SlideShare une entreprise Scribd logo
1  sur  16
Dept. of ELECTRONICS & COMMUNICATION
 PROJECT TITLE-TOUCH PAD INTERFACED GSM BASED
                 SECURITY SYSTEM


GUIDE:                          PREPARED BY-
                                SANGHAMITRA CHAKRABORTY
Prof. S. CHATURVEDI             POOJA PURKAYASTHA
                                BONDITA BORUAH
                                NAYAN DEY
                                MISHU KHANDELIA
This presentation is all about creating a

   logical visualization of our project i.e.,

TOUCH PAD INTERFACED GSM BASED SECURITY
                 SYSTEM
HERE WE GO…
INTRODUCTION
• GSM is the well known wireless standard in
  present scenario.
• Security solution based on GSM network will
  have highest advantage as GSM network is world
  wide network.
• 90% company provide GSM network like
  AIRTEL, IDEA, VADAFONE. So there are less
  chance of network failure.
• So GSM service can be used to detect an
  intrusion.
BLOCK DIAGRAM FOR GSM BASED SECURITY
                           SYSTEM




                                           STEEPER
1   2   3                        MOTOR     MOTOR

4   5   6    0                   DRIVER              DOOR
                                           STEEPER
    8   9                          IC      MOTOR

*   0   #        MICROCONTR
                    OLLER




                               GSM
                              MODULE
WORKING:-
• Numeric touch pad is interfaced with port of the
  microcontroller.
• User has to enter the security code using numeric
  touch pad.
• Access will be given three time for individual user.
• If any unknown person try to access the code
  after three times immediately message will be
  sent to the authorized person regarding illegal
  access.
Contd…
• Microcontroller is the brain of any embedded
  system.
• Microcontroller is a Microprocessor and a
  dozen other functions in single chip
• Microcontroller takes in the password from
  the person to be authenticated.
Contd…
    • Motor Driver IC’s are used to interface the
      motors with microcontroller.

    • Multiple motors can be used to open or close
      multiple doors.
                          STEEPER
                          MOTOR
        MOTOR
0                                        DOOR
        DRIVER
                          STEEPER
                          MOTOR
Contd…
• GSM is used to send the message or to ring
  the authorized person regarding the intrusion.
• GSM works on UART protocol of micro
  controller



     GSM MODULE
HARDWARE REQUIRED FOR OUR PROJECT:-

Numeric touch pad

Micro controller IC (8051 )

AT command supporting GSM module.


Motor driver

DC motors

GSM module
COMPONENTS USED
• PC
• GSM MODEM
• Mobile Handset
CHARACTERISTICS AND STRENGTH
•   Wireless Communication
•   Intrusion detection.
•   Auto Configuration.
•   Ease of Access.
•   World wide access by GSM module.
REFERENCES


• Mazidi, Muhammad ali, The 8051
  Microcontroller and Embedded
  Systems,Second Edition, Prentice Hall
• www.embedtronics.com
• www.forum.nokia.com
• GSM based security systems. (IEEE paper)
gsm based security system
gsm based security system

Contenu connexe

Tendances

Case studies in io t smart-home
Case studies in io t  smart-homeCase studies in io t  smart-home
Case studies in io t smart-homevishal choudhary
 
Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD Ganesh Gani
 
HOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxHOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxPavaniMachineni
 
iot industry automation
iot industry automationiot industry automation
iot industry automationmansi sharma
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifiKhairunnisa Naaz
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detectionMueenudheen Shafaquath V P
 
Smart door lock
Smart door lockSmart door lock
Smart door lockaswin5432
 
Gsm based vehicle theft control system
Gsm based vehicle theft control systemGsm based vehicle theft control system
Gsm based vehicle theft control systemEcwayt
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharShivnaresh Likhar
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptPankaj Singh
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systemsAshok Behuria
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionRK Nayak
 
Chapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain SpecificChapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain SpecificMoe Moe Myint
 

Tendances (20)

Case studies in io t smart-home
Case studies in io t  smart-homeCase studies in io t  smart-home
Case studies in io t smart-home
 
Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD
 
HOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptxHOME INTRUSION DETECTION.pptx
HOME INTRUSION DETECTION.pptx
 
iot industry automation
iot industry automationiot industry automation
iot industry automation
 
Iot based home automation
Iot based home automationIot based home automation
Iot based home automation
 
Home automation using wifi
Home automation using wifiHome automation using wifi
Home automation using wifi
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
 
TinyOS
TinyOSTinyOS
TinyOS
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Home automation ppt
Home automation pptHome automation ppt
Home automation ppt
 
Gsm based vehicle theft control system
Gsm based vehicle theft control systemGsm based vehicle theft control system
Gsm based vehicle theft control system
 
Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 
GSM Based Security System
GSM Based Security SystemGSM Based Security System
GSM Based Security System
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Liquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system pptLiquor detection through Automatic Motor locking system ppt
Liquor detection through Automatic Motor locking system ppt
 
Seminar on smart antenna systems
Seminar on smart antenna systemsSeminar on smart antenna systems
Seminar on smart antenna systems
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Chapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain SpecificChapter 4 Embedded System: Application and Domain Specific
Chapter 4 Embedded System: Application and Domain Specific
 
