Project Report
Project Report
PROJECT REPORT
ON:
SUBMITTED BY
21610311001 Jaydev Arpada
21610311003 Harsh Chavada
21610311010 Durg Pratap singh
GUIDE
Kamlesh D. Thummar
GOVERNMENT POLYTECHNIC AHMEDABAD
380015, AMBAWADI, AHMEDABAD
CERTIFICATE
Seal of Department
ACKNOWLEDGEMENT
First of all, I’d like to thank the almighty God, who gave me the opportunity, strength and
guided to work on the right path of my life. My greatest thanks are to my parents who
bestowed ability to complete this work.
I would like to express my deep gratitude and sincere regards for all those people who
have helped in the completion of this report. First of all I would like to thank my project
guide Mr. K. D. Thummar, Mr. Ujjval Buch, Mrs. Kerolin shah, Mr Ajay
Chandegara for his valuable guide and support.
I would also like to thank our Head of Department Mr. Manish Charel for his extensive
support.
I am also very thankful to the entire faculty and staff members of Electronics and
Communication Department for their direct-indirect help, cooperation and love. I wish
to thank all my classmates for their time to time suggestion and cooperation.
3. OVERVIEW 6
4. DEEP ANALYSIS 7
ESP32 microcontroller
RFID Reader
R307 fingerprint sensor
LCD 16 x 2
4x4 Keypad
5. EXPLANATION 33
Hardware
Software
6. CONCLUSION 35
7. FUTURE SCOPE 37
INTRODUCTION
In an era where security is of paramount importance, the need for advanced and reliable
access control systems is evident. Traditional lock and key mechanisms, while effective to
a certain extent, are susceptible to vulnerabilities such as key duplication and unauthorized
access. To address these shortcomings, the integration of modern technologies like Radio-
Frequency Identification (RFID), fingerprint recognition, and microcontroller-based
systems has become increasingly prevalent.
The aim of this project is to design and implement an automatic lock system that leverages
the combined benefits of RFID, fingerprint authentication, and the ESP32 microcontroller
platform. By integrating multiple layers of authentication, this system offers enhanced
security while providing users with a seamless and convenient access experience.
1
RATIONALE:
Traditional lock and key systems are no longer sufficient to meet the evolving security
needs of modern environments. With the rise of digitalization and the Internet of Things
(IoT), there is a growing demand for access control systems that offer robust security
features without compromising on user convenience.
RFID technology enables quick and contactless authentication, making it ideal for
access control applications. Fingerprint recognition, on the other hand, offers a highly
secure form of biometric authentication that is unique to each individual. By combining
these two technologies with the processing power and versatility of the ESP32
microcontroller, we can create a sophisticated yet user-friendly automatic lock system.
OBJECTIVES:
1. Enhanced Security: By requiring both RFID card authentication and fingerprint
verification, the system ensures that only authorized individuals can gain access to the
secured area.
3. Scalability: The modular design of the system allows for easy scalability, enabling the
addition of new users and devices as needed.
4. Customization: The ESP32 platform offers flexibility for customization, allowing for
the integration of additional features such as remote monitoring and access logs.
5. Reliability: The use of reliable components and thorough testing ensures the reliability
and durability of the lock system, minimizing the risk of unauthorized access or system
failures.
2
SCOPE OF WORK:
The scope of this project encompasses the design, implementation, and testing of an
automatic lock system using RFID, fingerprint, and ESP32 technologies. Key
components include the ESP32 development board, RFID reader, fingerprint
sensor, and electric lock mechanism. The system will be designed to provide robust
security features while maintaining user convenience and ease of use. Additionally,
measures will be taken to ensure the reliability and resilience of the system under
various operating conditions.
The aim of this innovative project is to conceptualize, design, and execute a cutting-
edge automatic lock system that harnesses the synergistic advantages of RFID
technology, fingerprint authentication, and the powerful ESP32 microcontroller
platform. This system represents a significant advancement in security technology by
seamlessly integrating multiple layers of authentication, thereby fortifying access
control measures against unauthorized entry attempts.
The utilization of the ESP32 microcontroller platform serves as the backbone of the
system, providing computational power, connectivity, and versatility. Leveraging the
ESP32's capabilities, the system can efficiently manage authentication processes, store
user credentials securely, and communicate with external devices or networks for
comprehensive access management.
Moreover, this system prioritizes user experience by offering a seamless and intuitive
access interface. Upon successful authentication, users can effortlessly unlock doors
or access restricted areas, eliminating the need for cumbersome physical keys or
complex access codes. This intuitive design not only enhances convenience but also
promotes user adoption and satisfaction.
