Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
INFORMATION TECHNOLOGY
GERALDEZ, JAYSON G.
TAOTAO, JUVY P.
INFORMATION TECHNOLOGY
CHAPTER I
INTRODUCTION
fingerprints that are pre stored in the memory. Stored fingerprints are retained
even in the event of complete power failure or battery drain. These eliminates the
can only be opened when an authorized user is present, since there are no keys or
has an intrinsic weakness in password leakage. While the patterns are easy to
approach that enhanced the password pattern with additional security layer.
domains. Fingerprints are the oldest and most widely used form of biometric
INFORMATION TECHNOLOGY
system has been a topic of great interest over the years due to the increasing
vehicle theft cases reported all over the world. Most of the advanced vehicle
security systems best suit the four wheeler. As of the security system for two
wheeler is concerned, the systems available in market are of no match to the well-
equipped thieves. When under attack, these systems can only immobilize the
engine and sound a loud alarm. The proposed reliable and robust design of Two
Wheeler Vehicle Security System (TWVSS) with features enhancing the security of
the vehicle and ensuring the safety of the rider. Fingerprint matching techniques
are of two types: graph based and minutiae based. The template size of the
changes also.
technology from all sources. The proposed system must be acceptable by the local
COLEGIO DE MONTALBAN
INFORMATION TECHNOLOGY
PROJECT CONTEXT
UNO board, and to which fingerprint sensor is wired to. CAN bus customization
controllers.
the back of handle cover and waterproofed using rubber based adhesive.
Wires from the fingerprint sensor module to the controller, also hook up
the controller to Arduino board as show in the schematics. Using USB cable
connect Arduino to your PC and upload the sketch to the boards using Arduino
IDE. Now you are all set to go. The controller, based on fingerprint matching or
not, will drive a relay to high (if success), which is the input to pin 3 of Arduino.
The code running in Arduino, depending on the pin status and other
parameters, will either send the door close or door open CAN message.
COLEGIO DE MONTALBAN
INFORMATION TECHNOLOGY
way by the use of Fingerprint Recognition Technology and other devices that are
programmed and install on the door handle of the car to open it. In which this
OBJECTIVES
MAIN OBJECTIVES
SPECIFIC OBJECTIVES
INFORMATION TECHNOLOGY
SCOPE
The prototype can open and close the door of car without key.
The prototype can give more reliable security.
The prototype can access by those who is registered.
The prototype can make the users to easily manage the door car
without hassle.
The prototype can be usable in one step only.
The prototype can determine the person attempting to open the car.
LIMITATION
Foreign Literature
System for use on a vehicle. The System comprises an on-board processor for
receiving bio metric data and comparing the biometric data with Stored data, and a
COLEGIO DE MONTALBAN
INFORMATION TECHNOLOGY
biometric Scanner coupled to the processor and accessible from the exterior of the
processor for receiving fingerprint data and comparing Said fingerprint data with
Stored fingerprint data. A first fingerprint Scanner is coupled to the processor and
accessible from the exterior of the vehicle for generating the fingerprinting data. An
when the fingerprint data Substantially matches the Stored fingerprint data. A
wireless receiver System is coupled to the door lock for unlocking the door in
Clark E. McCall
Local Literature
The present invention provides a wireless remote keyless entry device and a
method for providing entry to a System via the wireless device. The system
COLEGIO DE MONTALBAN
INFORMATION TECHNOLOGY
primary System to which entry is Sought. The remote keyless entry device
preferably includes a portable power Supply and a biometric Sensor for receiving a
biometric input value. The device further includes memory and a processor. The
memory has a database including a list of authorized users. Each authorized user
has a biometric value and a Set of command options associate there with, and
each command option has a command code associated there with. A biometric
input value is received via the biometric Sensor and identifying the authorized user
corresponding to the biometric input value. The processor compares the biometric
input value to the biometric values of authorized users and loads the associated
request from the user and a transmitter Sends the command code corresponding
invention, the wireless entry device and method may include the provision of
or code. For example, when a particular authorized user requests a command for
adjusting the Seat position, temperature controls, or radio commands. The remote
keyless entry device and method may also be employed with numerous Systems,
including cell phone Systems, internet Systems, finance Systems or any electronic
COLEGIO DE MONTALBAN
INFORMATION TECHNOLOGY
biometric sensor and the input values it receives are fingerprint images, although
Ronald A. Mendiola
Cynthia B. Thomasa
Benedict N. Norbeso
INFORMATION TECHNOLOGY
way by the use of Fingerprint Recognition Technology and other devices that are
programmed and install on the door handle of the car to open it. In which this
OBJECTIVES
MAIN OBJECTIVES
SPECIFIC OBJECTIVES
COLEGIO DE MONTALBAN
INFORMATION TECHNOLOGY
SCOPE
The prototype can open and close the door of car without key.
The prototype can give more reliable security.
The prototype can access by those who is registered.
The prototype can make the users to easily manage the door car
without hassle.
The prototype can be usable in one step only.
The prototype can determine the person attempting to open the car.
LIMITATION
INFORMATION TECHNOLOGY
ENALISAN, AMVIL
GERALDEZ, JAYSON G.
TAOTAO, JUVY P.
INFORMATION TECHNOLOGY