SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34
www.ijera.com 31|P a g e
Intellectual Bank Locker Security System
S.V.Tejesvi*, P.Sravani*, M.L.Mythili*, K.Jayanthi*, P.Nagesh Kumar*,
K.Balavani**
*(Final year student, Department of Electronics and communication engineering, Bapatla Engineering College,
Bapatla, Affiliated to Acharya Nagarjuna University, Andhra Pradesh, India)
**(Assistant Professor, Department of Electronics and communication engineering, Bapatla Engineering
College, Bapatla, Affiliated to Acharya Nagarjuna University, Andhra Pradesh, India)
ABSTRACT
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Keywords: Fingerprint, GSM, Microcontroller, PIR sensors, Vibration sensor.
I. INTRODUCTION
In this present scenario, safety has become an
essential issue for most of the people. Increase in anti
social activities is a cause of concern as the banks are
considered soft targets by criminal. Increasing
incidence of crimes against banks has necessitated a
serious re-look at the security arrangements and
guidelines followed by the banks. The prevailing
crime scenario demands compatible, efficient and
reliable security and safety measures. In order to
overcome this type of frauds, authentication of the
person who wants to use the locker is very important.
In the ubiquitous network society, where individuals
can easily access their information anytime and
anywhere, people are also faced with the risk that
others can easily access the same information anytime
and anywhere. Because of this risk, personal
identification technology, which can distinguish
between registered legitimate users and imposters, is
now generating interest.
Currently, passwords, Personal Identification
Numbers or identification cards are used for personal
identification. However, cards can be stolen, and
passwords and numbers can be guessed or forgotten.
To provide perfect security and to make our work
easier, we are taking the help of two different
technologies viz. embedded systems and biometrics.
To solve these problems, biometric authentication
technology which identifies people by their unique
biological information is attracting attention.
Biometrics can be defined as recognizing and
identifying a person based on physiological or
behavioral characteristics. Biometrics commonly
includes fingerprint, face, iris, voice, signature, and
geometry recognition and verification.
In this project, we provide two level security by
fingerprint authentication and GSM. GSM provide
one time password which changes for every access
and gives high security. By this two level automated
security system we can not only provide security but
also save the time of both banker and the customer.
II. RELATED WORKS
In this section some related works are discussed
below. In most of the banks, the locker systems
involve manual lock. The major drawbacks of such
manual lock systems are lack of security and the
waiting time of the customers. This can be overcome
by automatic locker system. There are many
techniques in which this can be implemented. In our
project we are using fingerprint and GSM
technology.
2.1 Microcontroller
The AT89S52 is a low-power, high-performance
CMOS 8-bit micro controller. It provides a highly
flexible and cost-effective solution to many
embedded control applications. It has 256 bytes of
internal RAM and 32 Programmable I/O Lines.
2.2 Fingerprint
In this technology one’s finger is the key i.e.,
one’s fingerprints are used as the “PASSWORD” for
identification and verification. Fingerprint technology
was developed by Fujitsu to help combat the
increasing incidence of financial fraud and forgery.
RESEARCH ARTICLE OPEN ACCESS
S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34
www.ijera.com 32|P a g e
Among these biometric traits, fingerprint proves to be
one of the best traits providing good mismatch ratio,
highly accurate in terms of security and also reliable.
2.3 GSM
GSM (Global System for Mobile
communications) is a cellular network, which means
that mobile phones connect to it by searching for
cells in the immediate vicinity. GSM networks
operate in four different frequency ranges. Most
GSM networks operate in the 900 MHz or 1800 MHz
bands. Some countries in the American continents
use the 850 MHz and 1900 MHz bands because the
900 and 1800 MHz frequency bands were already
allocated. The rarer 400 and 450 MHz frequency
bands are assigned in some countries, where these
frequencies were previously used for first-generation
systems.
2.3.1 GSM Advantages
GSM pioneered a low-cost, to the network
carrier, alternative to voice calls, the Short message
service which is now supported on other mobile
standards as well.
Fig.(1): GSM
2.4 PIR sensors
A PIR-based motion detector is used to sense
movement of people, animals, or other objects. They
are commonly used in burglar alarms and
automatically-activated lighting systems. They are
called simply "PIR", or sometimes "PID", for
“passive infrared detector”.
2.5 IR sensors (IR LED pair)
In this IR LED pair, one LED is a transmitter IR
LED and it will transmit infrared light which is not
visible to human eye, and the other LED is a photo
diode or IR receiver LED. When a person breaks the
infrared beam, it triggers the alarm.
Fig.(2): IR LED pair
2.6 Vibration sensor
Vibration sensor is a device that uses the
piezoelectric effect, to measure changes in pressure,
acceleration, temperature, strain, or force by
converting them to an electrical charge. The vibration
sensor is placed on the locker door. It triggers the
alarm when any pressure is applied on the locker to
open it forcibly.
Fig.(3): Vibration sensor
III. PROPOSED SYSTEM
3.1 Block Diagram
Fig.(4): Block diagram