3
2. CIRCUIT DIAGRAM:
4
CIRCUIT ANALYSIS:
The system architecture serves as the foundation of the project, dictating how different
components interact to achieve the desired functionality. Here's a more detailed
explanation of each component:
ESP32 Microcontroller: The ESP32 serves as the brain of the system, responsible for
coordinating all operations. It communicates with the RFID reader, fingerprint sensor,
and lock mechanism to facilitate authentication and access control. Its processing
power and built-in features make it an ideal choice for this application.
RFID Reader: The RFID reader is responsible for detecting and reading RFID
tags/cards. It emits radio waves to communicate with RFID tags, which respond with
unique identification numbers. The reader then sends this data to the ESP32 for
processing. RFID technology offers the advantage of contactless authentication,
making it suitable for applications where convenience is paramount
Fingerprint Sensor: The fingerprint sensor captures and verifies fingerprints for
biometric authentication. It scans the unique patterns of ridges and valleys on a
person's fingertip and compares them against stored templates to determine a match.
Fingerprint recognition provides a high level of security, as each person's fingerprint
is unique and cannot be easily replicated.
Display and Keypad: The display and keypad provide a user interface for interaction
and feedback. The display can show messages and prompts, while the keypad allows
users to input PIN codes or perform other actions. This optional feature enhances the
usability of the system, especially in scenarios where visual feedback or manual input
is required.
5
3. OVERVIEW:
The ESP32's integration with Wi-Fi networks not only facilitates seamless
connectivity but also enables remote monitoring and control functionalities,
affording users the convenience of keeping a vigilant eye on their property from
virtually anywhere in the world. This remote accessibility not only enhances peace
of mind but also ensures prompt response to any security-related events or
emergencies.
6
4.DEEP ANALYSIS:
ESP32 Microcontroller:
Development of available hardware modules and processors. Development boards are
produced on which a communication interface and peripherals are implemented together
with the main processor chip. Nowadays, the popularity of the ESP32 chip grows and
now both hardware variants of this chip and various branches of its software development
are developing. A wide community of developers, but also academics deal with utilizing
the higher generation ESP32 chip as the successor of ESP8266 microcontroller
The latest scientific articles prove the wide use of the ESP32 chip in various
areas. The general possibilities of using a microcontroller with a
recommendation for electronic projects are described in the article [1]. Paper
provides a comparative analysis of the ESP32 with some other market
competitors and introduces the microcontroller specification, features and
programming details.
7
ESP32 is powerful SoC (System on Chip) microcontroller with integrated Wi-Fi 802.11
b/g/n, dual mode Bluetooth version 4.2 and variety of peripherals. It is an advanced
successor of the 8266 chip primarily in the implementation of two cores clocked in different
version up to 240 MHz.
Compared to its predecessor, except these features, it also extends the number of GPIO pins
from 17 to 36, the number of PWM channels per 16 and is equipped with 4MB of flash
memory.
The ESP32 chip has been developed by the Espressif Systems company, which currently
offers several ESP32 versions of the SoC in the form of ESP32 Developer Kit, the ESP32
Wrover Kit, which also includes an SD card and 3.2 '' LCD display and last but not least
the ESP32 Azure IoT kit with USB Bridge and other built-in sensors.
In addition to Espressif Systems, other producers are devoted to these chips - SparkFun
with ESP32 Thing DB, WeMoS with its TTGO, D1, Lolin32 and Lolin D32, Adafruid (with
Huzzah32), DF Robot (ESP32 FireBeeatle) and many other manufacturers sometimes offer
good and sometimes bad clones
ESP32 includes two core (Xtensa LX6 processor made with 40 nm technology). CPU cores
can be individually controlled. There is 520 KB of on-chip SRAM for data and instructions
available. Some SoC modules such as ESP32-Wrover features 4 MB of external SPI flash
and an additional 8 MB of SPI PSRAM (Pseudo static RAM). We have the possibility to
use SPI, I2S, I2C, CAN, UART, Ethernet MAC, and IR in various quantities, depending
on the type of the board
8
Figure: Various ESP32 boards which we tested
Standard equipment also includes Hall Effect sensor, temperature sensor and touch
sensor, other built-in sensors are implemented in Azure IoT and Developer kit. SoC
also provides Cryptographic hardware acceleration: AES, SHA-2, RSA, and Elliptic
Curve Cryptography (ECC) and random number generator (RNG).
Figure 1 shows the ESP32 microcontroller variants with which we are working at the
Department of Control System and Instrumentation.
Development on the ESP32 platform gives us many ways to use. This section describes
some basic setup and configuration for the ESP32 platform environment. The ESP32
device can be developed from any Windows, Linux or MacOS operating system
TTGO T-Display stands out with its integrated 1.14-inch LCD display and additional
features like buttons and microSD support, ideal for projects requiring a compact
display interface. On the other hand, the ESP-32S offers a minimalist design with WiFi
and Bluetooth capabilities, suited for cost-effective prototyping. Lastly, the LilyGO T-
Watch caters to wearable IoT projects, featuring a 1.54-inch TFT display, sensors, and
connectivity options tailored for smartwatch applications. Each board offers unique
features and advantages, catering to a diverse range of project requirements and
development preferences.
