Mavzu: Parolga asoslangan eshiklarni qulflash tizimi


Download 0.93 Mb.
bet10/10
Sana28.12.2022
Hajmi0.93 Mb.
#1019372
1   2   3   4   5   6   7   8   9   10
Bog'liq
Individual loyiha Rustamov Fayzullo

for(l=0;l<=currentposition;++l)
{
 
lcd.print("*");
keypress();
}
 
if (code==password[currentposition])
{
++currentposition;
if(currentposition==4)
{
 
unlockdoor();
currentposition=0;
 
}
 
}
 
else
{
++invalidcount;
incorrect();
currentposition=0;
 
}
if(invalidcount==5)
{
 
++invalidcount;
torture1();
 
}
if(invalidcount==8)
{
torture2();
}
 
}
}
 
 
void unlockdoor()
{
delay(900);
 
lcd.setCursor(0,0);
lcd.println(" ");
lcd.setCursor(1,0);
lcd.print("Access Granted");
lcd.setCursor(4,1);
lcd.println("WELCOME!!");
lcd.setCursor(15,1);
lcd.println(" ");
lcd.setCursor(16,1);
lcd.println(" ");
lcd.setCursor(14,1);
lcd.println(" ");
lcd.setCursor(13,1);
lcd.println(" ");
unlockbuzz();
 
for(pos = 180; pos>=0; pos-=5)
{
myservo.write(pos);
delay(5);
}
delay(2000);
 
 
 
delay(1000);
counterbeep();
 
delay(1000);
 
for(pos = 0; pos <= 180; pos +=5)
{
myservo.write(pos);
delay(15);
 
 
currentposition=0;
 
lcd.clear();
displayscreen();
 
}
}
 
void incorrect()
{
delay(500);
lcd.clear();
lcd.setCursor(1,0);
lcd.print("CODE");
lcd.setCursor(6,0);
lcd.print("INCORRECT");
lcd.setCursor(15,1);
lcd.println(" ");
lcd.setCursor(4,1);
lcd.println("GET AWAY!!!");
 
lcd.setCursor(13,1);
lcd.println(" ");
Serial.println("CODE INCORRECT YOU ARE UNAUTHORIZED");
digitalWrite(redled, HIGH);
digitalWrite(buzz, HIGH);
delay(3000);
lcd.clear();
digitalWrite(redled, LOW);
digitalWrite(buzz,LOW);
displayscreen();
}
void clearscreen()
{
lcd.setCursor(0,0);
lcd.println(" ");
lcd.setCursor(0,1);
lcd.println(" ");
lcd.setCursor(0,2);
lcd.println(" ");
lcd.setCursor(0,3);
lcd.println(" ");
}
void keypress()
{
 
digitalWrite(buzz, HIGH);
delay(50);
digitalWrite(buzz, LOW);
}
void displayscreen()
{
 
lcd.setCursor(0,0);
lcd.println("*ENTER THE CODE*");
lcd.setCursor(1 ,1);
 
lcd.println("TO _/_ (OPEN)!!");
}
//*************** ARM SERVO***********//
void armservo()
{
 
for (pos=180;pos<=180;pos+=50)
{
myservo.write(pos);
delay(5);
}
delay(5000);
 
for(pos=180;pos>=0;pos-=50)
{
myservo.write(pos);
}
 
}
void unlockbuzz()
{
 
digitalWrite(buzz, HIGH);
delay(80);
digitalWrite(buzz, LOW);
delay(80);
digitalWrite(buzz, HIGH);
delay(80);
digitalWrite(buzz, LOW);
delay(200);
digitalWrite(buzz, HIGH);
delay(80);
digitalWrite(buzz, LOW);
delay(80);
digitalWrite(buzz, HIGH);
delay(80);
digitalWrite(buzz, LOW);
delay(80);
}
 
void counterbeep()
{
delay(1200);
 
 
lcd.clear();
digitalWrite(buzz, HIGH);
 
lcd.setCursor(2,15);
lcd.println(" ");
lcd.setCursor(2,14);
lcd.println(" ");
lcd.setCursor(2,0);
delay(200);
lcd.println("GET IN WITHIN:::");
 
