SlideShare a Scribd company logo
RTOS based Confidential Area Security System
Designed and Developed By:
Ajinky Gadewar
Pardeep Dhiman
Tejal Hagawane
Shaikh Mohammed Zaid
Under Guidance:
Prof. Bhavik Thakker
Topics To Be Covered:
• Introduction
• Objective
• Features
• Block Diagram
• Algorithm
• Flowchart
• Hardware:
• LPC-1768
• RFID(tags)
• Keyboard(P/S2)
• Biometric Sensor(Fingerprint)
• Humidity, PIR, Weight Sensors
• DC Motor Driver(L293D)
• Software:
• RTOS(µcos-II)
• Keil
• Communication(SPI)
• Advantages
• Disadvantages
• Applications
• Future Scope
• Conclusion
Introduction:
• Robbery has become common in our day to day life.
• Countering it, security systems with CCD cameras are commercially available.
• In most of the places, remote surveillance is needed.
• Sometimes, if the network is busy, the video is not smart security system, which can transmit video
with lesser bandwidth consumption, latency and jitter.
• For any smart security system, the element that ensure perfect security is the access granting system.
• We propose a novel which consist of various security level gadgets.
• Finger print ,RFID and password and also consist of sensors like load and humidity sensors etc.
• The proposed system uses RTOS (µcos II) programming with the two ARM boards which
communicate using SPI bus.
• First ARM board consist of three entry level security gadget viz. finger print, RFID and password
using keyboard whereas the second board consist of sensors.
• If the authorized person's all password, finger print and RFID tag no. matches the second board is
disabled by means of communication through SPI bus.
•and if not the second board is enabled and also the sensors connected to it are enabled.
Objectives:
•To provide security to confidential areas.
•To protect the area from illegal access.
•To improve security.
•To reduce the threat of data being hacked by using security modules.
Block Diagram
Flow Chart
Features: ARM Cortex M3(LPC-1768)
• Low-gate count with advanced features
• ARMv7-M: A Thumb-2 ISA subset, consisting of all base Thumb-2 instructions.
• Hardware divide instructions, SDIV and UDIV (Thumb-2 instructions)
• Handler and Thread modes
• Thumb and Debug states.
• Interruptible-continued LDM/STM, PUSH/POP for low interrupt latency.
• Automatic processor state saving and restoration for low latency Interrupt Service
Routine (ISR) entry and exit.
• ARM architecture v6 style BE8/LE support.
• ARMv6 unaligned accesses.
• Optional Memory Protection Unit (MPU).
Features: ARM Cortex M3(LPC-1768)
• Nested Vectored Interrupt Controller (NVIC) integrated with the processor for low
latency
• Configurable number, 1 to 240, of external interrupts
• Configurable number, 3 to 8 bits of priority.
• Dynamic prioritization of interrupts.
• Priority grouping. This allows selection of pre-empting interrupt levels and non
pre-empting interrupt levels
• Support for tail-chaining & late arriving, this enables back-to-back interrupt
processing without the overhead of state saving and restoration between interrupts
• Processor state automatically saved on interrupt entry, and restored on interrupt
exit, with no instruction overhead.
Features: ARM Cortex M3(LPC-1768)
• Debug System:
• The Cortex-M3 processor includes a number of fixed internal debugging components. These
components provide debugging operation supports and features such as breakpoints and watch
points.
• The Bus Interface:
• Advanced High-performance Bus-Lite (AHB-Lite) ICode, DCode and System bus interfaces.
• Code memory buses(I-Code D-Code)
• System bus used to access (SRAM)memory and peripherals
• Advanced Peripheral Bus (APB) and Private Peripheral Bus (PPB) Interface.
• Private peripheral bus provides access to a part of the system-level memory dedicated to
private peripherals such as debugging components
• Bit band support that includes atomic bit band write and read operations.
• Memory Protection Unit, or MPU(optional):
• This unit allows access rules to be set up for privileged access and user program access
• Up to Eight memory regions can be configured.
RTOS (µCOS-II )
• Portable
• Maximum portable ANSI C, minimum microprocessor-specific assembly.
• ROMable
