Format For B.tech Project Synopsis (SHASHWAT)
Format For B.tech Project Synopsis (SHASHWAT)
BACHELOR OF TECHNOLOGY
Degree in
Electronics Engineering
1. SHASHWAT PANDEY
2. AMIT KUMAR
3. NAVED AHMED
4. PAWAN KUMAR
5. SHASWAT PANDEY
Bank lockers are popularly used by Indian population; they prefer keeping their Most valuable of
the in banks ’the bank have lockers rather such than in their homes that one key is with the user and
the bank has a master key. Moreover, they also have password which the user has to tell the bank
subordinate before going in the locker room, now if bank the user lockers loses the do key not then,
guarantees big full security safety risk of the.Commonusers’ the belongings user’s consent and can
easily be opened by any person without Biometric allows a person to be identified and
authenticatedbased on a set of recognizable and verifiable data, which are process unique and in
which specific to person’s them. Biometric characteristics authentication are compared is the with
the persons biometric “template”, wherein this reference model is first stored in database, and
thenbiometric identification is used to determine the identity of the person using the image of their
fingerprint, iris or face. Biometric data are considered as unique for every individual and cannot be
copied or stolen
In the real world, people are more concerned about the safety of their valuable things like jewelry,
money, important documents etc. So the bank lockers are the safest place to store them. The arrival
of fast growing technologies makes users to have high security systems with electronic
identification options. These identification technologies include Bank Lockers and ATM as well as
other intelligent cards, user IDs and password based systems and so on. Unfortunately, these
systems are not protected from hacker attacks, thefts, and forgotten passwords. In spite of all these
disadvantages these systems are still existing; however, the biometric or fingerprint authentication
based identification is the most efficient and reliable solution for stringent security [1]. Biometrics
identity. The physical characteristics used are fingerprint, hand, face, iris etc. and other
characteristics are signature, voice keystroke patterns etc. The conventional biometric system
operates in two modes; verification mode and identification mode. In the verification mode, the
system validates a person’s identity and in the identification mode the system recognizes an
individual by searching entire template data base for match. And the system performs one to many
comparisons to establish the individual identity or fails if the subject is not enrolled in the system
data base. Hence use of fingerprint to ensure security in the system is being explored. Although
safety is an important issue in the banking sector most advanced technologies are not being used
currently
The system is aimed to develop a prototype of a microcontroller- based locker system that can:
A. Enrol or delete fingerprints of the user and save these patterns in the database
B. Control the locker using GSM and send commands to it using the GSM connected through
OTP number .
C. If the locker renter whose fingerprint is used to open the locker has a problem with
fingerprint scanning due to injury or any treatment then a then pin is also provided for each
These are some of the existing Smart Security designs that have been implemented- GSM Based
Security System [3],[4] PIR sensor detects motion by sensing the difference in infrared or radiant
heat levels emitted by surrounding objects. The output of the PIR sensor goes high when it detects
any motion. The range of a typical PIR sensor is around 6 meters or about 30 feet. When the PIR
sensor detects any motion, the output of the sensor is high. This is detected by the Arduino. Then it
communicates with the GSM module via serial communication to make a call to the pre-programmed
mobile number. An important point to be noted about PIR sensors is that the output will be high
when it detects motion. Use of finger prints recognition for authentication of secure locker systems
have been discussed [ 5-7] and performance of such systems for ration card application is also
presented in [8]. Security threats in such systems such as dropping has been reported in literature
[10].
