SlideShare a Scribd company logo
1 of 19
Bank locker system
• In today's modern world, security plays an important role.
• Every person has precious accessories like gold, jewelry or cash.
• It is not enough to have these accessories, but security of this is very important,
for this purpose we keep them in bank lockers.
• Still we often hear or read in newspaper that some fake person has access the
locker of another person and have stolen money.
• In order to overcome this type of frauds, authentication of the person who wants
to use the locker is very important.
Introduction
Objectives
Banks offer locker facilities to individuals as and when required Both public as well as private sector banks
offer this facility to needy individuals for a small annual fee These lockers are maintained in a secure facility
that is under constant surveillance and security There are several advantages of availing a bank locker, a few
best ones are listed as follows:
• Softy.
• Easy access.
• Available in any bank branch.
• Anyone can avail.
• Nomination facility available.
Proposed system
• In this project we propose a Biometric based secure access which can provide a sophisticated
theft alert system for bank locker system.
• This system contains microcontroller, keypad, Biometric module and LCD display.
• By using keypad we need to press the button to the three door opening purpose.
• Then using biometric module to open the main door for authorized person.
• This system offers better solution for the bank security system and it will also help us to
track the person who tried to open the locker without the permission and proper
authentication.
Block diagram
About Microcontroller
• PIC16F877A microcontroller is used for this project
• It is 8-bit Microcontroller
• System is RISC Architecture
• It has Small set of Instruction set
• It has 35-Instructions only
• Compatibility: avail 28/40 Pin ICs
Microcontroller overview
• Operating Speed Max 20 MHz, Voltage-(2-5.5)v
• Memory:
Flash Program 8Kx14 Words,
RAM 368 Bytes,
EEPROM Data Memory 256 Bytes
• Low power, High speed Flash/EEPROM Technology
Features of Microcontroller
• It has 5 Ports for Internal and External usage
• It has on chip Timers. 3 Timers are avail
• It has in built Analog to Digital Converter
• In built Multiplexer availability for signal Selection
• It has serial as well as Parallel Communication facilities
• In built Capture, Compare and Pulse width modulation
Pin Diagram
Characteristics of
Biometrics
 Any human characteristic can qualify as a biometric characteristic as long as it satisfies the
following requirements:-
 Universality
 Distinctiveness
 Permanence
 Collectability
Working of Biometrics System
Fingerprint Recognition
 A fingerprint is made of a series of ridges and furrows on the surface of the finger.
 Ridge ending, ridge bifurcation and minutiae points.
 Algorithm is developed to distinguish whorl, arch and loop.
Fingerprint authentication
14
What’s Inside?
DC motor
15
ADVANTAGES
• Provide high security.
• No question arise to hack or crack system.
• No need to remember username.
• Easy to use.
• Fully automatic system
• Dual layer security with fingerprint and password option.
• Theft protection and alert.
Applications
• In offices
• In bank lockers
• For used in identification.
• In nuclear power plant control room.
• All that places when unique identity & high security is required.
• Cash caring vehicle
References
1. A. Jain et al: “BIOMETRICS: Personal Identification in Networked Society”, Kluwer
Academic Publishers, 1999, ISBN0-7923-8345-1.
2. S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric Recognition: Security and Privacy
Concerns”, IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, 2003.
3. http:// www.biometrics.org/
4. http://www.biometricsconsotorium.com
5. http://www.howstufworks.com
6. http://www.youtube.com/watch?v=FCEyHiLxuC8
Bank locker system

More Related Content

What's hot

Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...sgoldbergg
 
Online Quiz System Project PPT
Online Quiz System Project PPTOnline Quiz System Project PPT
Online Quiz System Project PPTShanthan Reddy
 
Driver Drowsiness Detection Review
Driver Drowsiness Detection ReviewDriver Drowsiness Detection Review
Driver Drowsiness Detection ReviewAsaad Waqar
 
Web Locker For Online Banking System project ppt. CSE/IT
Web Locker For Online Banking System project ppt. CSE/ITWeb Locker For Online Banking System project ppt. CSE/IT
Web Locker For Online Banking System project ppt. CSE/ITMukesh Chaudhary(L.I.O.N)
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machinestejinderubs
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
Student Management System best PPT
Student Management System best PPTStudent Management System best PPT
Student Management System best PPTDheeraj Kumar tiwari
 
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...Vignesh C
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scannerAusaf khan
 
Bank management system
Bank management systemBank management system
Bank management systemsumanadas37
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machinesanthu652
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 

What's hot (20)

Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...Working of ATM machine : For all those who wanted to know the internal workin...
Working of ATM machine : For all those who wanted to know the internal workin...
 