9
1. ESP32 DevKitC:
The ESP32 DevKitC is a compact development board designed for prototyping and testing
IoT applications.It features the ESP32-WROOM-32 module, which includes a dual-core
processor, WiFi, Bluetooth, and various peripheral interfaces.
The board includes a USB-UART bridge circuit, making it easy to program and
communicate with the ESP32 via USB. It offers onboard buttons and LEDs for user
interaction and debugging purposes.
The DevKitC is compatible with the Arduino IDE and Espressif's ESP-IDF development
framework, providing flexibility for developers.
2. ESP32 NodeMCU:
The NodeMCU is a widely-used ESP32 development board known for its ease of use and
compatibility with the Arduino ecosystem. It features the ESP32-WROOM-32 module and
includes a built-in USB-to-serial converter, simplifying programming and
communication.The board offers a compact form factor and includes GPIO headers for
connecting external devices and sensors.
NodeMCU boards typically come with a Lua interpreter pre-installed, enabling rapid
prototyping and development. It's suitable for beginners and experienced developers alike,
offering a balance between functionality, affordability, and ease of use.
10
ESP32 APPLICATION:
The experience gained from the use of individual development environments on the
Windows platform has been used in the practical implementation of various applications
in the field of acquisition and processing of measured data from IoT sensors on the ESP32
microcontroller.
The block diagram of the embedded system is shown in Figure 2
we focused on the visualization of measured data on a display that is part of our embedded
system. The communication buses are different depending on the type and size of the
display and the size of the display depends on what kind of information we will display
11
For lower resolution displays, we decided to show only the status information and we sent
the measured data for the evaluation to the superior system. The information we show on
the given display is, for example, whether the microcontroller has a network connection,
which current job is processing, what the actual measurement cycle is, etc.
On displays that have a higher size and resolution, we also show the graphical flow of the
measured values in addition to the status information. In case we simultaneously measured
multiple variables at the same time, only the chart for one quantity was displayed, with
the possibility of switching between graphs of the measured quantities.
We have used multiple types of displays for our embedded system.
12
CONCLUSION:
We summarized in this article the most commonly used application development platforms
for the ESP32 microcontroller. For each platform, we have described the benefits,
recommendations for which type of application the platform is suitable for, and at the same
time we have compared the level of prerequisites for that platform in terms of software
skills and experience of the developer.
We recommend to use the Arduino ESP 32 Core extension platform for beginning
developers on the ESP32 platform and also for quickly verification of application design,
but for the product development and better use of hardware properties (programming of
two RTOS cores), we recommend the ESP IDF platform, in which development is provided
through C language with a native firmware downloader.
13
RFID Reader:
Radio Frequency Identification (RFID) is a technology that has been widely integrated into
many aspects of daily life. The proliferation of Radio Frequency Identification has caused
changes in the way people, pets, sales, goods, etc., are currently being identified and tracked
worldwide. RFID technology uses RFID chips or cheap wireless. It is PN532 NFC RFID
reader
tags that store data related to that item. The nearest reader may have access to that stored
information. Unlike line technology related to bar code technology. And there are some
programs to implement RFID code, programs like Arduino, JVR… etc.
We have developed a system that uses a Radio Frequency Identification (RFID) to create
an automated secure entry system that can store the data of user arrival and can also work
like an attendance system. This system uses a RFID scanner that scans the RFID tag of the
user and checks whether the unique RFID of that particular RFID tag is stored in the
database or not. If it is stored in the database then it opens the door otherwise it starts an
alarm system
RFID tags can be divided into three categories based on the range of frames they use to
communicate with the data:
low frequency (LF), high frequency (HF) and high frequency (UHF). In general, the
decrease in the frequency of
the Radio Frequency Detection System, shortens the reading distance and reduces the data
reading rate.
14
RFID tags can be divided into three categories based on the range of frames they use to
communicate with the data, low frequency (LF), high frequency (HF) and high frequency
(UHF). In general, the decrease in the frequency of the Radio Frequency Detection System,
shortens the reading distance and reduces the data reading rate.
The PN532 is a popular NFC (Near Field Communication) and RFID (Radio-Frequency
Identification) reader chip developed by NXP Semiconductors. It's commonly used in
various applications for reading and writing NFC and RFID tags/cards. Here's a breakdown
of its key features and functionality:
1. NFC and RFID Compatibility: The PN532 chip supports both NFC and RFID
technologies, making it versatile for a wide range of applications.
3. Read/Write Capabilities: The PN532 can read and write data to NFC tags/cards and
RFID tags/cards. This allows for various applications such as access control, contactless
payment systems, and inventory tracking.