• Designed for Embedded Applications, and with the proper tool chain, it can be
embedded to any part of the product
• Scalable
• Can be scaled to target various target applications based on the services required
by that application
• Pre-emptive
• µCOS-II is a fully pre-emptive real-time kernel.
RTOS Contd.
• Multitasking
• Tasks with the highest rate of execution are given the highest priority using rate-monotonic
scheduling
• µCOS-II can manage up to 64 or 256 tasks
• µC/OS-III allows an unlimited number of application tasks at each one of an unlimited number
of priority levels, constrained only by a processor’s access to memory
• Deterministic (time)
• Execution time of most µCOS-II functions and services are deterministic
• Deterministic (space)
• Each task requires its own different stack size
• Services
• Mailboxes, Queues, Semaphores, fixed-sized memory partitions, time-related functions
RTOS Contd.
• Interrupt Management
• Interrupts can cause higher priority tasks to be ready can contend for the CPU.
Interrupts can be nested 255 levels deep
• Robust and Reliable
• Has been developed and deployed on hundreds of commercial applications
since 1992
• Task Stacks
•Each task requires its own stack. Micro C/OS-II however allows tasks to
maintain variable sized stacks. This allows applications the flexibility of making
an efficient use of the available RAM
Radio Frequency Identification (RFID)
• An Automatic Data Collection that uses radio-frequency waves to transfer
data between a reader and a movable item to identify, categorize, track.
• Is fast and does not require physical sight or contact between
reader/scanner and the tagged item.
• Performs the operation using low cost components.
• Attempts to provide unique identification and backend integration that
allows for wide range of applications.
• No line of sight requirement.
• No physical contact between data carrier and communication device.
• Very robust tags that can stand extreme conditions and temperatures.
• Read only tag is 100% secure & can not be changed /duplicated .
• Long read range.
• Multiple tag Read/Write .
• Tags can be used repeatedly.
• Human errors can be avoided and extremely low error rate .
• Tracking people, items, equipments in real-time
 Classification:
• Range : Near Field Communication(NFC)
Far Field Communication(FFC)
• Frequency : LF, HF,UHF
• Operation :
o Passive
o Semi-Passive
o Active
PS/2 Keyboard
• IBM PS/2 Keyboard (1987) - Compatible with AT systems.
• 84 - 101 keys.
• 6-pin mini-DIN connector.
• Bi-direction serial protocol.
• Offers optional scan code set 3.
• 17 host-to-keyboard commands.
Biometric Sensor(Fingerprint)
• Integrated image collecting and algorithm chip together.
All-in-one.
• Fingerprint reader can conduct secondary development.
• can be embedded into a variety of end products.
• Low power consumption.
• low cost .
• small size.
• excellent performance
• Professional optical technology.
• precise module manufacturing techniques.
• Good image processing capabilities.
• can successfully capture image up to resolution 500 dpi
Humidity Sensor
• Humidity sensor works on the principle of relative humidity and gives
the output in the form of voltage.
• This analog voltage provides the information about the percentage
relative humidity present in the environment.
• A miniature sensor consisting of a RH sensitive material deposited on
a ceramic substrate.
• The AC resistance (impedance) of the sensor decreases as relative
humidity increases.
PIR Sensor
• A passive infrared sensor (PIR sensor) is an
electronic sensor that measures infrared (IR) light
radiating from objects in its field of view.
• All objects with a temperature above absolute
zero emit heat energy in the form of radiation.
• Usually this radiation is invisible to the human
eye because it radiates at infrared wavelengths.
• For detection of these wavelengths PIR sensor is
used.
• The plastic window covering may have multiple
facets moulded into it, to focus the infrared energy
onto the sensor. Each individual facet is a Fresnel
lens.
PIR Sensor without
lens
PIR Sensor with
lens
Weight Sensor
• A load cell is a sensor or a transducer that converts a load or
