fail

10 Fail Fail Success

Table 4.2
Smooth Thumb Condition Accuracy Test

33
Table 4.2 shows that no trial was able to be read at the first attempt, only

two were able to be read at the second attempt, three were read at the third

attempt, and the rest were not able to be read even after three attempts.

Therefore having a smooth finger by washing with soap or using lotion will cause

the fingerprint scanner to read the fingerprint with rates from average to low.

Fingerprint is Deformed (any means of changing the fingerprint

registered such as skin peeling, or any small foreign particles)

Fingerprint # First Attempt Second Attempt Third Attempt

1 Fail Fail Fail

2 Fail Fail Fail

3 Fail Fail Fail

4 Fail Fail Fail

5 Fail Fail Fail

6 Fail Fail Fail

7 Fail Fail Fail

34
8 Fail Fail Fail

9 Fail Fail Fail

10 Fail Fail Fail

Table 4.3
Deformed Fingerprint Accuracy Test

Table 4.3 shows that no attempts from any trial was successful even after

the third trial with a deformed fingerprint. This shows that a deformed fingerprint

(that will alter the fingerprint in anyway) will cause the fingerprint scanner

accuracy to be bad or very, very low if not impossible to be read.

Test Summary and Comparison

Results from table 4.1, 4.2, and 4.3 show that fingerprint accuracy will

also vary with fingerprint conditions. From the said tests they show that the

fingerprint that is clean and slightly rough will have the best chance, or the

highest accuracy rate for the fingerprint scanner. Therefore under operating

conditions, a clean and slightly rough finger is the most advisable or

recommended fingerprint condition.

35
Queuing of Multiple Log In Attempts

These tests show how the doorlock with the sensor will work if multiple

entrants are logging in.

Multiple Entrants Queued

Situation 1

User A logged in the system, but before User A opens the door User B

logged in as well. As User A opened the door and closed, the lock is not

triggered. As User B opened the door and closed, the lock is triggered.

For Situation 1, two users are queued which means the sensor will wait

for the door to close as many times as the number of queued users. As User A

opened and closed the door, the lock did not trigger for the user queued as 2. As

User B opened and closed the door, the lock triggered to close for the queued

users are 2 and the door closed twice when User A and User B opened and

closed the door.

36
Situation 2

User A logged in the system, but before User A opens the door User B

logs in as well. As User A opens the door User C logs in the system before the

door closes, and the lock is not triggered. As User B opens the door and closes,

the lock is not triggered. As User C opens the door and closes it, the lock is

triggered.

For Situation 2, two users are queued at first, then another user logs in

while the first user opens the door which makes the queued users become 3. As

User A opens and closes the door, the lock does not trigger for there are users

queued even if the door is already opened. As User B opens and closes the door,

the lock does not trigger to close for the queued users are 2. As User C opens

and closes the door, the lock is triggered to close for the queued three entrants

have entered and the door closed three times.

37
Situation 3

User A logs in the system, but before User A opens the door User B logs in

as well. As User A opened the door, User B stops the door from closing when he

enters. The lock is not triggered.

For situation 3, the lock is not triggered because the door does not close

completely for the first user. The system does not count the first entrant thus it

does not decrease the number of queued users. The door needs to be closed

one more time to trigger the lock to close.

38
Chapter 5

Conclusion and Recommendation

This chapter shows the important findings of the team with their design.

It shows what the researchers have concluded in the development of the project

as well as any recommendation for improvements of the design.

Conclusion

In the design, the designers were able to develop an integrated system to

upgrade the login system of the campus. The designers were able to implement

a biometric system which is the fingerprint scanner for a replacement to the RF

ID system. The biometric system will integrate the system to be an identification

type login system from the RF IDs verification type login system, thus removing

some security lapses that the verification type login system cannot resolve such

as stolen identities. Using the fingerprint scanner, the design will make the

system more reliable and secure. The designers were also able to add the

automated doorlock and the SMS capability for the system for better security and

for the assurance of students parents and guardians.

39
Recommendations

In the near future, better fingerprint scanners will be released, which will

increase image focusing and digital image conversion, which are musts in giving

the design more reliability, accuracy and speed.

Also a better doorlock system that could be implemented is suggested

such as using a magnetic lock. Also the sensors could be upgraded to detect

entrants or the door could be upgraded with the turnstile type of door.