5. Security Features: The PN532 chip includes security features such as built-in support
for encryption and authentication protocols to ensure secure communication between the
reader and NFC/RFID tags/cards.
6. Embedded Antenna: Some versions of the PN532 come with an embedded antenna,
simplifying the design of NFC/RFID reader devices by eliminating the need for an external
antenna.
7. Low Power Consumption: It's designed to operate with low power consumption,
making it suitable for battery-powered devices and applications where power efficiency is
important.
8. Software Support: NXP provides software libraries and development tools to facilitate
integration of the PN532 chip into various platforms and programming languages, making
it easier for developers to work with the chip.
Overall, the PN532 NFC RFID reader chip is a versatile and feature-rich solution for
integrating NFC and RFID capabilities into electronic devices and systems. It's widely used
in industries such as transportation, retail, security, and IoT (Internet of Things).
15
PN532 NFC RFID reader chip works and its processes:
1.Initialization: The PN532 chip needs to be initialized before it can start reading or
writing NFC/RFID tags/cards. During initialization, communication interfaces are
configured, and any necessary settings are set up.
2. Antenna Activation: The chip activates its antenna to start scanning for nearby
NFC/RFID tags/cards. The antenna generates an electromagnetic field that powers passive
NFC/RFID tags/cards within its range.
3. Tag Detection: When a tag enters the electromagnetic field generated by the PN532's
antenna, the chip detects the tag's presence. This detection is usually done through
modulation and demodulation of the electromagnetic field.
4. Communication Protocol: Once a tag is detected, the PN532 chip communicates with
the tag using the appropriate NFC or RFID communication protocol. This could involve
protocols such as ISO/IEC 14443 for NFC tags/cards or ISO/IEC 15693 for RFID
tags/cards.
5. Data Exchange: After establishing communication with the tag, the PN532 chip can
exchange data with it. This could involve reading data from the tag, writing data to the
tag, or performing other operations such as authentication or encryption.
6. Error Handling: The chip implements error handling mechanisms to deal with
communication errors, collisions, or other issues that may occur during data exchange with
the tag.
7.Processing Data: The PN532 chip processes the data received from the tag according
to the requirements of the application. This could involve parsing data, performing
security checks, or executing specific actions based on the tag's information.
8. Application Integration: Finally, the data obtained from the NFC/RFID tag by the
PN532 chip is typically used by the application or system it's integrated with. This could
include tasks such as access control, payment processing, inventory tracking, or any other
functionality relevant to the application.
Throughout this process, the PN532 chip manages the communication between the reader
and the NFC/RFID tags/cards, handles the underlying protocols, and ensures the reliability
and security of the data exchange. Its flexibility and capabilities make it a popular choice
for a wide range of NFC and RFID applications.
16
The light spectrum encompasses the full range of electromagnetic radiation emitted by
celestial bodies and artificial sources alike. Spanning from the longest radio waves to the
shortest gamma rays, this spectrum is divided into several distinct regions. Radio waves,
with their lengthy wavelengths, facilitate communication and radar systems.
Microwaves, shorter in wavelength, find applications in telecommunications and
microwave ovens. Beyond the visible spectrum lies infrared light, felt as heat and utilized
in night-vision technology. Visible light, perceivable by humans, exhibits a colorful array
from violet to red, each color corresponding to a specific wavelength. Ultraviolet light,
just beyond violet, causes sunburn and is used in various applications including
sterilization. X-rays, possessing even shorter wavelengths, are instrumental in medical
imaging. Finally, gamma rays, with the shortest wavelengths, are emitted by radioactive
materials and are harnessed for cancer treatment and sterilization processes.
Understanding the light spectrum is pivotal across scientific domains, from astronomy to
medicine, elucidating the diverse phenomena and applications governed by
electromagnetic radiation.
Frequency Types
17
Conclusion:
Together, these components enable the reader to capture, decode, and process data
transmitted by RFID tags effectively.
The RFID reader plays a crucial role in applications like access control, asset tracking, and
inventory management, providing reliable performance, robust security, and seamless
integration with existing systems. Its versatility and capabilities make it an essential tool in
modern RFID-based solutions, contributing to improved efficiency, accuracy, and security
across various industries.
The light spectrum serves as a cornerstone of modern physics and astronomy, providing
invaluable insights into the nature of matter and the universe. By studying the emission and
absorption spectra of celestial objects, astronomers can determine their composition,
temperature, and motion. From the redshift of distant galaxies to the spectral lines of
elements in stars, the light spectrum offers a window into the cosmos.
Visible light, the most familiar part of the spectrum, not only allows us to perceive the
world around us but also plays a crucial role in photosynthesis, the process by which plants
convert light energy into chemical energy. Beyond visible light, ultraviolet radiation has
both beneficial and harmful effects, from aiding in vitamin D synthesis to causing sunburn
and skin cancer.