Online Quiz System Project PPT
Online Quiz System Project PPTOnline Quiz System Project PPT
Online Quiz System Project PPT
 
Driver Drowsiness Detection Review
Driver Drowsiness Detection ReviewDriver Drowsiness Detection Review
Driver Drowsiness Detection Review
 
Web Locker For Online Banking System project ppt. CSE/IT
Web Locker For Online Banking System project ppt. CSE/ITWeb Locker For Online Banking System project ppt. CSE/IT
Web Locker For Online Banking System project ppt. CSE/IT
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Atm transaction
Atm transactionAtm transaction
Atm transaction
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
Student Management System best PPT
Student Management System best PPTStudent Management System best PPT
Student Management System best PPT
 
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
Drowsiness State Detection of Driver using Eyelid Movement- IRE Journal Confe...
 
Fingerprint scanner
Fingerprint scannerFingerprint scanner
Fingerprint scanner
 
Bank management system
Bank management systemBank management system
Bank management system
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
Atm System
Atm SystemAtm System
Atm System
 
fingerprint based electronic voting machine
fingerprint based electronic voting machinefingerprint based electronic voting machine
fingerprint based electronic voting machine
 
Bank Management System
Bank Management SystemBank Management System
Bank Management System
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Bank Management System
Bank Management System Bank Management System
Bank Management System
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 

Viewers also liked

Introduction to banking
Introduction to bankingIntroduction to banking
Introduction to bankingadi1853
 
Introduction to banking
Introduction to bankingIntroduction to banking
Introduction to bankingYudy Yunardy
 
Banking locker security using Image processing
Banking locker security using Image processingBanking locker security using Image processing
Banking locker security using Image processingArpana shree
 
Banking instruments
Banking instrumentsBanking instruments
Banking instrumentsDipankar1981
 
Introduction to banking
Introduction to bankingIntroduction to banking
Introduction to bankingvtu
 
BANKER CUSTOMER RELATIONSHIP
BANKER CUSTOMER RELATIONSHIPBANKER CUSTOMER RELATIONSHIP
BANKER CUSTOMER RELATIONSHIPfiiimpact
 
Banking system ppt
Banking system pptBanking system ppt
Banking system pptLohith Lohi
 

Viewers also liked (10)

Introduction to banking
Introduction to bankingIntroduction to banking
Introduction to banking
 
Introduction to banking
Introduction to bankingIntroduction to banking
Introduction to banking
 
Bank security
Bank securityBank security
Bank security
 
Banking locker security using Image processing
Banking locker security using Image processingBanking locker security using Image processing
Banking locker security using Image processing
 
Banking instruments
Banking instrumentsBanking instruments
Banking instruments
 
Introduction to banking
Introduction to bankingIntroduction to banking
Introduction to banking
 
BANKER CUSTOMER RELATIONSHIP
BANKER CUSTOMER RELATIONSHIPBANKER CUSTOMER RELATIONSHIP
BANKER CUSTOMER RELATIONSHIP
 
Types of bank customers
Types of bank customersTypes of bank customers
Types of bank customers
 
Banking system ppt
Banking system pptBanking system ppt
Banking system ppt
 
Special type of customer of bank & principles
Special type of customer of bank & principlesSpecial type of customer of bank & principles
Special type of customer of bank & principles
 

Similar to Bank locker system

Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking SystemTarek Erin
 
User authentication
User authenticationUser authentication
User authenticationCAS
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptxssuserb46d43
 
Bank security using MC
Bank security using MCBank security using MC
Bank security using MCEsakkiappan .G
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSmart Assessment
 

Similar to Bank locker system (20)

Atm software
Atm softwareAtm software
Atm software
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Biometrics
BiometricsBiometrics
Biometrics
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Block Chain technology.pptx
Block Chain technology.pptxBlock Chain technology.pptx
Block Chain technology.pptx
 
Access controls
Access controlsAccess controls
Access controls
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
Access Control
Access ControlAccess Control
Access Control
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Design and Construction of Digital Locking System
Design and Construction of Digital Locking SystemDesign and Construction of Digital Locking System
Design and Construction of Digital Locking System
 
User authentication
User authenticationUser authentication
User authentication
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx49646489-PALM-VEIN-TECHNOLOGY.pptx
49646489-PALM-VEIN-TECHNOLOGY.pptx
 
Bank security using MC
Bank security using MCBank security using MC
Bank security using MC
 
