Professional Documents
Culture Documents
by
We thank the Lord Almighty for giving us strength and directing our
path to the following persons who have been instrumental in the completion of
our design.
A special thanks to our adviser, Engr. Dionis Padilla for guidance and
patience throughout the course of this project by giving us some ideas on what
we need to accomplish and consulting on some parts of the design that we need
to know to make the process of designing and creating the prototype much
easier and less complicated if possible.
For our distinguish panel for the defense Engr. Joshua B. Cuesta, Engr.
Ayra G . Panganiban and Engr. Analyn N. Yumang for allotting time for us in
spite of their hectic schedule. We stretch our outmost respect and gratitude.
To our parents and friends for supporting us in every way that they could;
wededicatethis for you.
iii
Table of Contents
TITLE PAGE i
APPROVAL SHEET ii
ACKNOWLEDGEMENT iii
TABLE OF CONTENTS iv
LIST OF TABLES vi
LIST OF FIGURES vii
ABSTRACT x
Background 1
Customer 2
Needs 3
Solution 4
Objective 5
Impact 5
Constraints 6
Differentiation 7
Benefits 8
Definition of Terms 9
Hardware Development 18
Block Diagram 18
Schematic Diagram 20
MCU FlowChart 23
Biometric Fingerprint Reader 25
GSM Module 25
Software Development 26
Activity Diagram 26
iv
Chapter 5: Conclusion and Recommendation 39
Conclusion 39
Recommendation 40
References 41
Appendix: 42
v
List of Tables
vi
List of Figures
vii
Number Exists
Figure A.8 Enroll Fingerprint Interface Error Enrollment 47
Failed
Figure A.9 Enroll Fingerprint Interface Error Fingerprint 48
Already Enrolled
Figure A.10 Delete Fingerprint Interface Form 48
Figure A.11 Delete Fingerprint Interface Form Confirm 49
Delete
Figure A.12 Delete Fingerprint Interface Deletion Cancelled 50
Figure A.13 Delete Fingerprint Interface Deletion Complete 50
Figure A.14 View Student Records Interface 51
Figure A.15 Guardian Registration Interface Error No 52
Name
Figure A.16 Guardian Registration Interface Error No 53
Mobile Number
Figure A.17 Guardian Registration Interface Error Wrong 53
Mobile Number
Figure A.18 Guardian Registration Interface Error No 54
Student Number
Figure A.19 Guardian Registration Interface Error Wrong 54
Student Number
Figure A.20 Guardian Registration Interface Error Student 55
Number Already Have a Guardian
Figure A.21 Guardian Registration Interface Registration 55
Successful
Figure A.22 View Guardian Records Interface 56
Figure A.23 IN/OUT Display Not Recognized 57
Figure A.24 IN/OUT Display User Login 58
Figure A.25 IN/OUT Maintenance 59
Figure A.26 Attendance Logs Interface 60
viii
Figure A.27 SMS Notification Interface 60
Figure A.28 SMS Maintenance Interface 61
Figure A.29 Error RS232 Cable Missing 61
Figure B.1 Fingerprint Reader Closed Casing 63
Figure B.2 Inside Circuits of the Prototype 63
Figure B.3 MCU of the Design 64
Figure B.4 Minidoor 64
Figure B.5 Automated Doorlock and Blocking Sensor 65
Figure B.6 Sample Program and Broadband for SMS 65
ix
ABSTRACT
x
Chapter 1
biggest school of engineering in the Philippines, not only because it has a lot of
enrolled students but also because it offers courses that are accredited by the
(PACUCOA). But not only locally is MIT renowned but internationally as well for
Technology (ABET), thus making MIT a very renowned and reliable school for
engineering.
magnetic card reader. The entrance of the school must be manned by a security
blocked IDs of students identified by the monitor must be seen by the guards
1
The department wants to take a step further with the log in system of the
school which is currently done by the RF ID system. This innovation will cope
with the growing number of students as well as provide for the security of the
whole campus.
Customer
The customer for this design is the DOIT department of Mapua Institute
Senior Deputy for ICT I/O. It is located on the 4th Floor, Administration Building
The DOIT department offers support for the campus for operations such as
manual, and IT standard procedure manuals. They have also provided MIT with
services such as the access points or hotspots for Wi-Fi, Cardinal Plus cards,
2
Needs
The DOIT department has been working to enable Mapua to keep up with
technology, developing software and applied hardware that will help the school
give quality service to the students as well as for the students parents or
guardians. It has been thinking of ways to improve such facilities as the log-in
The department wants to try improve the log in system of Mapua to give
but it cannot be solely relied upon for guards are still needed to attend the
entrance looking through everyone trying to log in. Another factor that makes it
hard for the guards is that the school does not require the students to wear
uniforms. In this type of system there will be some instances that, due to fast
queuing, some may slip past the guard unnoticed even if they have not tapped
their ID, or if they do not have their ID with them, or even if they are using
somebody elses ID. The department is looking at addressing the security lapses
of the login system by implementing a system that will give better user
verification.
their wards whereabouts, at least as far as having reached the Mapua campus is
concerned.
3
Solution
The idea is to enhance the log in system of the school using a biometric
system and use a GSM module to send messages of the individuals to their
respective parents or guardians and add an automated door lock to separate the
enrolled students from those who are only visitors or outsiders. The integration
of the login system aims to create an alternative system for the campus which
will give better security and will greatly improve the speed of authorization, thus
The standard login system uses verification to detect who the user is; in
verification the user will tell the system who they are and the system will verify if
they truly are who they claim to be, but in a biometric system such as the
which the system will tell who the user is when the user presents a unique
physical identity such as the fingerprint which one and only one user has. With
this innovation the login system will be more reliable and the work load will be
lessened for the manning guards, since the user identification will be done by the
Using a GSM module, SMS messages can be sent to the registered mobile
phone numbers registered for each student; this will allow their guardians to
know if the students have reached the campus premises. For added security, an
automated doorlock system can be added to prevent any forced entrance and to
4
Objective
The design aims to combine a fingerprint scanner with a GSM Module and
an automated door lock to create an alternative log in system for the campus.
entrance.
security.