IR based security alarm system- IR based security alarm circuit can detect any movement and trigger
the alarm [9]. This circuit is very useful in homes, banks, shops, restricted areas where an alert alarm
is needed on any suspicious movement. This circuit is based on IR sensor where an IR beam is
continuously falling on a photodiode, and whenever this Infrared beam breaks, by any kind of
movement, alarm is triggered. In this IR based security alarm circuit, IR LED is placed in front of
photodiode, so that IR light can directly fall on photodiode. Whenever someone moves through this
beam, IR rays stops falling on photodiode and Buzzer start beeping. Internet of things has been
governing the electronics with cloud services influencing the ever increasing electronics product
segment. Security and safety has always become a basic necessity for urban population. The paper
proposes a security system based on Open source cloud server “things speak .com” and a low cost
esp8266 Wi-Fi module. The work presents a PIR module which constantly monitors the Home or
Work space. When the PIR module detects an intruder it sends a signal to the at mega 328p
microcontroller and the controller is connected to a Esp8266 Wi-Fi module and also to an alarm
system. The System transmits an alert signal to the Open source cloud which provides a alert signal
on the users mobile phone. The system employs a second esp8266 module which is programmed to
act as a web server, which allows the user to activate or deactivate the security system by means of
any device with internet. The system also employs a thumb print reader rs305 which controls the
opening and the closing of a safety locker door. Thus the system uses esp8266 Wi-Fi module and
atmega328p to control the security system from the user’s mobile phone by means of any device
with a potential internet connection. A four-digit code will be sent on authorized person mobile to
unlock. So biometric and Bluetooth security is more advantages than other system. This system can
also create a log containing check in and checkout of each user along with basic information
OVERVIEW OF THE PROPOSED SYSTEM AND COMPONENTS
REQUIRED
This on-board computer consists of number of input and output ports. The input and output
port of the micro controller are interfaced with different input and output modules depend
the requirements. In other words, micro controller acts as a communication medium for all
the modules involved in the project. The device also consists of Bluetooth device, Serial
Communication, Keypad, 16x2 LCD which displays the information about transactions, dc
power supply, alert unit. User need not carry any physical cards (credit, debit etc.) or mobile
phones for money transaction. User just need to keep finger print enter transaction amount
using keypad. This transaction information is sent to server over secure IOT (Bluetooth)
and further processing done there. If the transaction is successful, then user gets SMS
clock, 14 pins for an input output purpose, USB connection, reset button and power jack
microcontroller based embedded system applications. In order to process the analog data
given by analog sensors it also contains 10bit ADC (Analog to Digital converter)
Key pad
A keypad is a set of buttons arranged in a block or "pad" which usually bear digits, symbols
and usually a complete set of alphabetical letters. If it mostly contains numbers, then it can
also be called a numeric keypad. Keypads are found on many alphanumeric keyboards and
on other devices such as calculators, push button telephones, combination locks, digital
door locks, which require mainly numeric input. 4*4 matrix keypad is used to enter the
SIM 800L is a miniature cellular module which allows for GPRS transmission, sending
and receiving SMS and making and receiving voice calls as shown in fig. 4. Low cost and
small footprint and quad band frequency support make this module perfect solution for
This 2×16-character LCD Module with YELLOW Backlight uses an I2C interface to
communicate with the host microcontroller, as shown in fig. 5. This budget-conscious LCD
is used on projects requiring the display of text, data, or ASCII characters of all types.
Figure 5 16X2 LCD Display
CIRCUIT DIAGRAM
In this system first a person enrolls user name and password and mobile number. If user
name and password matches, then Finger print of the person will be detected and stored
with ID. A default password “1234” has been set by coding the Arduino. When a password
is keyed in, it is compared with the stored password. If it is correct, then a 4 digit OTP is
generated and sent to the registered mobile number. Also, the message ‘OTP sent’ is
displayed. If the password is wrong, then the message ‘Sending SMS’ is displayed. The
output of the system is displayed in fig 7a and 7b. The buzzer will also beep once when
In this paper, an IOT based secure digital locker system has been designed and
implemented. Finger print and GSM security system will provide higher security than
xisting system. The design system which when implemented would surely give a very
good protection of the lockers curbing theft and making the lockers more reliable. The
assurance it will give to the bank customers will force them to use it
REFERENCE
1. Sagar S. Palsodkar, Prof S.B. Patil, “Review: Biometric and GSM Security for Lockers”
Int. Journal of Engineering Research and Applications, Vol. 4, Issue 12(Part 6), December
2019.
International Journal of Engineering Sciences & Research Technology, ISSN: 2277- 9655,
October, 2021.
6. Pramila D Kamble and Dr. Bharti W. Gawali “Fingerprint Verification of ATM Security
7. Ashish M. Jaiswal and MahipBartere “Enhancing ATM Security Using Fingerprint and
8. Bhalekar S.D., Kulkarni R.R., Lawanda A.K., Patil V.V., “On line Ration Card System
9. S. Yuvaraj Prof. and Ramesh S., "Improved Response Time on Safety Mechanism Based
10. J. Villard and P. Piantanida, “Secure multiterminal source coding with side information
at the eavesdropper,” IEEE Trans. Inf. Theory, vol. 59, no. 6, Jun. 2013. Cite this article as
: Dr. Sheeja V Francis, Rupus Daniel J, Sarath K, Surendar N, Sathish Kumar S, "IoT
Based Bank Locker System using OTP Technology", International Journal of Scientific
Research in Science, Engineering and Technology (IJSRSET), Online ISSN : 2394-4099,
Print ISSN : 2395-1990, Volume 10 Issue 1, pp. 219-223, January-February 2023. Journal
URL : https://ijsrset.com/IJSRSET231013