40
References

Baras J., and Ivanov V. (2011). Authentication of Fingerprint Scanners. Institute

for Systems Research, University of Maryland, College Park, MD 20742,

USA IEEE

Cappelli R., Ferrara M., and Maltoni D. (June 2008). On the Operational Quality

of Fingerprint Scanners. IEEE Transactions on Information Forensics and

Security, 3 (2)

Faundez-Zanuy M. (August 2004). A Door-Opening System Using a Low-Cost

Fingerprint Scanner and a PC. IEEE A&E Systems Magazine.

Ferrara M., Franco A. And Maltoni D. (2007). Estimating Image Focusing in

Fingerprint Scanners. C. d. L. Scienze dell 'Informazione - Universita di

Bologna, via Sacchi 3, 47023 Cesena, ITALY IEEE

Oancea C. (May 2011). GSM Infrastructure Used for Data Transmission.

Politehnica University of Bucharest, Bucharest, RO 060042, Romania.

Kun Z., Yinghong H., Yuchun M., and Zhuang L. (2011). General Application

Research on GSM Module. Hainan Key Laboratory of Embedded Systems

Qiongzhou University Sanya, Hainan Province 572022, China IEEE.

41
Appendix A

Operations Manual

1. System Requirements

a. Windows XP or later versions

b. 220V Source

c. RS232 to USB Port Cable

d. Broadband

2. Installation Procedures

a. Connect and Install the USB port of the RS232 to USB Port

Cable to the Computer Device going to be used for the set-up.

b. Plug and Install the Broadband to the Computer Device going to

be used for the set-up

c. Connect the RS232 port to the Max232 (Serial Port) outlet of

the Fingerprint Scanner box.

d. Connect the Actuator connection (three-pin) to its connection

(three-pin) at the Fingerprint Reader Box. Straight Connection,

Color Coded (red-red).

42
e. Connect the Blocking Sensor connection (two-pin) to its

connection (two-pin) at the Fingerprint Reader Box. Straight

Connection, Color Coded(red-red).

f. Turn On the Fingerprint Reader Box.

3. Using the Software

After installation of the design, the system is now ready to

be used. Open the DoorLockSystem program to start using the

System.

Control Panel

This interface will allow the administrator to Enroll

Fingerprint, Delete Fingerprint, View Student Records, Guardian

Registration.

Figure A.1
Control Panel Interface

Figure A.1 shows the Control Panel Interface. This shows the

available commands for Administrator use.

43
a. Enroll Fingerprint

Enroll Fingerprint is used to populate the database of

the system with profiles of the enrolees together with their

fingerprint. The Enroll Fingerprint will prompt a new

interface requiring the Full name of the student, the Student

Number, and the Program to be filled up, upon clicking add,

the user will register his/her fingerprint by placing and

removing his/her thumb after flick of the scanner lights three

(3) times. The software will return a message if the

enrolment is successful or failed. Successful Enrollment adds

the user to the database while failed Enrollment will void the

profile and will require the user to enroll again.

Figure. A.2
Enroll Fingerprint Interface - Form

Figure A.2 shows the Enroll Fingerprint Interface

44
Figure A.3
Enroll Fingerprint Interface Enrollment Successful

Figure A.3 shows the Successful Enroll Fingerprint message

promt. The Record is successfully added to the database

Figure A.4
Enroll Fingerprint Interface Error No Name

Figure A.4 shows Enroll Fingerprint error due to Name is

empty.

45
Figure A.5
Enroll Fingerprint Interface Error No Student Number

Figure A.5 shows Enroll Fingerprint error due to Student

Number is empty.

Figure A.6
Enroll Fingerprint Interface Error Wrong Student
Number

Figure A.6 shows Enroll Fingerprint error due to the Student

Number is not Numeric.

46
Figure A.7
Enroll Fingerprint Interface Error Student Number Exists

Figure A.7 shows Enroll Fingerprint error due to the Student

Number entered is already enrolled in the database.

Figure A.8
Enroll Fingerprint Interface Error Enrollment Failed

Figure A.8 shows Enroll Fingerprint enrollment failed. This

are caused by reasons such as the fingerprints scanned are not

matched or the fingerprint maybe unreadable for the scanner

47
Figure A.9
Enroll Fingerprint Interface Error Fingerprint Already
Enrolled

Figure A.9 shows Enroll Fingerprint enrollment failed

because the fingerprint scanned is already enrolled and found at

the systems database.

b. Delete Fingerprint

Delete Fingerprint is used to delete profiles from the

systems database using the fingerprint enrolled with the

profile. Delete Fingerprint will prompt a new interface

requiring the fingerprint of the user to be deleted.

Figure A.10
Delete Fingerprint Interface Form

48
Figure A.10 shows Delete Fingerprint Interface. The form

requires the fingerprint of the user to be deleted to be scanned.