Impact
In terms of the impact of the design on safety and security, this design
will allow the parents or guardians to know if their children have reached the
school premises. In terms of security for the school, the biometric scanner will
allow one person and one person alone to access his or her own database using
their fingerprint, unlike with using the old ID system, lost IDs could be used to
tap in to the machine even by those who do not own it; also with the
implementation of the door lock, only students can pass through the entrance
door while the visitors will take another route to the guard house, making it safer
for the students inside the campus by preventing strangers from entering easily
the school premises without the guards knowing it. In terms of sustainability, the
5
biometric log-in system with GSM is fairly easy to maintain; aside from
maintaining the load for the GSM to send SMS, it will be easy to use.
Constraints
The constraints of the design is that the students who would only log in
with their fingerprints and would not go inside the campus will not be detected
by the system, which means that a student can log in and leave after fingerprint
reading, which will still send an SMS message to their guardians stating that they
have arrived at the campus vicinity but will not send information if they really
went in or not.
As well as with the automated door lock, the trigger will only activate the
lock if the door shuts from open to closed which means that if the door does not
close at all before the second user enters, the door will only count the two users
The design will not remove the guards from their work; the intention of
the design is to give greater role to the system and make it more reliable by
shifting the login system to identification. This will make the design do the work
of identifying the people entering the campus while the guards will monitor the
device.
6
As to the economics, this design will be costly to implement, but on the
long term this will be more cost effective as additional students would not
require any additional login equipment such as the RF ID cards, thus minimizing
costs.
Differentiation
RF ID. This kind of technology is already old fashioned and some researchers
have proven that RFID tags are relatively easy to exploit in a number of cases.
The proposed solution of the designers is to implement a system that will use
adds more security features as compared to the use of radiofrequencies. Also the
cost of producing RFID tags is still very expensive, whereas in biometrics only
system. This will assure the guardian/s of the students that they have arrived at
needed. The use of the GSM system is selected as the communication medium
because it can serve many users at the same time without the need to add
7
The automated gate is an added security feature before one can enter the
the customer. The gates will be installed for registered persons and will not open
Benefits
This design will benefit both the institution and the guardians of the
students.
The institution will benefit from such a design, for this will give better
security to the school and its students. This will also improve the quality level of
The students guardians will also benefit from the SMS capability of the
design, as this will give them the assurance that their children or wards have
8
Definition of Terms
Utilizing specific attributes, these systems can help maintain the much-
system that digitizes and compresses data, then sends it down a channel
with two other streams of user data, each in its own time slot. It operates
9
5. Database an organized collection of data for one or more purposes,
usually in digital form. The data are typically organized to model relevant
information.
Subscriber Identity (IMSI) and the related key used to identify and
10
Chapter 2
This chapter shows the review of related research for the development of
the design. The following articles helped the group to further understand the
project.
more secure login systems. Other security systems such as the RF ID are
verification type systems wherein the user will have to verify his/her identity by
tapping the card on the reader, regardless of who really owns the tapped card.
Fingerprint scanners are an identification type system which uses the fingerprint
as a specific authenticator to identify the user from the database stored in the
system; this makes biometric systems much more reliable and secure compared
to the RF ID system.
A related article from A&E Systems Magazine (August, 2004) shows how
to create a low cost security system with a fingerprint scanner and a PC that can
11
allow students to enter the premises of a laboratory at the time they need and
prevent them from entering outside their laboratory hours. The article concluded
that creating a biometric doorlock system could be a cost saver instead of being
an additional cost for the school. The idea of having digital keys for anyone or
everyone rather than distributing physical keys could be more cost efficient,
aside from the security that it gives as physical keys could be stolen or passed on
often inspect the laboratories to secure them knowing that fingerprint security is
reliable. Another use is that the fingerprint security system creates a list of who
used the facility at any time of the day unlike using the attendance sheet where
one could fake a name or not sign up and therefore would not be responsible for
any misuse of the facility, if any. This will ensure that anyone who uses the
facilities will be careful for they are accountable for. In general biometrics can
offer improved security for access control, and biometric devices can be adapted
to any special requirements and some criterion is needed to choose the best
solution. This article guided the group on how to make the design as well as the
materials that are intended to be used for the project and opinions on how to
12
On the Operational Quality of Fingerprint Scanners, Authentication of
Scanners
Also, Cappelli et al. (2008), Ivanov and Baras (2011), and Ferrara et al.
(2007) show that fingerprint scanners are not 100% accurate. There are some
cases and certain factors that should be taken into consideration when using the
scanner. These articles showed the test results and adjustments needed for a
better and more reliable finger print scanner such as creating better image
focusing for the scanner when it converts the detected fingerprint to its digital
form and increasing the frequency of the scanner that depends from finger to
finger.
Martinez, et al., (date) was also used as a reference to use the GSM
module in part of the proposed system, as well as the use of a sensor with the
doorlock. Their design involves a passive sensor that will trigger the GSM when
activated and the active sensor at the door to lock once the alarm is triggered.
This article was been useful in understanding how to implement the GSM on the
proposed design as well as the use of sensors for the door lock.
13
Subscriber Identity Module (SIM)
The Subscriber Identity Module (SIM) is a small smart card which contains
both programming and information. The SIM card provides the identity for a
subscriber. During initial registration all the relevant subscriber data are inserted
into the SIM card and this activity is known as personalization. A mobile phone
cannot make or receive any calls except emergency calls without a SIM. Each
between themselves to support the subscriber, i.e., the subscriber has a roaming
facility. One of the advantages of the GSM architecture is that the SIM may be
moved from one mobile station to another. This makes upgrades very simple for
the GSM telephone user. The SIM contains the information personalized by the
user and most importantly the number that identifies the SIM card which makes
it distinctive from other SIM cards. The SIM card allows a mobile handset or any
SIM card.