3.1.1 Block Diagram Description
The power required to the microcontroller (5V)
is given through the power supply. MAX232
interfaces the microcontroller with fingerprint and
GSM. Fingerprint and GSM modules are connected
to MAX232 using relay. MAX232 converts signals
from an RS-232 serial port to signals suitable for use
in TTL compatible digital logic circuits. This reduces
the complexity of the power supply design. The
above diagram shows that various components like
keypad, sensors, LCD, buzzer are connected to
S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34
www.ijera.com 33|P a g e
microcontroller. The L293D driver provides the
required power to the motor to open the locker door.
3.2 Working
1. Registration of the users is done by taking the
required information of the user. The fingerprints
used in authentication are taken and are stored
in the database.
2. The primary authentication is done by using
fingerprint i.e.; the fingerprint is matched with
those in the database.
3. The further instructions are given clearly on the
LCD display.
4. A Onetime password (OTP) is sent to the
corresponding mobile number in the data base
through GSM service.
5. Enter the OTP through the keypad.
6. The locker can be accessed after all the security
checks are passed correctly and the locker door
is opened automatically.
7. After the work has been completed if any key is
pressed with help of keypad, the locker door will
be closed.
NOTE: If any attempt is made to open the locker
forcibly by applying external pressure, then the
vibration sensor placed in locker sends an alarming
sound.
PIR sensor and IR sensors are activated during
night times to identify any person entering the
premises. These also alert the security by an alarm
sound. Here two sensors are used to reduce the false
alarm.
3.3 Flow chart
Fig.(5): Flow chart
3.4 SOFTWARE PROGRAM TESTING
The Keil software is a compiler and debugger
use to compile C code, assembly source files, link
and locate object modules and libraries, create HEX
files, and debug your target program. The software
program is written in c or assembly language and
compiled using keil software. After compiler
operation the hex code is generated and stored in the
computer. The hex code of the program is burnt into
the AT89S52 by using Top win Universal
programmer.
IV. ADVANTAGES
 Fully automated system.
 Easy to use and requires no special training or
equipment.
 Fingerprint is unique for every person it cannot
be imitated or fabricated. It is not same in the
case of twins also. Thus gives a high level
security.
 No need to remember passwords, or bring any
identification cards.
V. CONCLUSION
It can be concluded here that the system has been
successfully implemented and the aim is achieved
without any deviations. A step by step approach is
used in designing the microcontroller based system
for providing the security to the locker system. This
project is mainly aimed at reducing banker’s
workload. Time is considerably saved by this
automated bank locker system as there is no need for
any authentication by the bank employee. We can
also reduce larceny in banks by providing full
security to it. This system can be applied mainly in
banks and automatic door opening and locking
systems. The limitation is that it can be used for
specific purpose only. This concept can be extended
further by using voice feedback system.
VI. Acknowledgements
We would like to thank our guide Mrs.
K.Balavani, Asst. professor, for her technical
guidance, motivation and valuable support
throughout the work.
We would like to express our sincere and
profound gratitude to Dr. B. Chandra Mohan, HOD
of Electronics and communication Department and
Dr. N. Sudhakar, Principal of Bapatla Engineering
College, Bapatla, for their support, encouragement
and also a great source of inspiration to our work.
REFERENCES
[1] Pavithra.B.C, Myna.B.C, Kavyashree.M,
Fingerprint based bank locker system using
microcontroller, Proceedings of IRF
International Conference, 05th
April-2014,
S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34
www.ijera.com 34|P a g e
Pondicherry, India, ISBN: 978-93-82702-
71-9
[2] Swetha J, RFID based automated bank
locker system, IJRET: International Journal
of Research in Engineering and Technology.
Volume: 03, Issue: 05, May-2014,eISSN:
2319-1163 | pISSN: 2321-7308, Available
@ http://www.ijret.org
[3] Gaurav Chavan, Sourabh Dabke, Anup
Ghandghe, Mrs.K.A.Musale, Bank locker
security system using android application,
International Research Journal of
Engineering and Technology (IRJET)
Volume: 02 Issue: 01 | Apr-2015, e-ISSN:
2395 -0056, p-ISSN: 2395-0072.
[4] Aruna.D.Mane1 and SirkaziMohd Arif2,
Locker Security System Using RFID and
GSM Technology‖, International journal of
Scientific and Technology Research, Volume
4, Issue 07, JULY 2015.
[5] Raghu Ram.Gangi, Subhramanya
Sarma.Gollapudi, Locker opening and
closing system using RFID, fingerprint,
password and GSM, International Journal
of Emerging Trends & Technology in
Computer Science (IJETTCS), Volume 2,
Issue 2, March – April 2013 ISSN 2278-
68:56, Web Site: www.ijettcs.org Email:
editor@ijettcs.org, editorijettcs@gmail.com
[6] Sagar S .Palsodkar, Prof S.B. Patil, Bank
Lockers Security System using Biometric
and GSM Technology, SSRG International
Journal of Electronics and Communication
Engineering (SSRG-IJECE) – Volume 2,
Issue 4–April 2015, ISSN: 2348 – 8549.
[7] Tutorial on microcontroller: www.8051pro
jects.net/microcontroller_tutorials/
[8] Tutorial on LCD: wwws.8051projects.net/
lcd-interfacing/
[9] https://en.wikipedia.org/wiki/Piezoelectric_s
ensor
[10] http://www.ventor.co.in/ir-sensors-c-
34_32/infra-red-ir-led-trnsmitter-receiver-
pair-p-124/