Figure A.11
Delete Fingerprint Interface Form Confirm Delete

Figure A.11 shows Delete Fingerprint Delete Confirmation

prompt. The system has successfully read the fingerprint and

requesting the user for confirmation of deletion, click Yes to

delete or No to cancel.

49
Figure A.12
Delete Fingerprint Interface Deletion Cancelled

Figure A.12 shows Delete Fingerprint Deletion is Cancelled.

The user selected No.

Figure A.13
Delete Fingerprint Interface Deletion Complete

Figure A.13 shows Delete Fingerprint Deletion is Complete.

The user selected Yes.

50
c. View Student Records

View Student Records is used to view the profiles of

the students enrolled in the Systems Database. The profiles

consist of Name of Student, Fingerprint Number, Student

Number, and Program of Student.

Figure A.14
View Student Records Interface

Figure A.14 shows the View Student Records Interface. List

will be populated as profiles are added to the database.

51
d. Guardian Registration

Guardian Registration is used to add Guardians and

their mobile numbers to the student profiles. The mobile

numbers will be used as link to the student number of

profiles. Registered mobile number will be used by the

system and send SMS if the accompanied student number

has logged in.

Figure A.15
Guardian Registration Interface Error No Name

Figure A.15 shows Guardian Registration error due to Name

is empty.

52
Figure A.16
Guardian Registration Interface Error No Mobile Number

Figure A.16 shows Guardian Registration error due to Mobile

Number is empty.

Figure A.17
Guardian Registration Interface Error Wrong Mobile
Number

Figure A.17 shows Guardian Registration error due to Mobile

Number is not numeric.

53
Figure A.18
Guardian Registration Interface Error No Student
Number

Figure A.18 shows Guardian Registration error due to

Student Number is empty.

Figure A.19
Guardian Registration Interface Error Wrong Student
Number

Figure A.19 shows Guardian Registration error due to

Student Number is not numeric.

54
Figure A.20
Guardian Registration Interface Error Student Number
Already Have a Guardian

Figure A.20 shows Guardian Registration error due to the

student number already have a guardian. A Student Number can

only have one(1) Guardian Registered.

Figure A.21
Guardian Registration Interface Registration Successful

Figure A.21 shows Guardian Registration Successful. The

Guardian record is added.

55
e. View Guardian Records

View Guardian Records is used to view the profiles of

the Guardians Registered in the Systems Database. The

profiles consist of Name of Guardian, Mobile Number, and

Student Number.

Figure A.22
View Guardian Records Interface

Figure A.22 shows the View Guardian Records Interface. List

will be populated as Guardians are registered to the database.

56
IN/OUT Display

The interface will show the IN/OUT Display of the system.

The IN/OUT Display shows the profile of the enrolled student,

those who are not enrolled are categorized as NOT RECOGNIZED.

Figure A.23
IN/OUT Display Not Recognized

Figure A.23 shows the IN/OUT Display interface that shows the

student trying to log in is not recognized by the systems database

57
Figure A.24
IN/OUT Display User Login

Figure A.24 shows the IN/OUT Display interface that shows the

profile of the student that logged in. It displays the name, student

number, program, and the image of the student logging in.

58
IN/OUT Maintenance

This interface will allow the administrator to view Attendance

Logs, and Sent Notifications.

Figure A.25
IN/OUT Maintenance

Figure A.25 shows the IN/OUT Maintenance interface. This

shows available commands for administrator use.

a. Attendance Logs

Attendance Logs is used to view logs of students who

logged in and out. Attendance logs displays Student Number, Name of

Student, Date/Time of IN/OUT.

59
Figure A.26
Attendance Logs Interface

Figure A.26 shows the Attendance Logs interface that

displays logs of students that went in and out.

Figure A.27
SMS Notification Interface

Figure A.27 shows SMS notification Interface that displays


Student Numbers that have SMS notifications.

60
Figure A.28
SMS Maintenance Interface

Figure A.28 shows the interface for the Maintenance of the

SMS. The Start Activates the broadband to start sending SMS, the

Stop halts the sending of SMS.

4. Troubleshooting Guides and Procedures

RS232 Cable Missing

Figure A.29
Error RS232 Cable Missing

61
Figure A.29 shows the error message when RS232 Cable is

missing. The problem maybe the Cable is not connected, or the

driver is not properly updated, or the com port used is not correct.