X-rays revolutionized the field of medicine with their ability to penetrate soft tissues and
create detailed images of the human body, aiding in the diagnosis and treatment of various
medical conditions. Similarly, gamma rays are used in cancer treatment to destroy
cancerous cells and sterilize medical equipment.
In essence, the light spectrum is not just a scientific concept but a practical tool that shapes
our understanding of the universe and drives technological innovation. Its exploration and
exploitation continue to push the boundaries of human knowledge and capabilities,
promising new discoveries and advancements in the years to come.
18
R307 Fingerprint Module
R307 Fingerprint Module consists of optical fingerprint sensor, high-speed DSP processor,
high-performance fingerprint alignment algorithm, high-capacity FLASH chips and other
hardware and software composition, stable performance, simple structure, with fingerprint
entry, image processing, fingerprint matching, search and template storage and other
functions
The R307 Fingerprint Module is a versatile biometric sensor designed specifically for
fingerprint recognition applications. It provides users with the capability to enroll
fingerprints securely into its database, preserving unique features for subsequent
comparison. Renowned for its high accuracy and rapid recognition speed, the module
ensures reliable authentication while maintaining minimal false acceptance and rejection
rates. Furthermore, it offers convenient storage options, whether onboard or external, for
storing fingerprint templates. Its seamless integration with various microcontroller
platforms simplifies the development process for incorporating fingerprint recognition
functionality into a wide array of projects. Widely employed in access control systems,
time and attendance tracking, and secure authentication setups, its compact form factor and
low power consumption render it ideal for a multitude of biometric identification needs.
19
The R307 Fingerprint Module is a compact and versatile biometric sensor designed for
fingerprint recognition applications. Here's an overview of its features and capabilities:
1. Fingerprint Enrollment: The module allows users to enroll fingerprints into its
database. During the enrollment process, the module captures the unique features of a
fingerprint and stores them securely for later comparison.
2. Fingerprint Matching: Once fingerprints are enrolled, the module can compare new
fingerprints against the stored templates to verify identity. It uses advanced algorithms
to accurately match fingerprints, providing a reliable authentication mechanism.
3. High Accuracy: The R307 module offers high accuracy in fingerprint recognition,
ensuring minimal false acceptance and rejection rates. This makes it suitable for
applications where security is paramount.
4. Fast Recognition Speed: With its efficient processing capabilities, the module
delivers fast fingerprint recognition speed, enabling quick authentication in real-time
applications.
5. Template Storage: The module typically has onboard memory or external storage
options to store fingerprint templates. This allows for the storage of a large number of
fingerprints depending on the capacity of the storage medium.
6. Easy Integration: It features a simple interface for integration with various
microcontroller platforms such as Arduino, Raspberry Pi, and other embedded
systems. This makes it easy for developers to incorporate fingerprint recognition
functionality into their projects.
7. Versatile Applications: The R307 module finds applications in various fields such as
access control systems, time and attendance tracking, secure authentication for devices,
and other biometric identification systems.
8. Compact Design: Its compact size and low power consumption make it suitable for
integration into space-constrained devices and battery-powered applications.
20
SPECIFICATIONS:
The R307 fingerprint module has two interface TTL UART and USB2.0, USB2.0 interface
can be connected to the computer; RS232 interface is a TTL level, the default baud rate is
57600, can be changed, refer to a communication protocol; can And microcontroller, such
as ARM, DSP and other serial devices with a connection, 3.3V 5V microcontroller can be
connected directly.
Needs to connect the computer level conversion, level conversion note , embodiments such
as a MAX232 circuit.
21
SCHEMATIC DIAGRAM
A schematic diagram for the R307 Fingerprint Module would illustrate the various
components and connections within the module. Here's an explanation of what each part
might represent:
When there's no finger on the prism, the light will be completely reflected off from the
surface, producing a plain image in the image sensor. When TIR occurs, a small amount
of light leaked to the external medium and it is called the Evanescent Wave. Materials with
different refractive indexes (RI) interact with the evanescent wave differently.
When we touch a glass surface, only the ridges make good contact with it. The valleys
remain separated from the surface by air packets. Our skin and air have different RIs and
thus affect the evanescent field differently. This effect is called Frustrated Total Internal
Reflection (FTIR). This effect alters the intensities of the internally reflected light and is
detected by the image sensor (see this image). The image sensor data is processed to
produce a high contrast image which will be the digital version of the fingerprint.
23
In capacitive sensors, which are more accurate and less bulky, there's no light involved.
Instead, an array of capacitive sensors are arranged on the surface of the sensor and allowed
to come in contact with the finger. The ridges and air packets affect the capacitive sensors
differently. The data from the sensor array can be used to generate a digital image of the
fingerprint.
24
Security: The PIN function adds an extra layer of security to the printer. Users must enter
the correct PIN code to access specific functions or settings.