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET Journal
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Biometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoBiometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoIRJET Journal
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security SystemIRJET Journal
 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET Journal
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door SystemIRJET Journal
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSMIRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET Journal
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET Journal
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iotChintan Patel
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET Journal
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain ProxyIRJET Journal
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)IAESIJEECS
 

Was ist angesagt? (19)

IRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic SystemIRJET- Review on IoT based Dual ARM Tele-Robotic System
IRJET- Review on IoT based Dual ARM Tele-Robotic System
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Biometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on ArduinoBiometric Identification using Opencv Based on Arduino
Biometric Identification using Opencv Based on Arduino
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
 
IRJET - Raspberry Pi based Intelligent Security System
IRJET -  	  Raspberry Pi based Intelligent Security SystemIRJET -  	  Raspberry Pi based Intelligent Security System
IRJET - Raspberry Pi based Intelligent Security System
 
IRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting SystemIRJET- IoT based Smart Voting System
IRJET- IoT based Smart Voting System
 
IRJET - Smart Door System
IRJET - Smart Door SystemIRJET - Smart Door System
IRJET - Smart Door System
 
IRJET- RFID Based Security Guard System using GSM
IRJET-  	  RFID Based Security Guard System using GSMIRJET-  	  RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
IRJET - Home Appliance Controlling and Monitoring by Mobile Application based...
 
1 importance of light weight authentication in iot
1 importance of light weight authentication in iot1 importance of light weight authentication in iot
1 importance of light weight authentication in iot
 
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
IRJET - Survey on Smart System for Non Smart Devices using Raspberry PI3b & G...
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
IRJET -  	  Securing Communication among IoT Devices using Blockchain ProxyIRJET -  	  Securing Communication among IoT Devices using Blockchain Proxy
IRJET - Securing Communication among IoT Devices using Blockchain Proxy
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)38 9145 it nfc secured offline password storage (edit lafi)
38 9145 it nfc secured offline password storage (edit lafi)
 

Andere mochten auch

Bank locker system
Bank locker systemBank locker system
Bank locker systemRahul Wagh
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
 
Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)
Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)
Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)rafaelbentin
 