Solution

a. Connect the RS232 Cable

The cable is required for the PC to communicate with the

design. Connect the Serial port to the design and the USB port

to the PC

b. Com Port Number Error

The cable maybe connected but the com port assigned is

invalid, check the My Computer >Properties > Device Manager >

Communication Ports, then look for the RS232 cable port

connection and place it at the designs software in VB.

c. Cannot be read but connected and correct com port

The device must be updated using the update driver.

62
Appendix B

Pictures of Prototype

Figure B.1
Fingerprint Reader Closed Casing

Figure B.2
Inside Circuits of the Prototype

63
Figure B.3
MCU of the Design

Figure B.4
Minidoor

64
Figure B.5
Automated Doorlock and Blocking Sensor

Figure B.6
Sample Program and Broadband for SMS

65
Bill of Materials

Quantity Materials Price (Php) Total Price

1 Fingerprint Module 3850 3850

1 Zilog (Z8F1601) 480 480

1 Acrilic Casing 500 500

Transformer
1 150 150
220Vac to 12Vac

1 Max232 135 135

1 RS232 35 35

2 Relay 25 25

2 Voltage Regulator 15 15

1 Actuator 350 350

1 Lock Set 150 150

1 Broadband 1200 1200

USB to Serial
1 200 200
Cable

1 AC plug 25 25

Bridge type
1 15 15
Rectifier

66
1 Blocking Sensor 105 105

1 PCB 400 400

Miscellaneous
(wires, capacitor,
1 300 300
resistors, screw,
etc.)

1 Mini Door Set 1500 1500

Total Amount = 9435

Figure B.7
Bill of Materials

67
Appendix C

Program Listing (MCU)

#include <ez8.h>

#include <string.h>

#include <stdlib.h>

#include <stdio.h>

#include "timer0.h"

#include "uart1.h"

#include "getch1.h"

#include "fingerprint.h"

#include "software_delay.h"

#define SWITCH (PCIN & B0)

#define UART1CHARLEN 20

char loc=1;

char loc_enroll;

char loc_delete;

char enroll;

unsigned char willClose=0;

...

68
Appendix D
(Datasheets)

69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
Fingerprint Login System with SMS
Module and Automated Door Lock for
Mapua Institute of Technology

Jomari Jay O. Mariano, Jigxy Jones S. San Pedro, Justin Dane M. Sinnung, Frank Adrian F. Zaragoza
Dionis A Padilla, Adviser
BS in Computer Engineering School of EECE, Mapua Institute of Technology

Abstract The Development of Information The department wants to take a step further with
Technology (DOIT) of Mapua Institute of Technology the log in system of the school which is currently done by
(MIT) always aims for the next step in technology for the the RF ID system. This innovation will cope with the
benefit of the campus. Innovative login system is one of growing number of students as well as provide for the
the targets of the department. This design aims to create an security of the whole campus.
improved login system for Mapua by replacing the RF ID
System with a Fingerprint Scanner. Also, the design adds Customer
the automated doorlock and the SMS capability activated The customer for this design is the DOIT
by the fingerprint. Changing the login requirement from department of Mapua Institute of Technology Intramuros,
the card to the fingerprint as well as the added automated Manila which is headed by Engr. Danillo Tiongco, the
doorlock and SMS will give more security for the whole Senior Deputy for ICT I/O. It is located on the 4th Floor,
campus. Administration Building of Mapa Institute of
Technology, Muralla Street, Intramuros, Manila
Keywords RF ID, Biometric System, Fingerprint Philippines. The DOIT department offers support for the
Scanner, SMS Introduction campus for operations such as Intranet, monitoring of
LAN, laboratory room reservation, on-line requests for
software installation, available software, downloads,
I. INTRODUCTION policies and procedure documents (PAPD), GLIMPSE, E-
learning, ID printing status, network operations manual,
The Mapua Institute of Technology (MIT) is a and IT standard procedure manuals. They have also
renowned school for engineering courses located at provided MIT with services such as the access points or
Muralla Street, Intramuros, Manila. It is the biggest school hotspots for Wi-Fi, Cardinal Plus cards, Smart
of engineering in the Philippines, not only because it has a identification, tech info kiosk, and much more.
lot of enrolled students but also because it offers courses
that are accredited by the Philippine Association of
Colleges and Universities Commision on Accreditation Needs
(PACUCOA). But not only locally is MIT renowned but The DOIT department has been working to enable
internationally as well for having courses recognized by Mapua to keep up with technology, developing software
the Accreditation Board for Engineering and Technology and applied hardware that will help the school give quality
(ABET), thus making MIT a very renowned and reliable service to the students as well as for the students parents
school for engineering. or guardians. It has been thinking of ways to improve such
The Development of Information Technology facilities as the log-in system of the school.
(DOIT) Department of the MIT is responsible for The department wants to try improve the log in
technology innovation in the school premises. Currently, system of Mapua to give better security and reliability for
the log in system of the campus is done through an RF ID the whole campus.
system and a magnetic card reader. The entrance of the The login system of the school is currently done
school must be manned by a security guard who is always through an RF ID system but it cannot be solely relied
actively looking at the login monitor, as unregistered or upon for guards are still needed to attend the entrance
blocked IDs of students identified by the monitor must be looking through everyone trying to log in. Another factor
seen by the guards first before they can block anyone that makes it hard for the guards is that the school does not
unauthorized trying to go in. require the students to wear uniforms. In this type of

