Escolar Documentos
Profissional Documentos
Cultura Documentos
Ramjee prasad
RH6802B54
10804900
B.Tech (LEET)
ECE-310
A card reader according to claim 3, Thus, although the security component cannot
wherein the transparent operating be in direct communication with the input
mode has four principal instructions, connector, it becomes possible to gain access
which are respectively: powering up to memory areas of this component: after
of the security component; reading of going into transparent mode, an address for
a data item at a memory address; access to a memory area ceases to be
writing of a data item to a memory interpreted as a memory address of the
address; and switching off the security microcontroller and becomes a memory
component. address of the security component. The
microcontroller will then execute an
addressing subroutine for the security
A card reader according to claim 1, component. Conversely, in normal mode, an
wherein the transparent operating instruction for addressing a memory area
mode has four principal instructions, supplied by the input connector is always
which are respectively: powering up interpreted as being an addressing instruction
of the security component; reading of for a memory area of the microcontroller.
a data item at a memory address;
writing of a data item to a memory In practice, the transparent operating mode has
address; and switching off the security four main instructions, which are respectively:
component.
Powering up of the security component;
WORKING:
Reading a data item at a memory address;
For this purpose, the invention proposes a
smart card reader whose microcontroller has Writing a data item to a memory address;
two operating modes, a normal operation, for
the use of a standard user, for executing the Switching off the security component.
fixed application program to which the reader
is dedicated, and a “transparent” operation, of If the security component has an electrically
which the standard user does not have use, in programmable non-volatile memory, notably
which the microcontroller can receive a smart for reasons of customisation, it will be possible
to have access to this memory, for the SONAR ranging module. This SONAR
application manager but not for the standard module sends out ultrasonic waves when
user, in order to change the data thereof. The initiated by a pulse at its input pin INIT, and
transparent operating mode will therefore when it receives back the ECHO, the ECHO
make it possible to modify the content of the pin goes high. A single pin of a port of the
areas which cannot be modified by the microcontroller can be used to initiate the
program executed in normal mode. SONAR. When the SONAR is initiated, a
counter is started in a register in the
MICRO CONTROLLER BASED microcontroller. And once the reflected back
SECURITY SYSTEM USING SONAR: waves reach the transducer of the SONAR
module the ECHO pin goes high. Now this
The use of SONAR in a security system, as high pulse is inverted using a 7404 NOT gate
used in our project, is a novel idea, and as far and then apllied at the INTO(negative edge-
as we could determine, extremely difficult, if triggered) pin of the microcontroller. INTO is
not impossible, to evade. The infrared beams an interrupt pin. So when a negative edge
have the disadvantages of covering just a appears at the pin, the control of the
limited area in a room and to cover a whole microcontroller goes to an interrupt subroutine
room requires many of these beams. This located at 0003H. After executing the interrupt
makes this technology very expensive. subroutine(given in the code) the counter
Temperature sensors can also be evaded as stops. Now, the content of the counter is stored
they can either be made extremely sensitive in a memory location. Then stepper motor is
and risk false tripping of the alarm due to rotated by a step. Then again the
changes in ambient temperature or made less same process as described above is repeated.
sensitive at the risk of allowing evasion. The The value of the counter in this case is stored
use of SONAR offers us many advantages. It in next memory location. Thus, when the
is nearly foolproof, albeit it be at the expense stepper motor completes one complete
of being extremely sensitive to the point that rotation, data (counter value) are stored in as
the only way to avoid tripping of the alarm is many memory locations as the number of steps
to make sure that the room it is covering is free taken by the stepper motor to complete one
from any movements. In this project we have rotation. The number of steps taken by the
designed and developed a unique security stepper motor depends on the angle the stepper
system that utilises the capabilities of motor deflects for each steps. In usually
microcontroller and a special purpose SONAR available (in college labs) stepper motor, if the
module. It is also extremely cost-effective angle of deflection is 1.8 degrees, then the
when compared to similar systems currently in number of steps taken =360/1.8 = 200 steps,
use. and if it is 0.9 degrees, number of steps taken
The principle of operation: = 360/0.9 = 400 steps. In this project, we used
a deflection of 1.8 degrees, which can be
This project has got a SONAR module programmed in the microcontroller. The
mounted on a stepper motor . As the stepper output pins of port 1- i.e., P1.0, P1.1, P1.2,
motor rotates, SONAR module sends out P1.3 are used to control the stepper motor.