Burpee Gardens logo usage
Burpee Gardens logo usageBurpee Gardens logo usage
Burpee Gardens logo usageLisa Mercurio
 
Cronograma de bimestrales i per+ìodo. propuesta
Cronograma de bimestrales i per+ìodo. propuestaCronograma de bimestrales i per+ìodo. propuesta
Cronograma de bimestrales i per+ìodo. propuestaAnderson Osorio
 
0319研習會簡章
0319研習會簡章0319研習會簡章
0319研習會簡章藍 藍
 
Effective utilization of crusher dust in sustainable concrete
Effective utilization of crusher dust in sustainable concreteEffective utilization of crusher dust in sustainable concrete
Effective utilization of crusher dust in sustainable concreteIJERA Editor
 
Fruits and names picture sheet
Fruits and names picture sheetFruits and names picture sheet
Fruits and names picture sheetTamilgod.org
 
MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...
MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...
MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...IJERA Editor
 
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy NumberSolving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy NumberIJERA Editor
 
Computational modelling of six speed hybrid gear box and its simulation using...
Computational modelling of six speed hybrid gear box and its simulation using...Computational modelling of six speed hybrid gear box and its simulation using...
Computational modelling of six speed hybrid gear box and its simulation using...IJERA Editor
 
Normal particular autorizada
Normal particular autorizadaNormal particular autorizada
Normal particular autorizadamarlene zavaleta
 
Identification and Classification of Leaf Diseases in Turmeric Plants
Identification and Classification of Leaf Diseases in Turmeric PlantsIdentification and Classification of Leaf Diseases in Turmeric Plants
Identification and Classification of Leaf Diseases in Turmeric PlantsIJERA Editor
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technologytheijes
 
Ec & tc project list (1)
Ec & tc project list (1)Ec & tc project list (1)
Ec & tc project list (1)annarayasn
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker systemeSAT Publishing House
 

Andere mochten auch (20)

Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)
Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)
Expresate IE - Actividad que disfrutas realizar (Rafael Bentín Arens)
 
Burpee Gardens logo usage
Burpee Gardens logo usageBurpee Gardens logo usage
Burpee Gardens logo usage
 
Grimm NASP Poster
Grimm NASP PosterGrimm NASP Poster
Grimm NASP Poster
 
Cronograma de bimestrales i per+ìodo. propuesta
Cronograma de bimestrales i per+ìodo. propuestaCronograma de bimestrales i per+ìodo. propuesta
Cronograma de bimestrales i per+ìodo. propuesta
 
0319研習會簡章
0319研習會簡章0319研習會簡章
0319研習會簡章
 
Effective utilization of crusher dust in sustainable concrete
Effective utilization of crusher dust in sustainable concreteEffective utilization of crusher dust in sustainable concrete
Effective utilization of crusher dust in sustainable concrete
 
Fruits and names picture sheet
Fruits and names picture sheetFruits and names picture sheet
Fruits and names picture sheet
 
MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...
MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...
MHD Free Convection from an Isothermal Truncated Cone with Variable Viscosity...
 
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy NumberSolving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
Solving Fuzzy Maximal Flow Problem Using Octagonal Fuzzy Number
 
Computational modelling of six speed hybrid gear box and its simulation using...
Computational modelling of six speed hybrid gear box and its simulation using...Computational modelling of six speed hybrid gear box and its simulation using...
Computational modelling of six speed hybrid gear box and its simulation using...
 
Normal particular autorizada
Normal particular autorizadaNormal particular autorizada
Normal particular autorizada
 
Identification and Classification of Leaf Diseases in Turmeric Plants
Identification and Classification of Leaf Diseases in Turmeric PlantsIdentification and Classification of Leaf Diseases in Turmeric Plants
Identification and Classification of Leaf Diseases in Turmeric Plants
 
Ppt
PptPpt
Ppt
 
B.TECH/M.TECH EMBEDDED IEEE PROJECTS
B.TECH/M.TECH EMBEDDED IEEE PROJECTSB.TECH/M.TECH EMBEDDED IEEE PROJECTS
B.TECH/M.TECH EMBEDDED IEEE PROJECTS
 
washington_CV INDST1
washington_CV INDST1washington_CV INDST1
washington_CV INDST1
 