force acting on it into an electronic signal.
• This electronic signal can be a voltage change, current
change or frequency change depending on the type of load
cell and circuitry used.
• There are many different kinds of load cells.
• Two types of load cells resistive load cells and capacitive
load cells.
• Resistive load cells work on the principle of piezo-
resistivity.
• When a load/force/stress is applied to the sensor, it changes
its resistance. This change in resistance leads to a change in
output voltage when a input voltage is applied.
DC Motor Driver(L293D):
• It works on the concept of H-bridge.
• In a single l293d IC there two h-Bridge circuit inside the it which can rotate two
dc motor independently.
• There are two Enable pins on l293d. Pin 1 and pin 9, for being able to drive the
motor, the pin 1 and 9 need to be high.
• For driving the motor with left H-bridge you need to enable pin 1 to high. And
for right H-Bridge you need to make the pin 9 to high.
• If anyone of the either pin1 or pin9 goes low then the motor in the corresponding
section will suspend working. It’s like a switch.
Keil
• The Keil Development Tools are designed for the professional software
developer, however programmers of all levels can use them to get the most out of
the embedded microcontroller architectures that are supported.
• Tools developed by Keil endorse the most popular microcontrollers and are
distributed in several packages and configurations, dependent on the architecture.
• MDK-ARM: Microcontroller Development Kit, for several ARM7, ARM9,
and Cortex-Mx based devices.
• PK166: Keil Professional Developer’s Kit, for C166, XE166, and XC2000
devices.
• DK251: Keil 251 Development Tools, for 251 devices.
• PK51: Keil 8051 Development Tools, for Classic & Extended 8051 devices
• In addition to the software packages, Keil offers a variety of evaluation boards,
USB-JTAG adapters, emulators, and third-party tools, which completes the range
of products.
• In addition to the software packages, Keil offers a variety of evaluation boards,
USB-JTAG adapters, emulators, and third-party tools, which completes the range
of products.
• Keil provides you with the best embedded development tools, documentation, and
support.
Communication (SPI)
• The Serial Peripheral Interface (SPI) bus is a synchronous serial
communication interface specification used for short distance communication,
primarily in embedded systems.
• SPI devices communicate in full duplex mode using a master-slave architecture with
a single master.
• The master device originates the frame for reading and writing.
• Multiple slave devices are supported through selection with individual slave
select (SS) lines.
MOSI-Master output Slave input
MISO-Master input Slave output
Clock-Clock Pulses
Chip select- Selects Master/Slave
• Data is shifted out of the master's MOSI pin and in it's MISO pin
• Data transfer is initiated by simply writing data to the SPI data register.
• All data movement is coordinated by SCK.
• Slave select may or may not be used depending on interfacing device.
• To get input data only you send “junk” data to SPDR to start the clock.
• master SPI device slave SPI device
• SPI interface defines only the communication lines and the clock edge
• There is no specified flow control! No acknowledgement mechanism to
confirm receipt of data.
• Hardware realization is usually done with a simple shift register.
• SPI is faster, but gets complicated when there is more than one slave
involved.
• Simple hardware interfacing.
• Transceivers are not needed.
• At most one "unique" bus signal per device (CS); all others are shared.
Advantages
• Increase security - Provide a convenient and low-cost additional tier of security.
• Reduce fraud by employing hard-to-forge technologies and materials.
For e.g. Minimise the opportunity for ID fraud.
• Reduce password administration costs.
• Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN??
• Unequivocally link an individual to a transaction or event.
• Module wise access - without verifying all security modules u can’t unlock the door.
• Alarm System – Any unauthorized access will cause an alarm which alert the
observers.
• Better than CCTV.