ultrasonic waves and scans the area. So, if this
product is placed in the center of a room, it can Now as the stepper motor has completed one
scan the whole room and the range of scanning rotation. Now the stepper motor is ready to
depends on the SONAR module used. With a rotate in the directions opposite to that of the
Polaroid 6500 series sonar ranging module, the previous rotation (this is to avoid stretching of
range is about 6" to 35ft. the wire connections between the main PCB
and the SONAR module mounted on the
The inspiration for the product was from the stepper motor).Again SONAR is initiated,
idea used in MTI RADAR. In MTI RADAR, value of the counter at the time ECHO pin
targets are determined by comparing the echo goes HIGH is compared with the memory
pulses obtained from successive scanning. In location
this project we intend to use a SONAR where the data for the same position of the
module. This is a Polaroid 6500 series stepper in the previous rotation stored. If there
is a difference in value of the memory location
and the present counter value, we can assume amplified and given to the PLL section, where
that an intruder has intruded in to that position its frequency is locked to the transmitted
scanned by the SONAR. Now the pin P3.4 of frequency. The transmitter and receiver are
the microcontroller goes HIGH and switches
arranged such that the transmitted IR rays fall
on the FM transmitter and thus the buzzer in
the FM receiver at the hands of the security directly onto the phototransistor LI4GI of the
starts beeping signalling about the intrusion. If receiver. The signal received by T2 is
there is no difference between the memory and amplified by transistor T3 and operational
counter values, stepper motor is further amplifier µA741 (IC2). Series input resistor
deflected by a step, then again R8 and feedback resistor R9 determine the
SONAR is initiated, counter is started and then gain of op amplifier IC2. The amplified single
stopped at HIGH on the ECHO pin, then the
so applied to pin 3 of PLLLM567 (IC3)
value of counter is compared with the content
of the corresponding memory location for the through capacitor C4.
same position of stepper during the previous
ICLM567 is highly stable PLL with
rotation. And this continues until an intrusion
occurs. So, a suitable program for the above synchronous AM lock detection and power
processes has to be written in to the ROM of output circuitry it is primarily used as
the microcontroller. frequency decoder which drives a load
whenever a sustained frequency falling within
HOME SECURITY SYSTEM: its detection band is present in its self biased
input. The centre frequency of the determined
Introduction: by external components.
Protect our family and valuables with this In the absence of any input single, the center
microcontroller based security system frequency of PLL’s eternal free running,
knowing that should anyone trying to break current control oscillator is determined by
into our home, an alarm will go ON and the resistor R12 abed capacitor C8.
police will be alerted immediately. The
microcontroller based security system consists Preset VR2 is used for tuning IC3 to the
of transmitter, receiver, phase locked loop and desired center frequency in the 6-10 kHz
processing section. range,
Transmitter Section:
The transmitter and receiver are arranged such
that the transmitted IR rays fall directly onto
the phototransistor LI4GI of the receiver. The
signal received by t2 is amplified by transistor
t3 and operational amplifier µA741 (IC2).
Series input resistor R8 and feedback resistor
R9 determine the gain of op amplifier IC2.
The amplified single so applied to pin 3 of
PLLLM567 (IC3) through capacitor c4.
Receiver Section:
In the absence of any input single, the centre The actual-size, double-size track lay-outs for
frequency of PLL’s eternal free running, solder and component sides of the PCB for the
current control oscillator is determined by 8085 microprocessor-based home security
resistor R12 abed capacitor C8. Preset VR2 is system are shown in figs5 and figs6,
used for tuning IC3 to the desired centre respectively, and their component layout.
frequency in the 6-10 kHz range, which should
match the modulating frequency of the As a result T5 is forward biased to energies
transmitter? Capacitor C6 and C7 are used as the relay RL5 the pole and normally closed
low pass filter. Ned out filter respectively contact of really contact of RL5 are connected
when the received signal is locked to to +5v.
frequency of transmitter signal pin 8 of IC3 The low order multiplex address and data
goes low and LED 1 glows. Since pin 8 is lines AD0 though AD7 of IC4 are connected
connected to the base of transistor T4 through to the EPROM (IC5) through the latch(IC6),
R13 its collector. while its high order address line A8 through
Working of the Circuit: A10 are directly connected to the EPROM.