14
Active Infrared Motion Detector
In the active system each sensor consists of two housings. One housing contains
active motion detector is much more reliable than a passive one, but it requires
careful alignment when it is installed. The detector can be falsel y triggered if one
two parts: the infrared transmitter housing and the infrared receiver housing. For
the infrared transmitter the design of the motion detector is said to be active. An
infrared beam has been interfered with, it will trigger alarms preconfigured on
the receiver side. The projects infrared transmitter uses an asynchronous 555
timer as the oscillator and an infrared LED for the transmission of infrared beam
while the receiver uses an infrared phototransistor and an NPN transistor used as
the switch for the output signaling any security devices or any alarms.
15
How Fingerprint Scanners Work
registration of the data needed to be stored; to enrol, the user must place his
thumb at the scanner three times (once after a few seconds delay) and have a
specific fingerprint number incorporated with the digital image to be stored. This
assigned fingerprint scanner will be used to link the fingerprint with the pool of
data from the database upon compilation. After registration is done, the
verification function can be used. Verification mode will allow the fingerprint
digital fingerprint images. If it finds a match, it will return a value equal to the
assigned fingerprint number, else it will return a value of 0. The deletion function
will delete stored fingerprint values and images from the memory of the
fingerprint scanner, to delete the data stored it requires either the actual
There are limitations of a fingerprint scanner, namely, one and only one
data of the same fingerprint image can be saved by a person because no two
persons can have the same fingerprint, which makes it unique. This results in
failure of enrolment if a person tries to enrol after already being enrolled. Also
fingerprint image comparison cannot be 100% efficient due to some factors such
16
as very dry skin, finger position, unwanted particles on the finger, scars or any
form of fingerprint deformation, and any factor that will alter image capturing by
the fingerprint scanner. This will result in the fingerprint being unidentified even
though it has been enrolled; in which case one should simply try again and make
17
Chapter 3
Design Procedures
This chapter gives a detailed description of how the group started out and
finished the design. This chapter also includes the block diagram, schematic
Hardware Development
Figure 3.1
Block Diagram
18
Figure 3.1 shows the block diagram of the design. Starting at the
fingerprint scanner, the system sends the data taken from the user who logs in
using their fingerprint. That data is sent to the MCU for processing that person
trying to log in. This data will be compared to the registered fingerprints that
were stored during registration from the database of the PC connected to the
MAX232. After the PC has done sending the data to the MCU, the MCU will
compare data from the user to the database; if matched the MCU will trigger the
motor to open the lock and send the database match to the PC displaying the
users info and sending an SMS to the number of the registered guardian of the
user, if any; if not the door will not unlock and will prompt that the user is
unregistered. The door will only lock once it is opened then closed, blocking the
sensor at the door; once the sensor is blocked, the MCU will trigger the motor to
lock the door. At some instances that there will be several entrants at a given
time; each user who logged in will be counted and the door must be opened and
closed equal to the number of users logging in before the MCU triggers the
motor to lock.
19
Schematic Diagram
VDC
D1
LED
R1 VDC
1K
VCC GND(VDC)
K1
R3 1k RELAY-SPDT
Q1
2n2222 J2
2
1 DC MOTOR
CON2
J1
2
1 VCC J3
VCC 2
1 CONTROLLER SUPPLY
CON2
CON2
GND(VDC)
D2
LED
J4
VDC 2
1 DC MOTOR SUPPLY
R2 CON2
1K
GND(VDC)
VDC
VCC GND(VDC)
K2
R4 1K
Q2 RELAY-SPDT
2n2222
Figure 3.2
Relay Driver for Door Lock
Figure 3.2 shows the schematic diagram for the door lock. The diagram
shows that there are two paths where the signal or current will flow, depending
on what activates the port 1 or 2 from J1. The flow of current will trigger either
the upper or lower relay that will continue up to the motor, the activating relay
will justify whether the motor will spin clockwise or counter clockwise to open or
20
C6 104 VCC
U4
1 16
C5 104
2 15
3 14
4 13
5 12
C4 104 6 11
7 10
TX R2 1K
1
RX 2
C3 104 8 9
3
R1 1K CON3
J232 MAX232
C2 10uf
1
U2 LM7805CT 3
Vin +5V VCC
5 D1 1n4001
4 9
3 8
D2 1n4001 GND
C1 10uf
7 2
2
6
1
1
DB9 2
CON2
Figure 3.3
UART Converter
Figure 3.3 shows how the data processed from the MCU will be
COM port using a serial cable. If the laptop does not have a COM port, a USB to
RS-232 cable may be used to connect it to an available USB port. The PL2303
driver must be installed along with the touch screen calibration program.