More Related Content

What's hot

1 introducing embedded systems and the microcontrollers
1 introducing embedded systems and the microcontrollers1 introducing embedded systems and the microcontrollers
1 introducing embedded systems and the microcontrollersBidhu Deka
 
Advance Microcontroller AVR
Advance Microcontroller AVRAdvance Microcontroller AVR
Advance Microcontroller AVR
Daksh Raj Chopra
 
Embedded system
Embedded  systemEmbedded  system
Embedded system
ANSHUL GUPTA
 
Introduction to microcontrollers and embedded systems
Introduction to microcontrollers and embedded systemsIntroduction to microcontrollers and embedded systems
Introduction to microcontrollers and embedded systems
Tyler Ross Lambert
 
training report on embedded system and AVR
training report on embedded system and AVRtraining report on embedded system and AVR
training report on embedded system and AVR
Urvashi Khandelwal
 
Embedded System Basics
Embedded System BasicsEmbedded System Basics
Embedded System Basics
Dr M Muruganandam Masilamani
 
Training report on embedded sys_AVR
Training report on embedded sys_AVRTraining report on embedded sys_AVR
Training report on embedded sys_AVR
Galgotias College of Engg. & Tech.
 
Ppt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOTPpt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOT
preetigill309
 
Embedded system
Embedded systemEmbedded system
Embedded system
CHANCHAL SONI
 
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vnLs catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
Dien Ha The
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
narmada alaparthi
 
Applications of microcontroller
Applications of microcontrollerApplications of microcontroller
Applications of microcontroller
babak danyal
 
Module 1 - ARM 32 Bit Microcontroller
Module 1 - ARM 32 Bit Microcontroller Module 1 - ARM 32 Bit Microcontroller
Module 1 - ARM 32 Bit Microcontroller
Amogha Bandrikalli
 
Embedded system design using arduino
Embedded system design using arduinoEmbedded system design using arduino
Embedded system design using arduino
Santosh Verma
 
CISC & RISC ARCHITECTURES
CISC & RISC ARCHITECTURESCISC & RISC ARCHITECTURES
CISC & RISC ARCHITECTURES
Dr.YNM
 
What is a Microcontroller ?
What is a Microcontroller ?What is a Microcontroller ?
What is a Microcontroller ?
ShrutiVij4
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)
Hamid Reza
 
Summer training embedded system and its scope
Summer training  embedded system and its scopeSummer training  embedded system and its scope
Summer training embedded system and its scope
Arshit Rai
 
Programming ARM Cortex-M4 STM32 Nucleo
Programming ARM Cortex-M4  STM32 NucleoProgramming ARM Cortex-M4  STM32 Nucleo
Programming ARM Cortex-M4 STM32 Nucleo
Sanjay Adhikari
 

What's hot (20)

1 introducing embedded systems and the microcontrollers
1 introducing embedded systems and the microcontrollers1 introducing embedded systems and the microcontrollers
1 introducing embedded systems and the microcontrollers
 
Advance Microcontroller AVR
Advance Microcontroller AVRAdvance Microcontroller AVR
Advance Microcontroller AVR
 
Embedded system
Embedded  systemEmbedded  system
Embedded system
 
Introduction to microcontrollers and embedded systems
Introduction to microcontrollers and embedded systemsIntroduction to microcontrollers and embedded systems
Introduction to microcontrollers and embedded systems
 
training report on embedded system and AVR
training report on embedded system and AVRtraining report on embedded system and AVR
training report on embedded system and AVR
 
Introduction to stm32-part2
Introduction to stm32-part2Introduction to stm32-part2
Introduction to stm32-part2
 
Embedded System Basics
Embedded System BasicsEmbedded System Basics
Embedded System Basics
 
Training report on embedded sys_AVR
Training report on embedded sys_AVRTraining report on embedded sys_AVR
Training report on embedded sys_AVR
 
Ppt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOTPpt on six month training on embedded system & IOT
Ppt on six month training on embedded system & IOT
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vnLs catalog thiet bi tu dong master rtu e_dienhathe.vn
Ls catalog thiet bi tu dong master rtu e_dienhathe.vn
 
Wsn handbook
Wsn handbookWsn handbook
Wsn handbook
 
Applications of microcontroller
Applications of microcontrollerApplications of microcontroller
Applications of microcontroller
 
Module 1 - ARM 32 Bit Microcontroller
Module 1 - ARM 32 Bit Microcontroller Module 1 - ARM 32 Bit Microcontroller
Module 1 - ARM 32 Bit Microcontroller
 
Embedded system design using arduino
Embedded system design using arduinoEmbedded system design using arduino
Embedded system design using arduino
 