Access Control: It allows administrators or users to control who can perform certain tasks
on the printer. Only those who know the correct PIN code can access restricted functions.
Settings Protection: Certain settings or sensitive functions on the printer may require
authorization via PIN to prevent unauthorized access or tampering.
Audit Trail: The PIN function might also log each instance of PIN usage, providing an audit
trail for administrators to track who accessed the printer and when.
Customization: Users may have the option to set their own PIN codes, providing a level of
customization and personalization to the security feature .
25
Conclusion:
The conclusion regarding the security system of the R307 fingerprint printer would depend
on factors such as its biometric authentication effectiveness, data encryption, access control
features, vulnerability assessment, compliance with standards, and recommendations for
improvement. It would aim to assess the system's robustness, identify any weaknesses, and
suggest measures for enhancing security.
In conclusion, the schematic diagram of the fingerprint sensor module, such as the R307,
reveals the intricate integration of various components essential for fingerprint recognition
functionality. It showcases the synergy between the fingerprint sensor, microcontroller unit,
memory components, communication interfaces, power supply circuitry, LEDs, buttons,
external connectors, resistors, and clock source. This holistic depiction underscores the
module's capability to capture, process, and store fingerprint data, communicate with
external devices, provide user feedback, and ensure stable operation. By elucidating the
internal architecture and connections, the schematic diagram offers valuable insights into
the operational principles and potential applications of the fingerprint sensor module in
security systems, access control, attendance tracking, and other biometric identification
solutions.
26
LCD 16 x 2:
The term LCD stands for liquid crystal display. It is one kind of electronic display module
used in an extensive range of applications like various circuits & devices like mobile
phones, calculators, computers, TV sets, etc. These displays are mainly preferred for multi-
segment light-emitting diodes and seven segments. The main benefits of using this module
are inexpensive; simply programmable, animations, and there are no limitations for
displaying custom characters, special and even animations
The LCD 16x2 is a display screen with two rows of 16 characters each. It shows
alphanumeric characters and is commonly used in electronic devices like digital clocks and
DIY projects. It's controlled by a chip and interfaces with microcontrollers for displaying
information.
27
LCD 16×2 Pin Diagram
Pin1 (Ground/Source Pin): This is a GND pin of display, used to connect the GND terminal
of the microcontroller unit or power source.
Pin2 (VCC/Source Pin): This is the voltage supply pin of the display, used to connect the
supply pin of the power source.
Pin3 (V0/VEE/Control Pin): This pin regulates the difference of the display, used to connect
a changeable POT that can supply 0 to 5V.
Pin4 (Register Select/Control Pin): This pin toggles among command or data register, used
to connect a microcontroller unit pin and obtains either 0 or 1(0 = data mode, and 1 =
command mode).
Pin5 (Read/Write/Control Pin): This pin toggles the display among the read or writes
operation, and it is connected to a microcontroller unit pin to get either 0 or 1 (0 = Write
Operation, and 1 = Read Operation).
Pin 6 (Enable/Control Pin): This pin should be held high to execute Read/Write process,
and it is connected to the microcontroller unit & constantly held high.
Pins 7-14 (Data Pins): These pins are used to send data to the display. These pins are
connected in two-wire modes like 4-wire mode and 8-wire mode. In 4-wire mode, only four
pins are connected to the microcontroller unit like 0 to 3, whereas in 8-wire mode, 8-pins
are connected to microcontroller unit like 0 to 7.
28
Features of LCD16x2
An LCD 16x2 is a liquid crystal display with the capacity to display 16 characters in each
of its two rows, hence the "16x2" designation. These displays are commonly used in various
electronic devices for presenting alphanumeric information. The "16" refers to the number
of characters that can be displayed horizontally (in each row), and the "2" refers to the
number of rows available for displaying text.
Each character position typically consists of a 5x8 dot matrix, allowing for the
representation of standard alphanumeric characters as well as some custom symbols. These
displays are often interfaced with microcontrollers or other digital circuits to display
relevant information to users.
LCD 16x2 displays are widely used in applications such as digital clocks, temperature
displays, simple meters, and various embedded systems where a compact and easy-to-read
display is required.
29
4x4 Keypad:
Introduction:
The 4x4 keypad serves as a fundamental input device in countless electronic systems,
facilitating user interaction through straightforward data entry. Its composition, consisting
of 16 keys arranged in a grid format of four rows and four columns, encapsulates
simplicity and versatility. Each key possesses a distinct identification based on its unique
row-column intersection, establishing a direct correspondence between physical input and
electronic interpretation.
4x4 keypad
30
functionality
The functionality of a 4x4 keypad lies in its ability to facilitate user input in electronic
systems. Comprising 16 keys arranged in a grid of four rows and four columns, its primary
purpose is to translate physical key presses into digital signals that electronic devices can
interpret. This keypad enables users to input alphanumeric characters, numerical values,
or control commands with ease
A 4x4 keypad is a matrix-style input device commonly used in electronic projects for user
input. It consists of 16 keys arranged in a 4x4 grid. Each key represents a different
character or function, and pressing a key closes an electrical circuit, allowing the
microcontroller or other digital circuitry to detect which key has been pressed.