Design of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid TechnologyDesign of Banking Security System Using Mems And Rfid Technology
Design of Banking Security System Using Mems And Rfid Technology
 
Ec & tc project list (1)
Ec & tc project list (1)Ec & tc project list (1)
Ec & tc project list (1)
 
Rfid based automated bank locker system
Rfid based automated bank locker systemRfid based automated bank locker system
Rfid based automated bank locker system
 

Ähnlich wie Intellectual Bank Locker Security System

finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...IRJET Journal
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoTIRJET Journal
 
Iot based low cost smart locker security system
Iot based low cost smart locker security systemIot based low cost smart locker security system
Iot based low cost smart locker security systemIJARIIT
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...IRJET Journal
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...IRJET Journal
 
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationHome Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationIRJET Journal
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockIRJET Journal
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eyeijtsrd
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityIRJET Journal
 

Ähnlich wie Intellectual Bank Locker Security System (20)

finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
An Advanced Automatic Wireless Monitoring & Controlling for Digital Door Lock...
 
IRJET- Theft Control using IoT
IRJET-  	  Theft Control using IoTIRJET-  	  Theft Control using IoT
IRJET- Theft Control using IoT
 
Iot based low cost smart locker security system
Iot based low cost smart locker security systemIot based low cost smart locker security system
Iot based low cost smart locker security system
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...IRJET -  	  Safety and Security Aspects of Smart Home Applications using Face...
IRJET - Safety and Security Aspects of Smart Home Applications using Face...
 
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...IRJET-  	  Smart Security System in Homes using Simple Internet of Things Ena...
IRJET- Smart Security System in Homes using Simple Internet of Things Ena...
 
Home Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram ApplicationHome Security System using ESP32-CAM and Telegram Application
Home Security System using ESP32-CAM and Telegram Application
 
IRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: ReviewIRJET- Home Automation using IoT: Review
IRJET- Home Automation using IoT: Review
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
journal
journaljournal
journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
ESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door LockESP32 CAM Face Detection Door Lock
ESP32 CAM Face Detection Door Lock
 
IJISET_V2_I6_90
IJISET_V2_I6_90IJISET_V2_I6_90
IJISET_V2_I6_90
 
The Invisible Eye
The Invisible EyeThe Invisible Eye
The Invisible Eye
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
Raspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home SecurityRaspberry Pi Based Surveillance Robot for Home Security
Raspberry Pi Based Surveillance Robot for Home Security
 