21
VDD
UI
Y1 18.432 Mhz 25 7 PA0
R3 220 Vref PA0 1
16 6 PA1
AVDD PA1 2
26 5 PA2
AVSS PA2
4
3
R2 100K 15
PA3
38
4
PARX
14
Xin PA4
37
5
Xout PA5
PATX
J5 PA6
36 PA6 CON5
1 DBGPIN 35 PA7
C4 18pf C5 18pf 29
PA7
17
2 1 DBG PB0 1
18
CON2 2 PB1 2
24
3 PB2 3
23
4 R31 10K PB3 4
9 19
RST PB4 5
4PINS PB5
20
6
21
PB6
22
7
VDD 13
PB7
27
8
12
PD0 PC0
28
1 CON8
VCMU U2 7805 U5 LM317T 2
PD1 PC1
8
2
1
Vin +Vout
3 3
Vin +Vout
2 PD3 PC2
33
3
1
PC3
39
4
PD4 PC4 5
PD5 40 3
PD5 PC5 6
34 30
PD6 PC6 7
GND C1 0.1uf ADJ
R4 220 C2 1000uf C3 0.1uf
2 1 CON7
Z8F1601
R32 330
J4
J1 C8 C9 1
1 2
2 3
4
CON2 5
6
PARX PA6
PATX
Figure 3.4
MCU with Power Supply
Figure 3.4 shows the microcontroller (MCU) port assignments and the
power supply. The MCU used by the designer is Zilog Z8F1601 which is powered
by a DC power supply attached to it. The power supplies 12V, 5V, and 3.3V for
all the module devices. The desktop application sends commands to the MCU
and processes them. Modules like the relay driver for door lock and fingerprint
reader are connected to the MCU. The UART converter is also connected to the
22
START
MCU Flowchart
INTIALIAZE
UART;
INITIALIZE
FINGERPRINT
READER;
m = FETCHUART();
loc = FP_VERIFY();
If m =
Yes ENROLL FP; A
ENROLL
No
If m =
Yes DELETE FP; A
DELETE
No
No OPEN DOOR;
No
If
loc is not Yes SENDUART(loc); A
empty
Figure 3.5
MCU Flowchart
23
The MCU flowchart describes how it interacts with different devices like
the fingerprint reader, passive sensor, and relay driver for the door lock. For this
development a microcontroller unit (MCU) ZILOG Z8F4821 was used. Coding for
development kit (SDK) that uses C programming language. After gathering all
resources for making the prototype the designers programmed all the necessary
commands to interact with these devices. The basic commands are Verify
transmission is also required for developing the MCU for communicating between
the MCU and the personal computer (PC) and it is made possible through using
MAX232. On creating the code for MCU it first initialized the UART transmission
and fingerprint reader (FR). Upon initializing the UART and FR it simultaneously
fetched the command from the PC and verifes the fingerprint. If the fetch
command is ENROLL it will enroll the fingerprint placed on the FR; if the
command is DELETE it will delete the fingerprint placed on the FR; if the
command is OPEN the door will open and the sensor will count the number of
correct verified fingerprints; this will also trigger to close the door; and if no
command is fetch and the content of verify fingerprint reader is not empty UART
will send the data from the PC. It will again process the fetching of command
and verifying of fingerprint after the command and operation are made.
24
BIOMETRIC FINGERPRINT READER
for faster image acquisition. The DSP also makes for easy integration with Zilog
Z8F1601. A logic level-UART Serial (TTL) is the I/O communication for the
false/failed recognition.
GSM MODULE
HUAWEI E220 which is a HSDPA access device modem. The module used a USB
computer (PC) that will process the SMS notification. Universal Mobile
network based on the GSM Standard. With this set of standards an original
design was developed for the modem and utilizing it for sending SMS.
25
Software Development
This section explains the development of the desktop application that was
used for the whole system. Visual Basic 6.0 was used for the front end while SQL
Activity Diagram
work flow of the system. It shows the control flow of the system starting
from the initial state, then the action with support for choice and iteration,
In/Out Display
Check Record
Figure 3.6
In/Out Display Activity Diagram
26
Figure 3.6 shows the workflow for the In/Out Display for the student user.
In the initial state the user will place the thumb finger for verification, then the
fingerprint will be processed by checking for match in the Check Record, then
Control Panel
Figure 3.7
Enroll Fingerprint and Delete Fingerprint Activity Diagram
27
Figure 3.7 shows the workflow for the control panel for the student user.
The user will select from the choices Enroll Fingerprint or the Delete Fingerprint.
Figure 3.8
View Student Records, View Guardian Records and Guardian
Registration Activity Diagram
Figure 3.8 shows the workflow for the control panel for the administrator
user. The user will select from the choices View Student Records, View Guardian
28
SMS Maintenance
Figure 3.9
Start Send and Stop Send Activity Diagram
Figure 3.9 shows the workflow for SMS Maintenance for the administrator
user. The user will select from the choices Start Send or Stop Send.
29
In/Out Maintenance
Figure 3.10
Attendance Logs and Send Notifications Activity Diagram
Figure 3.10 shows the workflow for the In/Out Maintenance for the
administrator user. The user will select from the choices Attendance Logs or
Send Notifications.
30
Chapter 4
This chapter shows the different tests done to show how the design
One important factor to ensure when using the fingerprint scanner is the
accuracy rate or the detection rate of the fingerprint. Knowing how to get high
accuracy fingerprint detection will surely speed up the processes using the
system. The fingerprint scanners ability to read the fingerprint will differ from
one fingerprint to another. The following table will show how finger condition will
The following tests were conducted with 10 users and three attempts were made
or until the process succeeded. Only a maximum of three attempts were given,
for attempts that reached more than three indicated bad accuracy. The following
31
Finger is Clean, Rough (washed with water)
Table 4.1
Rough Thumb Condition Accuracy Test
Table 4.1 shows that a clean and slightly rough finger will have a good to
high rate of accuracy using the fingerprint scanner. According to the tests only
32
two trials were needed for the second attempt to verify the fingerprint while the
Table 4.2
Smooth Thumb Condition Accuracy Test
33
Table 4.2 shows that no trial was able to be read at the first attempt, only
two were able to be read at the second attempt, three were read at the third
attempt, and the rest were not able to be read even after three attempts.
Therefore having a smooth finger by washing with soap or using lotion will cause
the fingerprint scanner to read the fingerprint with rates from average to low.