Security Challenges in Emerging Technologies
Security Challenges in Emerging TechnologiesSecurity Challenges in Emerging Technologies
Security Challenges in Emerging Technologies
 

Recently uploaded

2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfDrew Moseley
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHSneha Padhiar
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSneha Padhiar
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSsandhya757531
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmDeepika Walanjkar
 

Recently uploaded (20)

2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Immutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdfImmutable Image-Based Operating Systems - EW2024.pdf
Immutable Image-Based Operating Systems - EW2024.pdf
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACHTEST CASE GENERATION GENERATION BLOCK BOX APPROACH
TEST CASE GENERATION GENERATION BLOCK BOX APPROACH
 
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATIONSOFTWARE ESTIMATION COCOMO AND FP CALCULATION
SOFTWARE ESTIMATION COCOMO AND FP CALCULATION
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMSHigh Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
High Voltage Engineering- OVER VOLTAGES IN ELECTRICAL POWER SYSTEMS
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithmComputer Graphics Introduction, Open GL, Line and Circle drawing algorithm
Computer Graphics Introduction, Open GL, Line and Circle drawing algorithm
 

Bank locker system

  • 2. • In today's modern world, security plays an important role. • Every person has precious accessories like gold, jewelry or cash. • It is not enough to have these accessories, but security of this is very important, for this purpose we keep them in bank lockers. • Still we often hear or read in newspaper that some fake person has access the locker of another person and have stolen money. • In order to overcome this type of frauds, authentication of the person who wants to use the locker is very important. Introduction
  • 3. Objectives Banks offer locker facilities to individuals as and when required Both public as well as private sector banks offer this facility to needy individuals for a small annual fee These lockers are maintained in a secure facility that is under constant surveillance and security There are several advantages of availing a bank locker, a few best ones are listed as follows: • Softy. • Easy access. • Available in any bank branch. • Anyone can avail. • Nomination facility available.
  • 4. Proposed system • In this project we propose a Biometric based secure access which can provide a sophisticated theft alert system for bank locker system. • This system contains microcontroller, keypad, Biometric module and LCD display. • By using keypad we need to press the button to the three door opening purpose. • Then using biometric module to open the main door for authorized person. • This system offers better solution for the bank security system and it will also help us to track the person who tried to open the locker without the permission and proper authentication.
  • 6. About Microcontroller • PIC16F877A microcontroller is used for this project • It is 8-bit Microcontroller • System is RISC Architecture • It has Small set of Instruction set • It has 35-Instructions only • Compatibility: avail 28/40 Pin ICs
  • 7. Microcontroller overview • Operating Speed Max 20 MHz, Voltage-(2-5.5)v • Memory: Flash Program 8Kx14 Words, RAM 368 Bytes, EEPROM Data Memory 256 Bytes • Low power, High speed Flash/EEPROM Technology
  • 8. Features of Microcontroller • It has 5 Ports for Internal and External usage • It has on chip Timers. 3 Timers are avail • It has in built Analog to Digital Converter • In built Multiplexer availability for signal Selection • It has serial as well as Parallel Communication facilities • In built Capture, Compare and Pulse width modulation
  • 10. Characteristics of Biometrics  Any human characteristic can qualify as a biometric characteristic as long as it satisfies the following requirements:-  Universality  Distinctiveness  Permanence  Collectability
  • 12. Fingerprint Recognition  A fingerprint is made of a series of ridges and furrows on the surface of the finger.  Ridge ending, ridge bifurcation and minutiae points.  Algorithm is developed to distinguish whorl, arch and loop.
  • 15. 15
  • 16. ADVANTAGES • Provide high security. • No question arise to hack or crack system. • No need to remember username. • Easy to use. • Fully automatic system • Dual layer security with fingerprint and password option. • Theft protection and alert.
  • 17. Applications • In offices • In bank lockers • For used in identification. • In nuclear power plant control room. • All that places when unique identity & high security is required. • Cash caring vehicle
  • 18. References 1. A. Jain et al: “BIOMETRICS: Personal Identification in Networked Society”, Kluwer Academic Publishers, 1999, ISBN0-7923-8345-1. 2. S. Prabhakar, S. Pankanti, and A. K. Jain, “Biometric Recognition: Security and Privacy Concerns”, IEEE Security and Privacy Magazine, Vol. 1, No. 2, pp. 33-42, 2003. 3. http:// www.biometrics.org/ 4. http://www.biometricsconsotorium.com 5. http://www.howstufworks.com 6. http://www.youtube.com/watch?v=FCEyHiLxuC8