Address lines A0 through A7. Are separated
The transmitting IR LED1 and phototransistor from data lines D0 through D7 by latch enable
T2 of the receiver are fitted to the gate such single.
the IR rays emitted by the LED directly fall on
the phototransistor. Address latch – enable pin 30 of the
microcontroller is connected to latch enable
The IR LED transmits a train of IR pulses. pin 11 Ic6. When ale high the latch us
These pulses are received by the receiver and transparent. The output changes according the
amplified by IC2. Output pin 8 of the PLL input data when ALE goes low, the low order
(IC3) is low when the PLL network is locked address is latched at the input of IC6.
to the transmitter frequency and relay RL5
energies to make PA line of IC7 low. Data lines D0 throughD7 of microcontroller
are connected to dated lines of IC5 and IC7
When someone walks through the gate to enter each. Chip sleets signal for IC5 is generated by
your home, the transmitted signal is RD and IO/M lines with the help of NAND
interrupted. Output pins 8 of the PLL network gate. The inverted IO/M signal provides CS
goes high and relay RL5 de-energies to make signal through IC7.
PA0 line of IC7 high. Now the microprocessor
starts working as per the program loaded in the IC AT89C51 is general purpose
EPROM. programmable device compatible with most
microcontrollers. It has three programmable
Relay RL4 energies to activate the siren. At ports, any of which can be ports and the
the same time, relay RL3 energizes to emulate remaining eight bits as port c.
lifting the telephone handset off the cradle to
provide the dial tone. After a few seconds, The eight bits of ports c can be used as
relay RL2 energies to short the redial button individual bits or grouped in two 4-bits ports
contacts. After the loaded number is dialled, it namely, c (upper) and c (lower). Ports A and C
switches off relay RL2. Then relay RL1 turns are configured as input ports and port B is
on the audio player. configured as output port A. is used for inter
detection,portB for activating the siren,
Here we have provided the same polarity- cassette player, telephone cradle switch and
reversal detection facility so that the audio redial button and port C for polarity reversal
player turns on only when polarity-reversal is detection.
detected.
The circuit for detecting the polarity reversal • Battery’s
detection the telephone line is built around
optocoupler IC8 and IC9. Normally, TIP is
positive with respect to RING lead of
telephone line. With the handset in off position
a nominal loop current of 10 mA is assumed to
flow through the telephone line. Resistor R23
is selected as 120 ohms to develop the voltage
of 1.2v. When the dc lines voltage polarity
reversal occurs, optocoupler IC8’s internal
LED conducts and LED3 glows to indicate CONCLUSION:
polarity reversal occurs. Simultaneously, In this paper, a low-cost low-power
optocoupler IC9’s internal LED goes off and microcontroller for a standalone security
its pin 5 (collector) goes high to provide line – access control system is presented. This
system is proposed to be a convenient
reversal sense signal to AT89C51.
alternative to other systems for consumers that
need moderate to high level security without
Fig.3 shows the power supply circuit. The AC
any networking considerations and at a low
mains are stepped down by transformer X1 to cost. It is crucial to reiterate that the level of
deliver a secondary output of 12V AC at 300 security provided by such a system heavily
ma. The transformer output is rectified by a depends on the security of the encryption
full-wave bridge rectifier. algorithm used in the encryption/decryption
process. Therefore, a good selection of the
Comprising diodes D7 through D10. encryption algorithm, similar to the one
Capacitor C12 acts as a filter to eliminate proposed in this paper is essential for the
ripples. IC10 and IC11 provide regulated 5v reliability of the security system.
and 9V power supplies, respectively.
References:
Capacitors C13 and C14 bypass any ripple
present in the regulated out-us. Switch S2 acts 1. http://www.123eng.com/projects/microco
as an ‘on’/’off’ switch.
ntroller_based_home_security_project.ht
Used Components: ml
2. http://www.atmel.com
• AT89C2051 3. http://www.electronics4u.com
• NE555 4. http://www.ttransenergie.com.au
• uA741 Operational Amplifier
• MCT2E Optocoupler
• Regulator (7805,7809)
• BC 548 NPN Transistor
• L14G1 Photo Transistor
• 1N4148 Switching Diode
• LED’s ( Red, IR)
• Resistor’s
• Capacitor’s
• Relay’s