34
8 Fail Fail Fail
Table 4.3
Deformed Fingerprint Accuracy Test
Table 4.3 shows that no attempts from any trial was successful even after
the third trial with a deformed fingerprint. This shows that a deformed fingerprint
(that will alter the fingerprint in anyway) will cause the fingerprint scanner
Results from table 4.1, 4.2, and 4.3 show that fingerprint accuracy will
also vary with fingerprint conditions. From the said tests they show that the
fingerprint that is clean and slightly rough will have the best chance, or the
highest accuracy rate for the fingerprint scanner. Therefore under operating
35
Queuing of Multiple Log In Attempts
These tests show how the doorlock with the sensor will work if multiple
Situation 1
User A logged in the system, but before User A opens the door User B
logged in as well. As User A opened the door and closed, the lock is not
triggered. As User B opened the door and closed, the lock is triggered.
For Situation 1, two users are queued which means the sensor will wait
for the door to close as many times as the number of queued users. As User A
opened and closed the door, the lock did not trigger for the user queued as 2. As
User B opened and closed the door, the lock triggered to close for the queued
users are 2 and the door closed twice when User A and User B opened and
36
Situation 2
User A logged in the system, but before User A opens the door User B
logs in as well. As User A opens the door User C logs in the system before the
door closes, and the lock is not triggered. As User B opens the door and closes,
the lock is not triggered. As User C opens the door and closes it, the lock is
triggered.
For Situation 2, two users are queued at first, then another user logs in
while the first user opens the door which makes the queued users become 3. As
User A opens and closes the door, the lock does not trigger for there are users
queued even if the door is already opened. As User B opens and closes the door,
the lock does not trigger to close for the queued users are 2. As User C opens
and closes the door, the lock is triggered to close for the queued three entrants
37
Situation 3
User A logs in the system, but before User A opens the door User B logs in
as well. As User A opened the door, User B stops the door from closing when he
For situation 3, the lock is not triggered because the door does not close
completely for the first user. The system does not count the first entrant thus it
does not decrease the number of queued users. The door needs to be closed
38
Chapter 5
This chapter shows the important findings of the team with their design.
It shows what the researchers have concluded in the development of the project
Conclusion
upgrade the login system of the campus. The designers were able to implement
type login system from the RF IDs verification type login system, thus removing
some security lapses that the verification type login system cannot resolve such
as stolen identities. Using the fingerprint scanner, the design will make the
system more reliable and secure. The designers were also able to add the
automated doorlock and the SMS capability for the system for better security and
39
Recommendations
In the near future, better fingerprint scanners will be released, which will
increase image focusing and digital image conversion, which are musts in giving
such as using a magnetic lock. Also the sensors could be upgraded to detect
entrants or the door could be upgraded with the turnstile type of door.
40
References
USA IEEE
Cappelli R., Ferrara M., and Maltoni D. (June 2008). On the Operational Quality
Security, 3 (2)
Kun Z., Yinghong H., Yuchun M., and Zhuang L. (2011). General Application
41
Appendix A
Operations Manual
1. System Requirements
b. 220V Source
d. Broadband
2. Installation Procedures
a. Connect and Install the USB port of the RS232 to USB Port
42
e. Connect the Blocking Sensor connection (two-pin) to its
System.
Control Panel
Registration.
Figure A.1
Control Panel Interface
Figure A.1 shows the Control Panel Interface. This shows the
43
a. Enroll Fingerprint
the user to the database while failed Enrollment will void the
Figure. A.2
Enroll Fingerprint Interface - Form
44
Figure A.3
Enroll Fingerprint Interface Enrollment Successful
Figure A.4
Enroll Fingerprint Interface Error No Name
empty.
45
Figure A.5
Enroll Fingerprint Interface Error No Student Number
Number is empty.
Figure A.6
Enroll Fingerprint Interface Error Wrong Student
Number
46
Figure A.7
Enroll Fingerprint Interface Error Student Number Exists
Figure A.8
Enroll Fingerprint Interface Error Enrollment Failed
47
Figure A.9
Enroll Fingerprint Interface Error Fingerprint Already
Enrolled
b. Delete Fingerprint
Figure A.10
Delete Fingerprint Interface Form
48
Figure A.10 shows Delete Fingerprint Interface. The form
Figure A.11
Delete Fingerprint Interface Form Confirm Delete
delete or No to cancel.
49
Figure A.12
Delete Fingerprint Interface Deletion Cancelled
Figure A.13
Delete Fingerprint Interface Deletion Complete
50
c. View Student Records
Figure A.14
View Student Records Interface
51
d. Guardian Registration
Figure A.15
Guardian Registration Interface Error No Name
is empty.
52
Figure A.16
Guardian Registration Interface Error No Mobile Number
Number is empty.
Figure A.17
Guardian Registration Interface Error Wrong Mobile
Number
53
Figure A.18
Guardian Registration Interface Error No Student
Number
Figure A.19
Guardian Registration Interface Error Wrong Student
Number
54
Figure A.20
Guardian Registration Interface Error Student Number
Already Have a Guardian
Figure A.21
Guardian Registration Interface Registration Successful
55
e. View Guardian Records
Student Number.
Figure A.22
View Guardian Records Interface
56
IN/OUT Display
Figure A.23
IN/OUT Display Not Recognized
Figure A.23 shows the IN/OUT Display interface that shows the
57
Figure A.24
IN/OUT Display User Login
Figure A.24 shows the IN/OUT Display interface that shows the
profile of the student that logged in. It displays the name, student
58
IN/OUT Maintenance
Figure A.25
IN/OUT Maintenance
a. Attendance Logs
59
Figure A.26
Attendance Logs Interface
Figure A.27
SMS Notification Interface
60
Figure A.28
SMS Maintenance Interface
SMS. The Start Activates the broadband to start sending SMS, the
Figure A.29
Error RS232 Cable Missing
61
Figure A.29 shows the error message when RS232 Cable is
driver is not properly updated, or the com port used is not correct.