Kürzlich hochgeladen

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 

Kürzlich hochgeladen (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 

Intellectual Bank Locker Security System

  • 1. S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34 www.ijera.com 31|P a g e Intellectual Bank Locker Security System S.V.Tejesvi*, P.Sravani*, M.L.Mythili*, K.Jayanthi*, P.Nagesh Kumar*, K.Balavani** *(Final year student, Department of Electronics and communication engineering, Bapatla Engineering College, Bapatla, Affiliated to Acharya Nagarjuna University, Andhra Pradesh, India) **(Assistant Professor, Department of Electronics and communication engineering, Bapatla Engineering College, Bapatla, Affiliated to Acharya Nagarjuna University, Andhra Pradesh, India) ABSTRACT In today's modern world, security plays an important role. Every person has precious accessories like gold, documents or cash. The main goal of this project is to design and implement a bank locker security system based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and provides advanced security. In this system, only authentic persons can recover money or accessories from bank locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches, then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The sensors will be active during night times to provide security against thefts. Keywords: Fingerprint, GSM, Microcontroller, PIR sensors, Vibration sensor. I. INTRODUCTION In this present scenario, safety has become an essential issue for most of the people. Increase in anti social activities is a cause of concern as the banks are considered soft targets by criminal. Increasing incidence of crimes against banks has necessitated a serious re-look at the security arrangements and guidelines followed by the banks. The prevailing crime scenario demands compatible, efficient and reliable security and safety measures. In order to overcome this type of frauds, authentication of the person who wants to use the locker is very important. In the ubiquitous network society, where individuals can easily access their information anytime and anywhere, people are also faced with the risk that others can easily access the same information anytime and anywhere. Because of this risk, personal identification technology, which can distinguish between registered legitimate users and imposters, is now generating interest. Currently, passwords, Personal Identification Numbers or identification cards are used for personal identification. However, cards can be stolen, and passwords and numbers can be guessed or forgotten. To provide perfect security and to make our work easier, we are taking the help of two different technologies viz. embedded systems and biometrics. To solve these problems, biometric authentication technology which identifies people by their unique biological information is attracting attention. Biometrics can be defined as recognizing and identifying a person based on physiological or behavioral characteristics. Biometrics commonly includes fingerprint, face, iris, voice, signature, and geometry recognition and verification. In this project, we provide two level security by fingerprint authentication and GSM. GSM provide one time password which changes for every access and gives high security. By this two level automated security system we can not only provide security but also save the time of both banker and the customer. II. RELATED WORKS In this section some related works are discussed below. In most of the banks, the locker systems involve manual lock. The major drawbacks of such manual lock systems are lack of security and the waiting time of the customers. This can be overcome by automatic locker system. There are many techniques in which this can be implemented. In our project we are using fingerprint and GSM technology. 2.1 Microcontroller The AT89S52 is a low-power, high-performance CMOS 8-bit micro controller. It provides a highly flexible and cost-effective solution to many embedded control applications. It has 256 bytes of internal RAM and 32 Programmable I/O Lines. 2.2 Fingerprint In this technology one’s finger is the key i.e., one’s fingerprints are used as the “PASSWORD” for identification and verification. Fingerprint technology was developed by Fujitsu to help combat the increasing incidence of financial fraud and forgery. RESEARCH ARTICLE OPEN ACCESS
  • 2. S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34 www.ijera.com 32|P a g e Among these biometric traits, fingerprint proves to be one of the best traits providing good mismatch ratio, highly accurate in terms of security and also reliable. 2.3 GSM GSM (Global System for Mobile communications) is a cellular network, which means that mobile phones connect to it by searching for cells in the immediate vicinity. GSM networks operate in four different frequency ranges. Most GSM networks operate in the 900 MHz or 1800 MHz bands. Some countries in the American continents use the 850 MHz and 1900 MHz bands because the 900 and 1800 MHz frequency bands were already allocated. The rarer 400 and 450 MHz frequency bands are assigned in some countries, where these frequencies were previously used for first-generation systems. 2.3.1 GSM Advantages GSM pioneered a low-cost, to the network carrier, alternative to voice calls, the Short message service which is now supported on other mobile standards as well. Fig.(1): GSM 2.4 PIR sensors A PIR-based motion detector is used to sense movement of people, animals, or other objects. They are commonly used in burglar alarms and automatically-activated lighting systems. They are called simply "PIR", or sometimes "PID", for “passive infrared detector”. 2.5 IR sensors (IR LED pair) In this IR LED pair, one LED is a transmitter IR LED and it will transmit infrared light which is not visible to human eye, and the other LED is a photo diode or IR receiver LED. When a person breaks the infrared beam, it triggers the alarm. Fig.(2): IR LED pair 2.6 Vibration sensor Vibration sensor is a device that uses the piezoelectric effect, to measure changes in pressure, acceleration, temperature, strain, or force by converting them to an electrical charge. The vibration sensor is placed on the locker door. It triggers the alarm when any pressure is applied on the locker to open it forcibly. Fig.(3): Vibration sensor III. PROPOSED SYSTEM 3.1 Block Diagram Fig.(4): Block diagram 3.1.1 Block Diagram Description The power required to the microcontroller (5V) is given through the power supply. MAX232 interfaces the microcontroller with fingerprint and GSM. Fingerprint and GSM modules are connected to MAX232 using relay. MAX232 converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. This reduces the complexity of the power supply design. The above diagram shows that various components like keypad, sensors, LCD, buzzer are connected to