Fog computing
Fog computingFog computing
Fog computing
 

Similaire à gsm based security system

finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security systemNIT srinagar
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security systemKhadarbaba Shaik
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft systemAshu0711
 
multiple input control by sms using GSM technology
multiple input control by sms using GSM technologymultiple input control by sms using GSM technology
multiple input control by sms using GSM technologySachin Singh
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMijistjournal
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based securityijistjournal
 
invisible eye'.pdf
invisible eye'.pdfinvisible eye'.pdf
invisible eye'.pdfsameeru1
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyIJRES Journal
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using ArduinoApoorv Anand
 
Home Security System Using Gsm Modem
Home Security System Using Gsm ModemHome Security System Using Gsm Modem
Home Security System Using Gsm ModemIJERA Editor
 

Similaire à gsm based security system (20)

finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security system
 
A1 Presentation
A1 PresentationA1 Presentation
A1 Presentation
 
Pir and gsm based house security system
Pir and gsm based house security systemPir and gsm based house security system
Pir and gsm based house security system
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
Gsm anti theft system
Gsm anti theft systemGsm anti theft system
Gsm anti theft system
 
Invisible Eye
Invisible EyeInvisible Eye
Invisible Eye
 
multiple input control by sms using GSM technology
multiple input control by sms using GSM technologymultiple input control by sms using GSM technology
multiple input control by sms using GSM technology
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEMA ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
A ZIGBEE AND EMBEDDED BASED SECURITY MONITORING AND CONTROL SYSTEM
 
A zigbee and embedded based security
A zigbee and embedded based securityA zigbee and embedded based security
A zigbee and embedded based security
 
Home automation
Home automationHome automation
Home automation
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
invisible eye'.pdf
invisible eye'.pdfinvisible eye'.pdf
invisible eye'.pdf
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
Keypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm TechnologyKeypad Based Bank Locker Security System Using Gsm Technology
Keypad Based Bank Locker Security System Using Gsm Technology
 
J04701080085
J04701080085J04701080085
J04701080085
 
Security system using Arduino
Security system using ArduinoSecurity system using Arduino
Security system using Arduino
 
Home Security System Using Gsm Modem
Home Security System Using Gsm ModemHome Security System Using Gsm Modem
Home Security System Using Gsm Modem
 
G3602050055
G3602050055G3602050055
G3602050055
 

Dernier

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

gsm based security system

  • 1.
  • 2. Dept. of ELECTRONICS & COMMUNICATION PROJECT TITLE-TOUCH PAD INTERFACED GSM BASED SECURITY SYSTEM GUIDE: PREPARED BY- SANGHAMITRA CHAKRABORTY Prof. S. CHATURVEDI POOJA PURKAYASTHA BONDITA BORUAH NAYAN DEY MISHU KHANDELIA
  • 3. This presentation is all about creating a logical visualization of our project i.e., TOUCH PAD INTERFACED GSM BASED SECURITY SYSTEM
  • 5. INTRODUCTION • GSM is the well known wireless standard in present scenario. • Security solution based on GSM network will have highest advantage as GSM network is world wide network. • 90% company provide GSM network like AIRTEL, IDEA, VADAFONE. So there are less chance of network failure. • So GSM service can be used to detect an intrusion.
  • 6. BLOCK DIAGRAM FOR GSM BASED SECURITY SYSTEM STEEPER 1 2 3 MOTOR MOTOR 4 5 6 0 DRIVER DOOR STEEPER 8 9 IC MOTOR * 0 # MICROCONTR OLLER GSM MODULE
  • 7. WORKING:- • Numeric touch pad is interfaced with port of the microcontroller. • User has to enter the security code using numeric touch pad. • Access will be given three time for individual user. • If any unknown person try to access the code after three times immediately message will be sent to the authorized person regarding illegal access.
  • 8. Contd… • Microcontroller is the brain of any embedded system. • Microcontroller is a Microprocessor and a dozen other functions in single chip • Microcontroller takes in the password from the person to be authenticated.
  • 9. Contd… • Motor Driver IC’s are used to interface the motors with microcontroller. • Multiple motors can be used to open or close multiple doors. STEEPER MOTOR MOTOR 0 DOOR DRIVER STEEPER MOTOR
  • 10. Contd… • GSM is used to send the message or to ring the authorized person regarding the intrusion. • GSM works on UART protocol of micro controller GSM MODULE
  • 11. HARDWARE REQUIRED FOR OUR PROJECT:- Numeric touch pad Micro controller IC (8051 ) AT command supporting GSM module. Motor driver DC motors GSM module
  • 12. COMPONENTS USED • PC • GSM MODEM • Mobile Handset
  • 13. CHARACTERISTICS AND STRENGTH • Wireless Communication • Intrusion detection. • Auto Configuration. • Ease of Access. • World wide access by GSM module.
  • 14. REFERENCES • Mazidi, Muhammad ali, The 8051 Microcontroller and Embedded Systems,Second Edition, Prentice Hall • www.embedtronics.com • www.forum.nokia.com • GSM based security systems. (IEEE paper)