CISC & RISC ARCHITECTURES
CISC & RISC ARCHITECTURESCISC & RISC ARCHITECTURES
CISC & RISC ARCHITECTURES
 
What is a Microcontroller ?
What is a Microcontroller ?What is a Microcontroller ?
What is a Microcontroller ?
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)
 
Summer training embedded system and its scope
Summer training  embedded system and its scopeSummer training  embedded system and its scope
Summer training embedded system and its scope
 
Programming ARM Cortex-M4 STM32 Nucleo
Programming ARM Cortex-M4  STM32 NucleoProgramming ARM Cortex-M4  STM32 Nucleo
Programming ARM Cortex-M4 STM32 Nucleo
 

Similar to Project_updated

Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptx
Pratik Gohel
 
Ajal mod 1
Ajal mod 1Ajal mod 1
Ajal mod 1
AJAL A J
 
POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS USING R...
POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS  USING R...POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS  USING R...
POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS USING R...
Nishmi Suresh
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
Manju Nathan
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Core of Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I   Core of Embedded SystemsSYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I   Core of Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Core of Embedded Systems
Arti Parab Academics
 
Summer training embedded system and its scope
Summer training  embedded system and its scopeSummer training  embedded system and its scope
Summer training embedded system and its scope
Arshit Rai
 
seminar.pptx
seminar.pptxseminar.pptx
seminar.pptx
AmanKaim
 
Embedded systems الانظمة المدمجة
Embedded systems  الانظمة المدمجة Embedded systems  الانظمة المدمجة
Embedded systems الانظمة المدمجة
salih mahmod
 
Core of the ES
Core of the ESCore of the ES
Core of the ES
VijayKumar5738
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
ST_World
 
MODULE4_MES.pdf
MODULE4_MES.pdfMODULE4_MES.pdf
MODULE4_MES.pdf
PoojaPK8
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
Mrunal Deshkar
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
Ashok Raj
 
PILOT Session for Embedded Systems
PILOT Session for Embedded Systems PILOT Session for Embedded Systems
PILOT Session for Embedded Systems
Mohamed Al-Emam, PMP®, CAP®
 
Mces MOD 1.pptx
Mces MOD 1.pptxMces MOD 1.pptx
Mces MOD 1.pptx
RadhaC10
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edge
Steve Mylroie
 
1334420 634648164164717500
1334420 6346481641647175001334420 634648164164717500
1334420 634648164164717500
sumit tiwari
 
EE6602 Embedded System
EE6602 Embedded SystemEE6602 Embedded System
EE6602 Embedded System
rmkceteee
 

Similar to Project_updated (20)

Introduction to embedded System.pptx
Introduction to embedded System.pptxIntroduction to embedded System.pptx
Introduction to embedded System.pptx
 
Ajal mod 1
Ajal mod 1Ajal mod 1
Ajal mod 1
 
POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS USING R...
POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS  USING R...POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS  USING R...
POWER EFFICIENT SOFTWARE DEFINED RADIO FOR DISASTER AFFECTED REGIONS USING R...
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Core of Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I   Core of Embedded SystemsSYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I   Core of Embedded Systems
SYBSC IT SEM IV EMBEDDED SYSTEMS UNIT I Core of Embedded Systems
 
Summer training embedded system and its scope
Summer training  embedded system and its scopeSummer training  embedded system and its scope
Summer training embedded system and its scope
 
seminar.pptx
seminar.pptxseminar.pptx
seminar.pptx
 
Embedded systems الانظمة المدمجة
Embedded systems  الانظمة المدمجة Embedded systems  الانظمة المدمجة
Embedded systems الانظمة المدمجة
 
Core of the ES
Core of the ESCore of the ES
Core of the ES
 
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...Track 5   session 3 - st dev con 2016 - mechanisms for trusted code execution...
Track 5 session 3 - st dev con 2016 - mechanisms for trusted code execution...
 