  • 3. S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34 www.ijera.com 33|P a g e microcontroller. The L293D driver provides the required power to the motor to open the locker door. 3.2 Working 1. Registration of the users is done by taking the required information of the user. The fingerprints used in authentication are taken and are stored in the database. 2. The primary authentication is done by using fingerprint i.e.; the fingerprint is matched with those in the database. 3. The further instructions are given clearly on the LCD display. 4. A Onetime password (OTP) is sent to the corresponding mobile number in the data base through GSM service. 5. Enter the OTP through the keypad. 6. The locker can be accessed after all the security checks are passed correctly and the locker door is opened automatically. 7. After the work has been completed if any key is pressed with help of keypad, the locker door will be closed. NOTE: If any attempt is made to open the locker forcibly by applying external pressure, then the vibration sensor placed in locker sends an alarming sound. PIR sensor and IR sensors are activated during night times to identify any person entering the premises. These also alert the security by an alarm sound. Here two sensors are used to reduce the false alarm. 3.3 Flow chart Fig.(5): Flow chart 3.4 SOFTWARE PROGRAM TESTING The Keil software is a compiler and debugger use to compile C code, assembly source files, link and locate object modules and libraries, create HEX files, and debug your target program. The software program is written in c or assembly language and compiled using keil software. After compiler operation the hex code is generated and stored in the computer. The hex code of the program is burnt into the AT89S52 by using Top win Universal programmer. IV. ADVANTAGES  Fully automated system.  Easy to use and requires no special training or equipment.  Fingerprint is unique for every person it cannot be imitated or fabricated. It is not same in the case of twins also. Thus gives a high level security.  No need to remember passwords, or bring any identification cards. V. CONCLUSION It can be concluded here that the system has been successfully implemented and the aim is achieved without any deviations. A step by step approach is used in designing the microcontroller based system for providing the security to the locker system. This project is mainly aimed at reducing banker’s workload. Time is considerably saved by this automated bank locker system as there is no need for any authentication by the bank employee. We can also reduce larceny in banks by providing full security to it. This system can be applied mainly in banks and automatic door opening and locking systems. The limitation is that it can be used for specific purpose only. This concept can be extended further by using voice feedback system. VI. Acknowledgements We would like to thank our guide Mrs. K.Balavani, Asst. professor, for her technical guidance, motivation and valuable support throughout the work. We would like to express our sincere and profound gratitude to Dr. B. Chandra Mohan, HOD of Electronics and communication Department and Dr. N. Sudhakar, Principal of Bapatla Engineering College, Bapatla, for their support, encouragement and also a great source of inspiration to our work. REFERENCES [1] Pavithra.B.C, Myna.B.C, Kavyashree.M, Fingerprint based bank locker system using microcontroller, Proceedings of IRF International Conference, 05th April-2014,
  • 4. S.V.Tejesvi et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 2, (Part - 2) February 2016, pp.31-34 www.ijera.com 34|P a g e Pondicherry, India, ISBN: 978-93-82702- 71-9 [2] Swetha J, RFID based automated bank locker system, IJRET: International Journal of Research in Engineering and Technology. Volume: 03, Issue: 05, May-2014,eISSN: 2319-1163 | pISSN: 2321-7308, Available @ http://www.ijret.org [3] Gaurav Chavan, Sourabh Dabke, Anup Ghandghe, Mrs.K.A.Musale, Bank locker security system using android application, International Research Journal of Engineering and Technology (IRJET) Volume: 02 Issue: 01 | Apr-2015, e-ISSN: 2395 -0056, p-ISSN: 2395-0072. [4] Aruna.D.Mane1 and SirkaziMohd Arif2, Locker Security System Using RFID and GSM Technology‖, International journal of Scientific and Technology Research, Volume 4, Issue 07, JULY 2015. [5] Raghu Ram.Gangi, Subhramanya Sarma.Gollapudi, Locker opening and closing system using RFID, fingerprint, password and GSM, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 2, March – April 2013 ISSN 2278- 68:56, Web Site: www.ijettcs.org Email: editor@ijettcs.org, editorijettcs@gmail.com [6] Sagar S .Palsodkar, Prof S.B. Patil, Bank Lockers Security System using Biometric and GSM Technology, SSRG International Journal of Electronics and Communication Engineering (SSRG-IJECE) – Volume 2, Issue 4–April 2015, ISSN: 2348 – 8549. [7] Tutorial on microcontroller: www.8051pro jects.net/microcontroller_tutorials/ [8] Tutorial on LCD: wwws.8051projects.net/ lcd-interfacing/ [9] https://en.wikipedia.org/wiki/Piezoelectric_s ensor [10] http://www.ventor.co.in/ir-sensors-c- 34_32/infra-red-ir-led-trnsmitter-receiver- pair-p-124/