1. Data Input: The primary function of a 4x4 keypad is to input data. Users can press the
individual keys on the keypad to enter numeric digits (0-9), letters (A-F in hexadecimal
systems), or other characters, depending on the specific configuration and purpose of
the keypad.
2. User Interface: Keypads provide a user-friendly interface for interacting with
electronic devices. They are commonly used in various applications such as security
systems, door locks, electronic locks, vending machines, and industrial control panels.
3. Navigation and Control: In addition to entering data, a keypad can also be used for
navigation and control purposes. Some keypads include directional keys (up, down,
left, right) or special function keys (enter, cancel, clear) that allow users to navigate
menus, select options, or control the behavior of the system.
4. Password Input: Keypads are often used for password or PIN entry in security
systems, access control systems, or electronic locks. Users can enter their password or
PIN by pressing the corresponding keys on the keypad, providing a secure method of
authentication.
31
Construction of a 4x4 keypad
1. Matrix Layout: The keypad is arranged in a matrix format, with rows and columns. In a
4x4 keypad, there are 4 rows and 4 columns, resulting in 16 total keys.
2. Key Construction: Each key consists of a conductive material, such as a small metal
pad or dome, that makes contact with a conductive trace on the circuit board underneath
when pressed. This completes an electrical circuit, indicating to the controller that a key
has been pressed.
3. Row and Column Connections: The keys are connected in a grid pattern, with one side
of each key connected to a specific row and the other side connected to a specific column.
This arrangement enables the identification of which key has been pressed by detecting
which row and column have a connection when a key is pressed.
5.Debouncing Circuitry: Keypads often incorporate debouncing circuitry to filter out any
noise or bouncing that may occur when a key is pressed. This helps ensure that each key
press is accurately detected by the microcontroller.
32
5. Explanation
Crafting a security system integrating the ESP32 microcontroller, a PN532 RFID module,
an LCD display, a keypad, and an R307 fingerprint module unveils a sophisticated yet
comprehensive approach to access control. The hardware assembly intricately connects
these components, fostering seamless communication and synergistic functionality. The
ESP32 serves as the central orchestrator, tasked with coordinating the myriad operations of
the system.
At the heart of the system lies the PN532 RFID module, which interfaces with the ESP32
to enable RFID tag detection and authentication. Leveraging its capabilities, the system can
identify authorized personnel through RFID tags, ensuring swift and efficient access.
Complementing this functionality, the inclusion of an LCD display enriches the user
interface, providing real-time feedback and status updates. Whether conveying access
permissions or system diagnostics, the LCD display enhances user interaction and system
transparency.
1.Hardware:
The authentication process unfolds with precision and efficiency. The PN532 RFID module
scans RFID tags, cross-referencing detected IDs with a predefined whitelist.
Simultaneously, the keypad accepts user input, validating entered codes against stored
credentials. Concurrently, the R307 fingerprint module captures and analyzes fingerprint
data, comparing it against registered templates for verification.
Upon successful authentication, the system grants access, activating designated mechanisms
such as door locks or security barriers. Meanwhile, the LCD display provides real-time
feedback, confirming access approval and conveying pertinent information to users.
Conversely, in the event of authentication failure, the system denies access, triggering
appropriate responses such as alarm activation or access denial notifications.
2. Software:
Moving on to the software realm, our focus pivots towards the firmware development
process, wherein the ESP32's capabilities are leveraged to their fullest potential. We embark
on a journey of code creation, utilizing platforms such as Arduino IDE to craft firmware
that orchestrates the intricate dance between hardware components. Central to this endeavor
is the integration of RFID libraries, which serve as the conduit for interfacing with the RFID
reader module. Through adept utilization of these libraries, the firmware gains the ability to
decipher RFID tag data, thus laying the groundwork for subsequent validation processes.
33
Validation of RFID tag data is a pivotal aspect of the system's functionality. To this
end, the firmware is imbued with the intelligence to conduct local validation checks
against predefined whitelists or blacklists. This self-contained validation mechanism
serves as the initial gatekeeper, ensuring that only authenticated RFID tags progress to
the next stage of verification. Upon successful local validation, the ESP32 springs into
action, initiating a verification request to AARVI TECHNO's server.
The integration with AARVI TECHNO's server marks a significant milestone in the
system's evolution. Armed with the requisite API documentation and credentials,
the ESP32 firmware is tailored to seamlessly communicate with the server's API
endpoints. Through the implementation of HTTP client functionality, the ESP32
orchestrates a symphony of data exchange, transmitting RFID tag information to the
server for meticulous scrutiny.