92
system there will be some instances that, due to fast Impact
queuing, some may slip past the guard unnoticed even if In terms of the impact of the design on safety and
they have not tapped their ID, or if they do not have their security, this design will allow the parents or guardians to
ID with them, or even if they are using somebody elses know if their children have reached the school premises. In
ID. The department is looking at addressing the security terms of security for the school, the biometric scanner will
lapses of the login system by implementing a system that allow one person and one person alone to access his or her
will give better user verification. own database using their fingerprint, unlike with using the
It is also planning to involve the guardians by old ID system, lost IDs could be used to tap in to the
keeping them informed of their wards whereabouts, at machine even by those who do not own it; also with the
least as far as having reached the Mapua campus is implementation of the door lock, only students can pass
concerned. through the entrance door while the visitors will take
another route to the guard house, making it safer for the
Solution students inside the campus by preventing strangers from
The idea is to enhance the log in system of the entering easily the school premises without the guards
school using a biometric system and use a GSM module to knowing it. In terms of sustainability, the biometric log-in
send messages of the individuals to their respective parents system with GSM is fairly easy to maintain; aside from
or guardians and add an automated door lock to separate maintaining the load for the GSM to send SMS, it will be
the enrolled students from those who are only visitors or easy to use.
outsiders. The integration of the login system aims to
create an alternative system for the campus which will give Constraints
better security and will greatly improve the speed of The constraints of the design is that the students
authorization, thus avoiding long queues. who would only log in with their fingerprints and would
The standard login system uses verification to not go inside the campus will not be detected by the
detect who the user is; in verification the user will tell the system, which means that a student can log in and leave
system who they are and the system will verify if they after fingerprint reading, which will still send an SMS
truly are who they claim to be, but in a biometric system message to their guardians stating that they have arrived at
such as the fingerprint scanner the login system will be the campus vicinity but will not send information if they
turned to an identification system in which the system will really went in or not.
tell who the user is when the user presents a unique As well as with the automated door lock, the
physical identity such as the fingerprint which one and trigger will only activate the lock if the door shuts from
only one user has. With this innovation the login system open to closed which means that if the door does not close
will be more reliable and the work load will be lessened at all before the second user enters, the door will only
for the manning guards, since the user identification will count the two users as one user and will not lock.
be done by the system, and identification errors will be The design will not remove the guards from their
eliminated. work; the intention of the design is to give greater role to
Using a GSM module, SMS messages can be the system and make it more reliable by shifting the login
sent to the registered mobile phone numbers registered for system to identification. This will make the design do the
each student; this will allow their guardians to know if the work of identifying the people entering the campus while
students have reached the campus premises. For added the guards will monitor the device.
security, an automated doorlock system can be added to As to the economics, this design will be costly to
prevent any forced entrance and to filter those enrolled implement, but on the long term this will be more cost
from those who are not. effective as additional students would not require any
additional login equipment such as the RF ID cards, thus
Objective minimizing costs.
The design aims to combine a fingerprint scanner
with a GSM Module and an automated door lock to create
an alternative log in system for the campus. Differentiation
to create a system with better The technology used by most schools and
security by implementing an universities for identification is RF ID. This kind of
identification system and an technology is already old fashioned and some researchers
automated door lock for the have proven that RFID tags are relatively easy to exploit in
entrance. a number of cases. The proposed solution of the designers
to notify the guardians of their is to implement a system that will use biometrics to
students arrival at the campus. identify individuals. Using fingerprints as a means of
to minimize the delay of identification adds more security features as compared to
processing speed even with the use of radiofrequencies. Also the cost of producing
heightened security. RFID tags is still very expensive, whereas in biometrics
only ones fingers are needed for identification.
As an added feature SMS notification will be
incorporated into the login system. This will assure the