Solution
design. Connect the Serial port to the design and the USB port
to the PC
62
Appendix B
Pictures of Prototype
Figure B.1
Fingerprint Reader Closed Casing
Figure B.2
Inside Circuits of the Prototype
63
Figure B.3
MCU of the Design
Figure B.4
Minidoor
64
Figure B.5
Automated Doorlock and Blocking Sensor
Figure B.6
Sample Program and Broadband for SMS
65
Bill of Materials
Transformer
1 150 150
220Vac to 12Vac
1 RS232 35 35
2 Relay 25 25
2 Voltage Regulator 15 15
USB to Serial
1 200 200
Cable
1 AC plug 25 25
Bridge type
1 15 15
Rectifier
66
1 Blocking Sensor 105 105
Miscellaneous
(wires, capacitor,
1 300 300
resistors, screw,
etc.)
Figure B.7
Bill of Materials
67
Appendix C
#include <ez8.h>
#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#include "timer0.h"
#include "uart1.h"
#include "getch1.h"
#include "fingerprint.h"
#include "software_delay.h"
#define UART1CHARLEN 20
char loc=1;
char loc_enroll;
char loc_delete;
char enroll;
...
68
Appendix D
(Datasheets)
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
Fingerprint Login System with SMS
Module and Automated Door Lock for
Mapua Institute of Technology
Jomari Jay O. Mariano, Jigxy Jones S. San Pedro, Justin Dane M. Sinnung, Frank Adrian F. Zaragoza
Dionis A Padilla, Adviser
BS in Computer Engineering School of EECE, Mapua Institute of Technology
Abstract The Development of Information The department wants to take a step further with
Technology (DOIT) of Mapua Institute of Technology the log in system of the school which is currently done by
(MIT) always aims for the next step in technology for the the RF ID system. This innovation will cope with the
benefit of the campus. Innovative login system is one of growing number of students as well as provide for the
the targets of the department. This design aims to create an security of the whole campus.
improved login system for Mapua by replacing the RF ID
System with a Fingerprint Scanner. Also, the design adds Customer
the automated doorlock and the SMS capability activated The customer for this design is the DOIT
by the fingerprint. Changing the login requirement from department of Mapua Institute of Technology Intramuros,
the card to the fingerprint as well as the added automated Manila which is headed by Engr. Danillo Tiongco, the
doorlock and SMS will give more security for the whole Senior Deputy for ICT I/O. It is located on the 4th Floor,
campus. Administration Building of Mapa Institute of
Technology, Muralla Street, Intramuros, Manila
Keywords RF ID, Biometric System, Fingerprint Philippines. The DOIT department offers support for the
Scanner, SMS Introduction campus for operations such as Intranet, monitoring of
LAN, laboratory room reservation, on-line requests for
software installation, available software, downloads,
I. INTRODUCTION policies and procedure documents (PAPD), GLIMPSE, E-
learning, ID printing status, network operations manual,
The Mapua Institute of Technology (MIT) is a and IT standard procedure manuals. They have also
renowned school for engineering courses located at provided MIT with services such as the access points or
Muralla Street, Intramuros, Manila. It is the biggest school hotspots for Wi-Fi, Cardinal Plus cards, Smart
of engineering in the Philippines, not only because it has a identification, tech info kiosk, and much more.
lot of enrolled students but also because it offers courses
that are accredited by the Philippine Association of
Colleges and Universities Commision on Accreditation Needs
(PACUCOA). But not only locally is MIT renowned but The DOIT department has been working to enable
internationally as well for having courses recognized by Mapua to keep up with technology, developing software
the Accreditation Board for Engineering and Technology and applied hardware that will help the school give quality
(ABET), thus making MIT a very renowned and reliable service to the students as well as for the students parents
school for engineering. or guardians. It has been thinking of ways to improve such
The Development of Information Technology facilities as the log-in system of the school.
(DOIT) Department of the MIT is responsible for The department wants to try improve the log in
technology innovation in the school premises. Currently, system of Mapua to give better security and reliability for
the log in system of the campus is done through an RF ID the whole campus.
system and a magnetic card reader. The entrance of the The login system of the school is currently done
school must be manned by a security guard who is always through an RF ID system but it cannot be solely relied
actively looking at the login monitor, as unregistered or upon for guards are still needed to attend the entrance
blocked IDs of students identified by the monitor must be looking through everyone trying to log in. Another factor
seen by the guards first before they can block anyone that makes it hard for the guards is that the school does not
unauthorized trying to go in. require the students to wear uniforms. In this type of
92
system there will be some instances that, due to fast Impact
queuing, some may slip past the guard unnoticed even if In terms of the impact of the design on safety and
they have not tapped their ID, or if they do not have their security, this design will allow the parents or guardians to
ID with them, or even if they are using somebody elses know if their children have reached the school premises. In
ID. The department is looking at addressing the security terms of security for the school, the biometric scanner will
lapses of the login system by implementing a system that allow one person and one person alone to access his or her
will give better user verification. own database using their fingerprint, unlike with using the
It is also planning to involve the guardians by old ID system, lost IDs could be used to tap in to the
keeping them informed of their wards whereabouts, at machine even by those who do not own it; also with the
least as far as having reached the Mapua campus is implementation of the door lock, only students can pass
concerned. through the entrance door while the visitors will take
another route to the guard house, making it safer for the
Solution students inside the campus by preventing strangers from
The idea is to enhance the log in system of the entering easily the school premises without the guards
school using a biometric system and use a GSM module to knowing it. In terms of sustainability, the biometric log-in
send messages of the individuals to their respective parents system with GSM is fairly easy to maintain; aside from
or guardians and add an automated door lock to separate maintaining the load for the GSM to send SMS, it will be
the enrolled students from those who are only visitors or easy to use.
outsiders. The integration of the login system aims to
create an alternative system for the campus which will give Constraints
better security and will greatly improve the speed of The constraints of the design is that the students
authorization, thus avoiding long queues. who would only log in with their fingerprints and would
The standard login system uses verification to not go inside the campus will not be detected by the
detect who the user is; in verification the user will tell the system, which means that a student can log in and leave
system who they are and the system will verify if they after fingerprint reading, which will still send an SMS
truly are who they claim to be, but in a biometric system message to their guardians stating that they have arrived at
such as the fingerprint scanner the login system will be the campus vicinity but will not send information if they
turned to an identification system in which the system will really went in or not.