MODULE4_MES.pdf
MODULE4_MES.pdfMODULE4_MES.pdf
MODULE4_MES.pdf
 
Embedded system and its platforms
Embedded system and its platformsEmbedded system and its platforms
Embedded system and its platforms
 
Vlsi lab
Vlsi labVlsi lab
Vlsi lab
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
PILOT Session for Embedded Systems
PILOT Session for Embedded Systems PILOT Session for Embedded Systems
PILOT Session for Embedded Systems
 
Mces MOD 1.pptx
Mces MOD 1.pptxMces MOD 1.pptx
Mces MOD 1.pptx
 
Living on the iot edge
Living on the iot edgeLiving on the iot edge
Living on the iot edge
 
ankit
ankitankit
ankit
 
1334420 634648164164717500
1334420 6346481641647175001334420 634648164164717500
1334420 634648164164717500
 
EE6602 Embedded System
EE6602 Embedded SystemEE6602 Embedded System
EE6602 Embedded System
 

Project_updated

  • 1. RTOS based Confidential Area Security System Designed and Developed By: Ajinky Gadewar Pardeep Dhiman Tejal Hagawane Shaikh Mohammed Zaid Under Guidance: Prof. Bhavik Thakker
  • 2. Topics To Be Covered: • Introduction • Objective • Features • Block Diagram • Algorithm • Flowchart • Hardware: • LPC-1768 • RFID(tags) • Keyboard(P/S2) • Biometric Sensor(Fingerprint) • Humidity, PIR, Weight Sensors • DC Motor Driver(L293D) • Software: • RTOS(µcos-II) • Keil • Communication(SPI) • Advantages • Disadvantages • Applications • Future Scope • Conclusion
  • 3. Introduction: • Robbery has become common in our day to day life. • Countering it, security systems with CCD cameras are commercially available. • In most of the places, remote surveillance is needed. • Sometimes, if the network is busy, the video is not smart security system, which can transmit video with lesser bandwidth consumption, latency and jitter. • For any smart security system, the element that ensure perfect security is the access granting system. • We propose a novel which consist of various security level gadgets. • Finger print ,RFID and password and also consist of sensors like load and humidity sensors etc. • The proposed system uses RTOS (µcos II) programming with the two ARM boards which communicate using SPI bus. • First ARM board consist of three entry level security gadget viz. finger print, RFID and password using keyboard whereas the second board consist of sensors. • If the authorized person's all password, finger print and RFID tag no. matches the second board is disabled by means of communication through SPI bus. •and if not the second board is enabled and also the sensors connected to it are enabled.
  • 4. Objectives: •To provide security to confidential areas. •To protect the area from illegal access. •To improve security. •To reduce the threat of data being hacked by using security modules.
  • 7. Features: ARM Cortex M3(LPC-1768) • Low-gate count with advanced features • ARMv7-M: A Thumb-2 ISA subset, consisting of all base Thumb-2 instructions. • Hardware divide instructions, SDIV and UDIV (Thumb-2 instructions) • Handler and Thread modes • Thumb and Debug states. • Interruptible-continued LDM/STM, PUSH/POP for low interrupt latency. • Automatic processor state saving and restoration for low latency Interrupt Service Routine (ISR) entry and exit. • ARM architecture v6 style BE8/LE support. • ARMv6 unaligned accesses. • Optional Memory Protection Unit (MPU).
  • 8. Features: ARM Cortex M3(LPC-1768) • Nested Vectored Interrupt Controller (NVIC) integrated with the processor for low latency • Configurable number, 1 to 240, of external interrupts • Configurable number, 3 to 8 bits of priority. • Dynamic prioritization of interrupts. • Priority grouping. This allows selection of pre-empting interrupt levels and non pre-empting interrupt levels • Support for tail-chaining & late arriving, this enables back-to-back interrupt processing without the overhead of state saving and restoration between interrupts • Processor state automatically saved on interrupt entry, and restored on interrupt exit, with no instruction overhead.
  • 9. Features: ARM Cortex M3(LPC-1768) • Debug System: • The Cortex-M3 processor includes a number of fixed internal debugging components. These components provide debugging operation supports and features such as breakpoints and watch points. • The Bus Interface: • Advanced High-performance Bus-Lite (AHB-Lite) ICode, DCode and System bus interfaces. • Code memory buses(I-Code D-Code) • System bus used to access (SRAM)memory and peripherals • Advanced Peripheral Bus (APB) and Private Peripheral Bus (PPB) Interface. • Private peripheral bus provides access to a part of the system-level memory dedicated to private peripherals such as debugging components • Bit band support that includes atomic bit band write and read operations. • Memory Protection Unit, or MPU(optional): • This unit allows access rules to be set up for privileged access and user program access • Up to Eight memory regions can be configured.