93
guardian/s of the students that they have arrived at the biometric doorlock system could be a cost saver instead of
school premises. The hardware to be used in implementing being an additional cost for the school. The idea of having
the notification is a GSM module. This technology will digital keys for anyone or everyone rather than distributing
give real-time information whenever it is needed. The use physical keys could be more cost efficient, aside from the
of the GSM system is selected as the communication security that it gives as physical keys could be stolen or
medium because it can serve many users at the same time passed on without knowledge of the authenticators.
without the need to add another set of this equipment.
On the Operational Quality of Fingerprint Scanners,
The automated gate is an added security feature Authentication of Fingerprint Scanners, and
before one can enter the institution. It will be custom made Estimating Image Focusing in Fingerprint Scanners
by the designers in accordance in the needs of the Also, Cappelli et al. (2008), Ivanov and Baras
customer. The gates will be installed for registered persons (2011), and Ferrara et al. (2007) show that fingerprint
and will not open for visitors or unregistered entrants. scanners are not 100% accurate. There are some cases and
Doors will be attached to a motor that is controlled by a certain factors that should be taken into consideration
microcontroller interfaced to a computer where the when using the scanner. These articles showed the test
fingerprint reader is also connected. results and adjustments needed for a better and more
reliable finger print scanner such as creating better image
Benefits focusing for the scanner when it converts the detected
This design will benefit both the institution and fingerprint to its digital form and increasing the frequency
the guardians of the students. of the scanner that depends from finger to finger.
The institution will benefit from such a design,
for this will give better security to the school and its Doorlock Security with GSM Alert Messaging
students. This will also improve the quality level of the Martinez, et al., (date) was also used as a
school for having advanced technology in its login system. reference to use the GSM module in part of the proposed
The students guardians will also benefit from the system, as well as the use of a sensor with the doorlock.
SMS capability of the design, as this will give them the Their design involves a passive sensor that will trigger the
assurance that their children or wards have reached the GSM when activated and the active sensor at the door to
school premises. lock once the alarm is triggered. This article was been
useful in understanding how to implement the GSM on the
proposed design as well as the use of sensors for the door
lock.
II. REVIEW OF RELATED DESIGN LITERATURES AND
STUDIES How Fingerprint Scanners Work
Fingerprint scanners have many functions such as
This chapter shows the review of related research the registration, verification, and deletion of fingerprint
for the development of the design. The following articles data. Operations start with the registration of the data
helped the group to further understand the project. needed to be stored; to enrol, the user must place his
Biometric systems such as fingerprint scanners thumb at the scanner three times (once after a few seconds
are widely used to make more secure login systems. Other delay) and have a specific fingerprint number incorporated
security systems such as the RF ID are verification type with the digital image to be stored. This assigned
systems wherein the user will have to verify his/her fingerprint scanner will be used to link the fingerprint with
identity by tapping the card on the reader, regardless of the pool of data from the database upon compilation. After
who really owns the tapped card. Fingerprint scanners are registration is done, the verification function can be used.
an identification type system which uses the fingerprint as Verification mode will allow the fingerprint scanner to
a specific authenticator to identify the user from the compare the currently scanned fingerprint image to its
database stored in the system; this makes biometric database of digital fingerprint images. If it finds a match, it
systems much more reliable and secure compared to the will return a value equal to the assigned fingerprint
RF ID system. number, else it will return a value of 0. The deletion
function will delete stored fingerprint values and images
A Door-Opening System Using a Low-Cost from the memory of the fingerprint scanner, to delete the
Fingerprint Scanner and a PC data stored it requires either the actual fingerprint image to
A related article from A&E Systems Magazine delete or the fingerprint number assigned.
(August, 2004) shows how to create a low cost security
system with a fingerprint scanner and a PC that can There are limitations of a fingerprint scanner, namely,
emulate a standalone security fingerprint embedded one and only one data of the same fingerprint image can be
device. This design was created to help improve schools saved by a person because no two persons can have the
security in their laboratories. It was designed to allow same fingerprint, which makes it unique. This results in
students to enter the premises of a laboratory at the time failure of enrolment if a person tries to enrol after already
they need and prevent them from entering outside their being enrolled. Also fingerprint image comparison cannot
laboratory hours. The article concluded that creating a be 100% efficient due to some factors such as very dry

94
skin, finger position, unwanted particles on the finger,
scars or any form of fingerprint deformation, and any MCU Flowchart
factor that will alter image capturing by the fingerprint
scanner. This will result in the fingerprint being START
unidentified even though it has been enrolled; in which
case one should simply try again and make sure that the MCU Flowchart

factors mentioned are observed. INTIALIAZE


UART;
INITIALIZE
FINGERPRINT
III. DESIGN PROCEDURES READER;