tell who the user is when the user presents a unique As well as with the automated door lock, the
physical identity such as the fingerprint which one and trigger will only activate the lock if the door shuts from
only one user has. With this innovation the login system open to closed which means that if the door does not close
will be more reliable and the work load will be lessened at all before the second user enters, the door will only
for the manning guards, since the user identification will count the two users as one user and will not lock.
be done by the system, and identification errors will be The design will not remove the guards from their
eliminated. work; the intention of the design is to give greater role to
Using a GSM module, SMS messages can be the system and make it more reliable by shifting the login
sent to the registered mobile phone numbers registered for system to identification. This will make the design do the
each student; this will allow their guardians to know if the work of identifying the people entering the campus while
students have reached the campus premises. For added the guards will monitor the device.
security, an automated doorlock system can be added to As to the economics, this design will be costly to
prevent any forced entrance and to filter those enrolled implement, but on the long term this will be more cost
from those who are not. effective as additional students would not require any
additional login equipment such as the RF ID cards, thus
Objective minimizing costs.
The design aims to combine a fingerprint scanner
with a GSM Module and an automated door lock to create
an alternative log in system for the campus. Differentiation
to create a system with better The technology used by most schools and
security by implementing an universities for identification is RF ID. This kind of
identification system and an technology is already old fashioned and some researchers
automated door lock for the have proven that RFID tags are relatively easy to exploit in
entrance. a number of cases. The proposed solution of the designers
to notify the guardians of their is to implement a system that will use biometrics to
students arrival at the campus. identify individuals. Using fingerprints as a means of
to minimize the delay of identification adds more security features as compared to
processing speed even with the use of radiofrequencies. Also the cost of producing
heightened security. RFID tags is still very expensive, whereas in biometrics
only ones fingers are needed for identification.
As an added feature SMS notification will be
incorporated into the login system. This will assure the
93
guardian/s of the students that they have arrived at the biometric doorlock system could be a cost saver instead of
school premises. The hardware to be used in implementing being an additional cost for the school. The idea of having
the notification is a GSM module. This technology will digital keys for anyone or everyone rather than distributing
give real-time information whenever it is needed. The use physical keys could be more cost efficient, aside from the
of the GSM system is selected as the communication security that it gives as physical keys could be stolen or
medium because it can serve many users at the same time passed on without knowledge of the authenticators.
without the need to add another set of this equipment.
On the Operational Quality of Fingerprint Scanners,
The automated gate is an added security feature Authentication of Fingerprint Scanners, and
before one can enter the institution. It will be custom made Estimating Image Focusing in Fingerprint Scanners
by the designers in accordance in the needs of the Also, Cappelli et al. (2008), Ivanov and Baras
customer. The gates will be installed for registered persons (2011), and Ferrara et al. (2007) show that fingerprint
and will not open for visitors or unregistered entrants. scanners are not 100% accurate. There are some cases and
Doors will be attached to a motor that is controlled by a certain factors that should be taken into consideration
microcontroller interfaced to a computer where the when using the scanner. These articles showed the test
fingerprint reader is also connected. results and adjustments needed for a better and more
reliable finger print scanner such as creating better image
Benefits focusing for the scanner when it converts the detected
This design will benefit both the institution and fingerprint to its digital form and increasing the frequency
the guardians of the students. of the scanner that depends from finger to finger.
The institution will benefit from such a design,
for this will give better security to the school and its Doorlock Security with GSM Alert Messaging
students. This will also improve the quality level of the Martinez, et al., (date) was also used as a
school for having advanced technology in its login system. reference to use the GSM module in part of the proposed
The students guardians will also benefit from the system, as well as the use of a sensor with the doorlock.
SMS capability of the design, as this will give them the Their design involves a passive sensor that will trigger the
assurance that their children or wards have reached the GSM when activated and the active sensor at the door to
school premises. lock once the alarm is triggered. This article was been
useful in understanding how to implement the GSM on the
proposed design as well as the use of sensors for the door
lock.
II. REVIEW OF RELATED DESIGN LITERATURES AND
STUDIES How Fingerprint Scanners Work
Fingerprint scanners have many functions such as
This chapter shows the review of related research the registration, verification, and deletion of fingerprint
for the development of the design. The following articles data. Operations start with the registration of the data
helped the group to further understand the project. needed to be stored; to enrol, the user must place his
Biometric systems such as fingerprint scanners thumb at the scanner three times (once after a few seconds
are widely used to make more secure login systems. Other delay) and have a specific fingerprint number incorporated
security systems such as the RF ID are verification type with the digital image to be stored. This assigned
systems wherein the user will have to verify his/her fingerprint scanner will be used to link the fingerprint with
identity by tapping the card on the reader, regardless of the pool of data from the database upon compilation. After
who really owns the tapped card. Fingerprint scanners are registration is done, the verification function can be used.
an identification type system which uses the fingerprint as Verification mode will allow the fingerprint scanner to
a specific authenticator to identify the user from the compare the currently scanned fingerprint image to its
database stored in the system; this makes biometric database of digital fingerprint images. If it finds a match, it
systems much more reliable and secure compared to the will return a value equal to the assigned fingerprint
RF ID system. number, else it will return a value of 0. The deletion
function will delete stored fingerprint values and images
A Door-Opening System Using a Low-Cost from the memory of the fingerprint scanner, to delete the
Fingerprint Scanner and a PC data stored it requires either the actual fingerprint image to
A related article from A&E Systems Magazine delete or the fingerprint number assigned.