On the server side, a sophisticated validation process ensues. AARVI TECHNO's server
assumes the role of arbiter, tasked with the onerous responsibility of adjudicating the
authenticity of RFID tags. Leveraging its vast repository of data, the server meticulously
scrutinizes incoming verification requests, cross-referencing RFID tag data with its
database. This intricate dance of data retrieval and analysis culminates in the issuance of
a verdict – a validation response that is relayed back to the ESP32 firmware.
Upon receiving the server's validation response, the ESP32 firmware deftly navigates
through a decision-making matrix. If the RFID tag is deemed authentic, access is
graciously granted, unlocking a realm of possibilities. Conversely, in the event of
validation failure, the firmware enacts appropriate mitigation strategies, potentially
denying access or triggering alerts to notify stakeholders.
34
6. Conclusion
The seamless interplay of these components, orchestrated by the ESP32 firmware, heralds
a new standard of access control robustness. From RFID tag detection to fingerprint
authentication, each facet of the system operates in harmony to deliver swift and reliable
user verification. The inclusion of an LCD display not only enhances user interaction but
also provides invaluable feedback, ensuring transparency and user confidence in the
system's operation.
The development and implementation of the "Security System Using ESP32" mark a
significant milestone in the realm of modern security solutions. Through meticulous
planning, innovative design, and rigorous testing, we have created a comprehensive
system that embodies reliability, versatility, and efficiency. In this conclusive report, we
summarize the key findings, achievements, and future prospects of the project:
1. Introduction to the Security System: The report commenced with an overview of the
project's objectives, outlining the need for a robust security system capable of providing
real-time monitoring and access control. Leveraging the ESP32 microcontroller, we
embarked on a journey to design a solution that addresses the multifaceted challenges of
modern security environments.
35
4. User Interface and Feedback: Effective communication with users is paramount in
ensuring the system's usability and transparency. The inclusion of an LCD display
provides real-time feedback on authentication outcomes, system status, and pertinent
notifications. This user-friendly interface enhances the overall experience and fosters
trust in the system's capabilities.
5. Security and Reliability: Throughout the development process, utmost attention was
paid to security and reliability considerations. We implemented robust encryption
protocols, error handling mechanisms, and redundancy measures to safeguard against
potential threats and ensure uninterrupted operation. Rigorous testing and validation
procedures were conducted to verify the system's performance under various scenarios
and environmental conditions.
6. Future Directions: Looking ahead, there are ample opportunities for further innovation
and enhancement of the security system. Future iterations may explore integration with
cloud-based services for remote monitoring and management, enhanced data analytics
capabilities, and seamless integration with emerging technologies. The modular
architecture of the system facilitates future upgrades and customization, ensuring its
adaptability to evolving security landscapes.
In conclusion, the "Security System Using ESP32" represents a testament to the power
of collaboration, innovation, and perseverance in addressing complex security
challenges. By harnessing the capabilities of modern technology, we have created a
solution that not only meets but exceeds the expectations of security stakeholders. As we
continue to iterate and refine the system, we remain committed to advancing the frontier
of security excellence and empowering organizations to safeguard their assets with
confidence.
36
7. Future scope
The "Security System Using ESP32" project lays a solid foundation for future
advancements and expansions in the realm of security solutions. Here are several
avenues for future scope and enhancement:
1. Integration with IoT and Cloud Services: One promising direction is to integrate the
security system with IoT (Internet of Things) platforms and cloud services. This would
enable remote monitoring, management, and data analytics capabilities. By leveraging
cloud-based storage and processing, the system can store historical data, generate
insights, and provide real-time alerts to authorized personnel.
4. Scalability and Modularity: Design the system with scalability and modularity in
mind to accommodate future expansions and customizations. This includes the ability
to easily add or replace components, integrate with third-party devices, and adapt to
evolving security requirements and standards.
37
5. Machine Learning and AI Integration: Utilize machine learning and artificial
intelligence algorithms to enhance the system's intelligence and adaptability. These
technologies can analyze security patterns, predict potential threats, and dynamically
adjust security settings in response to changing conditions. For example, the system
can learn user behavior patterns and detect anomalies to prevent unauthorized access.
6. Enhanced User Experience: Continuously improve the user interface and experience
by incorporating user feedback and usability studies. Intuitive interfaces, personalized
settings, and contextual notifications can enhance user satisfaction and engagement
with the security system.
8. Regulatory Compliance and Standards: Ensure that the security system complies
with relevant regulatory standards and industry best practices. Stay updated on
emerging regulations and security standards to maintain compliance and enhance the
system's credibility and trustworthiness.
By exploring these future directions and continuously innovating, the "Security System
Using ESP32" can evolve into a cutting-edge security solution that meets the evolving
needs of organizations and individuals in an increasingly digital and interconnected
world.
38