This chapter gives a detailed description of how m = FETCHUART();


the group started out and finished the design. This chapter loc = FP_VERIFY();

also includes the block diagram, schematic diagram and


the flow chart for the project.
If m =
Yes ENROLL FP; A
ENROLL

Hardware Development No

Block Diagram If m =
Yes DELETE FP; A
DELETE

No

No OPEN DOOR;

If m = OPEN Yes INITIALIZE DOOR A


SENSOR (CLOSE
DOOR);

No

If
loc is not Yes SENDUART(loc); A
empty

The MCU flowchart describes how it interacts with


Starting at the fingerprint scanner, the system
different devices like the fingerprint reader, passive sensor,
sends the data taken from the user who logs in using their
and relay driver for the door lock. For this development a
fingerprint. That data is sent to the MCU for processing
microcontroller unit (MCU) ZILOG Z8F4821 was used.
that person trying to log in. This data will be compared to
Coding for the implementation was made in Zilog
the registered fingerprints that were stored during
Developer Studio II, a software development kit (SDK)
registration from the database of the PC connected to the
that uses C programming language. After gathering all
MAX232. After the PC has done sending the data to the
resources for making the prototype the designers
MCU, the MCU will compare data from the user to the
database; if matched the MCU will trigger the motor to programmed all the necessary commands to interact with
open the lock and send the database match to the PC these devices. The basic commands are Verify
displaying the users info and sending an SMS to the Fingerprint, Enroll Fingerprint, Delete Fingerprint,
number of the registered guardian of the user, if any; if not Open/Close Door. UART transmission is also required for
developing the MCU for communicating between the
the door will not unlock and will prompt that the user is
MCU and the personal computer (PC) and it is made
unregistered. The door will only lock once it is opened
possible through using MAX232. On creating the code for
then closed, blocking the sensor at the door; once the
MCU it first initialized the UART transmission and
sensor is blocked, the MCU will trigger the motor to lock
fingerprint reader (FR). Upon initializing the UART and
the door. At some instances that there will be several
FR it simultaneously fetched the command from the PC
entrants at a given time; each user who logged in will be
and verifes the fingerprint. If the fetch command is
counted and the door must be opened and closed equal to
ENROLL it will enroll the fingerprint placed on the FR; if
the number of users logging in before the MCU triggers
the command is DELETE it will delete the fingerprint
the motor to lock.
placed on the FR; if the command is OPEN the door will
open and the sensor will count the number of correct
verified fingerprints; this will also trigger to close the door;
and if no command is fetch and the content of verify
fingerprint reader is not empty UART will send the data
from the PC. It will again process the fetching of command
and verifying of fingerprint after the command and
operation are made.

95
6 Success n/a n/a
BIOMETRIC FINGERPRINT READER 7 Success n/a n/a
The biometric fingerprint reader used by the 8 Fail Success n/a
designer is a development kit module with a digital signal 9 Success n/a n/a
processing (DSP) controller, Texas TMS320VC5416, for 10 Success n/a n/a
faster image acquisition. The DSP also makes for easy Rough Thumb Condition Accuracy Test
integration with Zilog Z8F1601. A logic level-UART
Serial (TTL) is the I/O communication for the Shows that a clean and slightly rough finger will
microcontroller. Rate of detection is less than 1 second have a good to high rate of accuracy using the fingerprint
with a 0.00001% false/failed recognition. scanner. According to the tests only two trials were needed
for the second attempt to verify the fingerprint while the
GSM MODULE rest only required one.
The Global System for Mobile Communication
(GSM) module was a HUAWEI E220 which is a HSDPA Finger is Smooth (washed with soap or with lotion)
access device modem. The module used a USB interface Fingerprint First Second Third
(USB modem) which was remotely attached to a different # Attempt Attempt Attempt
personal computer (PC) that will process the SMS 1 Fail Fail Fail
notification. Universal Mobile Telecommunications
2 Fail Success n/a
System (UMTS) is the mobile cellular technology for a
3 Fail Fail Fail
network based on the GSM Standard. With this set of
standards an original design was developed for the modem 4 Fail Fail Success
and utilizing it for sending SMS. 5 Fail Fail Fail
6 Fail Fail Fail
7 Fail Fail Success
8 Fail Success n/a
IV. TESTING, PRESENTATION, AND INTERPRETATION 9 Fail Fail Fail
OF DATA 10 Fail Fail Success
Smooth Thumb Condition Accuracy Test
This chapter shows the different tests done to
show how the design worked, as well as other tests to Shows that no trial was able to be read at the first
show the projects capabilities or performance. attempt, only two were able to be read at the second
attempt, three were read at the third attempt, and the rest
were not able to be read even after three attempts.
Thumb Condition Accuracy Test Therefore having a smooth finger by washing with soap or
One important factor to ensure when using the using lotion will cause the fingerprint scanner to read the
fingerprint scanner is the accuracy rate or the detection rate fingerprint with rates from average to low.
of the fingerprint. Knowing how to get high accuracy
fingerprint detection will surely speed up the processes
using the system. The fingerprint scanners ability to read Fingerprint is Deformed (any means of changing the
the fingerprint will differ from one fingerprint to another. fingerprint registered such as skin peeling, or any small
The following table will show how finger condition will foreign particles)
affect the fingerprint scanners accuracy.
Fingerprint First Second Third
The following tests were conducted with 10 users and # Attempt Attempt Attempt
three attempts were made or until the process succeeded. 1 Fail Fail Fail
Only a maximum of three attempts were given, for 2 Fail Fail Fail
attempts that reached more than three indicated bad
3 Fail Fail Fail
accuracy. The following table shows the results for the
test. 4 Fail Fail Fail
5 Fail Fail Fail
6 Fail Fail Fail
Finger is Clean, Rough (washed with water) 7 Fail Fail Fail
8 Fail Fail Fail
Fingerprint First Second Third 9 Fail Fail Fail
# Attempt Attempt Attempt 10 Fail Fail Fail
1 Success n/a n/a
Deformed Fingerprint Accuracy Test
2 Fail Success n/a
3 Success n/a n/a Shows that no attempts from any trial was
4 Success n/a n/a successful even after the third trial with a deformed
5 Success n/a n/a fingerprint. This shows that a deformed fingerprint (that