(August, 2004) shows how to create a low cost security
system with a fingerprint scanner and a PC that can There are limitations of a fingerprint scanner, namely,
emulate a standalone security fingerprint embedded one and only one data of the same fingerprint image can be
device. This design was created to help improve schools saved by a person because no two persons can have the
security in their laboratories. It was designed to allow same fingerprint, which makes it unique. This results in
students to enter the premises of a laboratory at the time failure of enrolment if a person tries to enrol after already
they need and prevent them from entering outside their being enrolled. Also fingerprint image comparison cannot
laboratory hours. The article concluded that creating a be 100% efficient due to some factors such as very dry
94
skin, finger position, unwanted particles on the finger,
scars or any form of fingerprint deformation, and any MCU Flowchart
factor that will alter image capturing by the fingerprint
scanner. This will result in the fingerprint being START
unidentified even though it has been enrolled; in which
case one should simply try again and make sure that the MCU Flowchart
Hardware Development No
Block Diagram If m =
Yes DELETE FP; A
DELETE
No
No OPEN DOOR;
No
If
loc is not Yes SENDUART(loc); A
empty
95
6 Success n/a n/a
BIOMETRIC FINGERPRINT READER 7 Success n/a n/a
The biometric fingerprint reader used by the 8 Fail Success n/a
designer is a development kit module with a digital signal 9 Success n/a n/a
processing (DSP) controller, Texas TMS320VC5416, for 10 Success n/a n/a
faster image acquisition. The DSP also makes for easy Rough Thumb Condition Accuracy Test
integration with Zilog Z8F1601. A logic level-UART
Serial (TTL) is the I/O communication for the Shows that a clean and slightly rough finger will
microcontroller. Rate of detection is less than 1 second have a good to high rate of accuracy using the fingerprint
with a 0.00001% false/failed recognition. scanner. According to the tests only two trials were needed
for the second attempt to verify the fingerprint while the
GSM MODULE rest only required one.
The Global System for Mobile Communication
(GSM) module was a HUAWEI E220 which is a HSDPA Finger is Smooth (washed with soap or with lotion)
access device modem. The module used a USB interface Fingerprint First Second Third
(USB modem) which was remotely attached to a different # Attempt Attempt Attempt
personal computer (PC) that will process the SMS 1 Fail Fail Fail
notification. Universal Mobile Telecommunications
2 Fail Success n/a
System (UMTS) is the mobile cellular technology for a
3 Fail Fail Fail
network based on the GSM Standard. With this set of
standards an original design was developed for the modem 4 Fail Fail Success
and utilizing it for sending SMS. 5 Fail Fail Fail
6 Fail Fail Fail
7 Fail Fail Success
8 Fail Success n/a
IV. TESTING, PRESENTATION, AND INTERPRETATION 9 Fail Fail Fail
OF DATA 10 Fail Fail Success
Smooth Thumb Condition Accuracy Test
This chapter shows the different tests done to
show how the design worked, as well as other tests to Shows that no trial was able to be read at the first
show the projects capabilities or performance. attempt, only two were able to be read at the second
attempt, three were read at the third attempt, and the rest
were not able to be read even after three attempts.
Thumb Condition Accuracy Test Therefore having a smooth finger by washing with soap or
One important factor to ensure when using the using lotion will cause the fingerprint scanner to read the
fingerprint scanner is the accuracy rate or the detection rate fingerprint with rates from average to low.
of the fingerprint. Knowing how to get high accuracy
fingerprint detection will surely speed up the processes
using the system. The fingerprint scanners ability to read Fingerprint is Deformed (any means of changing the
the fingerprint will differ from one fingerprint to another. fingerprint registered such as skin peeling, or any small
The following table will show how finger condition will foreign particles)
affect the fingerprint scanners accuracy.
Fingerprint First Second Third
The following tests were conducted with 10 users and # Attempt Attempt Attempt
three attempts were made or until the process succeeded. 1 Fail Fail Fail
Only a maximum of three attempts were given, for 2 Fail Fail Fail
attempts that reached more than three indicated bad
3 Fail Fail Fail
accuracy. The following table shows the results for the
test. 4 Fail Fail Fail
5 Fail Fail Fail
6 Fail Fail Fail
Finger is Clean, Rough (washed with water) 7 Fail Fail Fail
8 Fail Fail Fail
Fingerprint First Second Third 9 Fail Fail Fail
# Attempt Attempt Attempt 10 Fail Fail Fail
1 Success n/a n/a
Deformed Fingerprint Accuracy Test
2 Fail Success n/a
3 Success n/a n/a Shows that no attempts from any trial was
4 Success n/a n/a successful even after the third trial with a deformed
5 Success n/a n/a fingerprint. This shows that a deformed fingerprint (that
96
will alter the fingerprint in anyway) will cause the
fingerprint scanner accuracy to be bad or very, very low if Recommendations
not impossible to be read. In the near future, better fingerprint scanners will
be released, which will increase image focusing and digital
Test Summary and Comparison image conversion, which are musts in giving the design
Results from tables show that fingerprint accuracy more reliability, accuracy and speed.
will also vary with fingerprint conditions. From the said Also a better doorlock system that could be
tests they show that the fingerprint that is clean and implemented is suggested such as using a magnetic lock.
slightly rough will have the best chance, or the highest Also the sensors could be upgraded to detect entrants or
accuracy rate for the fingerprint scanner. Therefore under the door could be upgraded with the turnstile type of door.
operating conditions, a clean and slightly rough finger is
the most advisable or recommended fingerprint condition.
REFERENCES
V. CONCLUSION AND RECOMMENDATION
This chapter shows the important findings of the team Baras J., and Ivanov V. (2011). Authentication of
with their design. It shows what the researchers have Fingerprint Scanners. Institute for Systems
concluded in the development of the project as well as any Research, University of Maryland, College Park,
recommendation for improvements of the design. MD 20742, USA IEEE
97