  • 10. RTOS (µCOS-II ) • Portable • Maximum portable ANSI C, minimum microprocessor-specific assembly. • ROMable • Designed for Embedded Applications, and with the proper tool chain, it can be embedded to any part of the product • Scalable • Can be scaled to target various target applications based on the services required by that application • Pre-emptive • µCOS-II is a fully pre-emptive real-time kernel.
  • 11. RTOS Contd. • Multitasking • Tasks with the highest rate of execution are given the highest priority using rate-monotonic scheduling • µCOS-II can manage up to 64 or 256 tasks • µC/OS-III allows an unlimited number of application tasks at each one of an unlimited number of priority levels, constrained only by a processor’s access to memory • Deterministic (time) • Execution time of most µCOS-II functions and services are deterministic • Deterministic (space) • Each task requires its own different stack size • Services • Mailboxes, Queues, Semaphores, fixed-sized memory partitions, time-related functions
  • 12. RTOS Contd. • Interrupt Management • Interrupts can cause higher priority tasks to be ready can contend for the CPU. Interrupts can be nested 255 levels deep • Robust and Reliable • Has been developed and deployed on hundreds of commercial applications since 1992 • Task Stacks •Each task requires its own stack. Micro C/OS-II however allows tasks to maintain variable sized stacks. This allows applications the flexibility of making an efficient use of the available RAM
  • 13. Radio Frequency Identification (RFID) • An Automatic Data Collection that uses radio-frequency waves to transfer data between a reader and a movable item to identify, categorize, track. • Is fast and does not require physical sight or contact between reader/scanner and the tagged item. • Performs the operation using low cost components. • Attempts to provide unique identification and backend integration that allows for wide range of applications. • No line of sight requirement. • No physical contact between data carrier and communication device. • Very robust tags that can stand extreme conditions and temperatures. • Read only tag is 100% secure & can not be changed /duplicated .
  • 14. • Long read range. • Multiple tag Read/Write . • Tags can be used repeatedly. • Human errors can be avoided and extremely low error rate . • Tracking people, items, equipments in real-time  Classification: • Range : Near Field Communication(NFC) Far Field Communication(FFC) • Frequency : LF, HF,UHF • Operation : o Passive o Semi-Passive o Active
  • 15. PS/2 Keyboard • IBM PS/2 Keyboard (1987) - Compatible with AT systems. • 84 - 101 keys. • 6-pin mini-DIN connector. • Bi-direction serial protocol. • Offers optional scan code set 3. • 17 host-to-keyboard commands.
  • 16. Biometric Sensor(Fingerprint) • Integrated image collecting and algorithm chip together. All-in-one. • Fingerprint reader can conduct secondary development. • can be embedded into a variety of end products. • Low power consumption. • low cost . • small size. • excellent performance • Professional optical technology. • precise module manufacturing techniques. • Good image processing capabilities. • can successfully capture image up to resolution 500 dpi
  • 17. Humidity Sensor • Humidity sensor works on the principle of relative humidity and gives the output in the form of voltage. • This analog voltage provides the information about the percentage relative humidity present in the environment. • A miniature sensor consisting of a RH sensitive material deposited on a ceramic substrate. • The AC resistance (impedance) of the sensor decreases as relative humidity increases.
  • 18. PIR Sensor • A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR) light radiating from objects in its field of view. • All objects with a temperature above absolute zero emit heat energy in the form of radiation. • Usually this radiation is invisible to the human eye because it radiates at infrared wavelengths. • For detection of these wavelengths PIR sensor is used. • The plastic window covering may have multiple facets moulded into it, to focus the infrared energy onto the sensor. Each individual facet is a Fresnel lens. PIR Sensor without lens PIR Sensor with lens