96
will alter the fingerprint in anyway) will cause the
fingerprint scanner accuracy to be bad or very, very low if Recommendations
not impossible to be read. In the near future, better fingerprint scanners will
be released, which will increase image focusing and digital
Test Summary and Comparison image conversion, which are musts in giving the design
Results from tables show that fingerprint accuracy more reliability, accuracy and speed.
will also vary with fingerprint conditions. From the said Also a better doorlock system that could be
tests they show that the fingerprint that is clean and implemented is suggested such as using a magnetic lock.
slightly rough will have the best chance, or the highest Also the sensors could be upgraded to detect entrants or
accuracy rate for the fingerprint scanner. Therefore under the door could be upgraded with the turnstile type of door.
operating conditions, a clean and slightly rough finger is
the most advisable or recommended fingerprint condition.

REFERENCES
V. CONCLUSION AND RECOMMENDATION

This chapter shows the important findings of the team Baras J., and Ivanov V. (2011). Authentication of
with their design. It shows what the researchers have Fingerprint Scanners. Institute for Systems
concluded in the development of the project as well as any Research, University of Maryland, College Park,
recommendation for improvements of the design. MD 20742, USA IEEE

Cappelli R., Ferrara M., and Maltoni D. (June 2008). On


Conclusion the Operational Quality of Fingerprint Scanners.
In the design, the designers were able to develop IEEE Transactions on Information Forensics and
an integrated system to upgrade the login system of the Security, 3 (2)
campus. The designers were able to implement a biometric
system which is the fingerprint scanner for a replacement Faundez-Zanuy M. (August 2004). A Door-Opening
to the RF ID system. The biometric system will integrate System Using a Low-Cost Fingerprint Scanner
the system to be an identification type login system from and a PC. IEEE A&E Systems Magazine.
the RF IDs verification type login system, thus removing
some security lapses that the verification type login system Ferrara M., Franco A. And Maltoni D. (2007). Estimating
cannot resolve such as stolen identities. Using the Image Focusing in Fingerprint Scanners. C. d. L.
fingerprint scanner, the design will make the system more Scienze dell 'Informazione - Universita di
reliable and secure. The designers were also able to add Bologna, via Sacchi 3, 47023 Cesena, ITALY
the automated doorlock and the SMS capability for the IEEE
system for better security and for the assurance of
students parents and guardians. Oancea C. (May 2011). GSM Infrastructure Used for Data
Transmission. Politehnica University of
Bucharest, Bucharest, RO 060042, Romania.

Kun Z., Yinghong H., Yuchun M., and Zhuang L. (2011).


General Application Research on GSM Module.
Hainan Key Laboratory of Embedded Systems
Qiongzhou University Sanya, Hainan Province
572022, China IEEE.

97

You might also like