  • 19. Weight Sensor • A load cell is a sensor or a transducer that converts a load or force acting on it into an electronic signal. • This electronic signal can be a voltage change, current change or frequency change depending on the type of load cell and circuitry used. • There are many different kinds of load cells. • Two types of load cells resistive load cells and capacitive load cells. • Resistive load cells work on the principle of piezo- resistivity. • When a load/force/stress is applied to the sensor, it changes its resistance. This change in resistance leads to a change in output voltage when a input voltage is applied.
  • 20. DC Motor Driver(L293D): • It works on the concept of H-bridge. • In a single l293d IC there two h-Bridge circuit inside the it which can rotate two dc motor independently. • There are two Enable pins on l293d. Pin 1 and pin 9, for being able to drive the motor, the pin 1 and 9 need to be high. • For driving the motor with left H-bridge you need to enable pin 1 to high. And for right H-Bridge you need to make the pin 9 to high. • If anyone of the either pin1 or pin9 goes low then the motor in the corresponding section will suspend working. It’s like a switch.
  • 21. Keil • The Keil Development Tools are designed for the professional software developer, however programmers of all levels can use them to get the most out of the embedded microcontroller architectures that are supported. • Tools developed by Keil endorse the most popular microcontrollers and are distributed in several packages and configurations, dependent on the architecture. • MDK-ARM: Microcontroller Development Kit, for several ARM7, ARM9, and Cortex-Mx based devices. • PK166: Keil Professional Developer’s Kit, for C166, XE166, and XC2000 devices.
  • 22. • DK251: Keil 251 Development Tools, for 251 devices. • PK51: Keil 8051 Development Tools, for Classic & Extended 8051 devices • In addition to the software packages, Keil offers a variety of evaluation boards, USB-JTAG adapters, emulators, and third-party tools, which completes the range of products. • In addition to the software packages, Keil offers a variety of evaluation boards, USB-JTAG adapters, emulators, and third-party tools, which completes the range of products. • Keil provides you with the best embedded development tools, documentation, and support.
  • 23. Communication (SPI) • The Serial Peripheral Interface (SPI) bus is a synchronous serial communication interface specification used for short distance communication, primarily in embedded systems. • SPI devices communicate in full duplex mode using a master-slave architecture with a single master. • The master device originates the frame for reading and writing. • Multiple slave devices are supported through selection with individual slave select (SS) lines. MOSI-Master output Slave input MISO-Master input Slave output Clock-Clock Pulses Chip select- Selects Master/Slave
  • 24. • Data is shifted out of the master's MOSI pin and in it's MISO pin • Data transfer is initiated by simply writing data to the SPI data register. • All data movement is coordinated by SCK. • Slave select may or may not be used depending on interfacing device. • To get input data only you send “junk” data to SPDR to start the clock. • master SPI device slave SPI device
  • 25. • SPI interface defines only the communication lines and the clock edge • There is no specified flow control! No acknowledgement mechanism to confirm receipt of data. • Hardware realization is usually done with a simple shift register. • SPI is faster, but gets complicated when there is more than one slave involved. • Simple hardware interfacing. • Transceivers are not needed. • At most one "unique" bus signal per device (CS); all others are shared.
  • 26. Advantages • Increase security - Provide a convenient and low-cost additional tier of security. • Reduce fraud by employing hard-to-forge technologies and materials. For e.g. Minimise the opportunity for ID fraud. • Reduce password administration costs. • Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN?? • Unequivocally link an individual to a transaction or event. • Module wise access - without verifying all security modules u can’t unlock the door. • Alarm System – Any unauthorized access will cause an alarm which alert the observers. • Better than CCTV.

Editor's Notes

  1. H-bridge is a circuit which allows the high voltage to be flown in either direction. As you know voltage should change its direction to able to rotate the motor in clockwise or anticlockwise direction, Hence H-bridge IC are ideal for driving a DC motor.Using micro-controller