lcd.setCursor(4,1);
lcd.print("5");
delay(200);
lcd.clear();
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
digitalWrite(buzz,LOW);
delay(1000);
//2
digitalWrite(buzz, HIGH);
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
lcd.setCursor(4,1); //2
lcd.print("4");
delay(100);
lcd.clear();
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
digitalWrite(buzz,LOW);
delay(1000);
//3
digitalWrite(buzz, HIGH);
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
lcd.setCursor(4,1); //3
lcd.print("3");
delay(100);
lcd.clear();
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
digitalWrite(buzz,LOW);
delay(1000);
//4
digitalWrite(buzz, HIGH);
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
lcd.setCursor(4,1); //4
lcd.print("2");
delay(100);
lcd.clear();
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN:");
digitalWrite(buzz,LOW);
delay(1000);
//
digitalWrite(buzz, HIGH);
lcd.setCursor(4,1);
lcd.print("1");
delay(100);
lcd.clear();
lcd.setCursor(2,0);
lcd.println("GET IN WITHIN::");
digitalWrite(buzz,LOW);
delay(1000);
//5
digitalWrite(buzz, HIGH);
delay(40);
digitalWrite(buzz,LOW);
delay(40);
digitalWrite(buzz, HIGH);
delay(40);
digitalWrite(buzz,LOW);
delay(40);
digitalWrite(buzz, HIGH);
delay(40);
digitalWrite(buzz,LOW);
delay(40);
digitalWrite(buzz, HIGH);
delay(40);
digitalWrite(buzz,LOW);
lcd.clear();
lcd.setCursor(2,0);
lcd.print("RE-LOCKING");
delay(500);
lcd.setCursor(12,0);
lcd.print(".");
delay(500);
lcd.setCursor(13,0);
lcd.print(".");
delay(500);
lcd.setCursor(14,0);
lcd.print(".");
delay(400);
lcd.clear();
lcd.setCursor(4,0);
lcd.print("LOCKED!");
delay(440);
}
void torture1()
{
delay(1000);
lcd.clear();
lcd.setCursor(2,0);
lcd.print("WAIT FOR ");
lcd.setCursor(5,1);
lcd.print("15 SECONDS");
digitalWrite(buzz, HIGH);
delay(15000);
digitalWrite(buzz, LOW);
lcd.clear();
lcd.setCursor(2,0);
lcd.print("LOL..");
lcd.setCursor(1,1);
lcd.print(" HOW WAS THAT??");
delay(3500);
lcd.clear();
 
}
void torture2()
{
delay(1000);
lcd.setCursor(1,0);
lcd.print(" ");
lcd.setCursor(2,0);
lcd.print("EAR DRUMS ARE");
lcd.setCursor(0,1);
lcd.print(" PRECIOUS!! ");
delay(1500);
lcd.clear();
lcd.setCursor(1,0);
lcd.print(" WAIT FOR");
lcd.setCursor(4,1);
lcd.print(" 1 MINUTE");
digitalWrite(buzz, HIGH);
delay(55000);
counterbeep();
lcd.clear();
digitalWrite(buzz, LOW);
lcd.setCursor(2,0);
lcd.print("WANT ME TO");
lcd.setCursor(1,1);
lcd.print("REDICULE MORE??");
delay(2500);
lcd.clear();
lcd.setCursor(2,0);
lcd.print("Ha Ha Ha Ha");
delay(1700);
lcd.clear();
}
3.4 Loyiha componentlari
Loyiha uchun ishlatilgan componentlar haqida batafsil:
Mikrokontroller: Bu bizning loyihamizning CPU (markaziy protsessor). Biz 8051 oilasining mikrokontrolleridan foydalanmoqchimiz. Mikrokontrollerning turli funktsiyalari quyidagilardan iborat:

  1. Klaviaturadan raqamli kiritishni o'qish.

  2. Ushbu ma'lumotni LCD-ga yuborish, bu loyihani boshqaruvchi shaxs parolni o'qishi kerak.

  3. Klaviatura yordamida parolni aniqlash va uning to'g'ri parol yoki noto'g'ri parol ekanligini tekshirish va agar kiritilgan parol to'g'ri parol bo'lsa, qadam motorini aylantiring.

  4. LCD: Biz 16×2 alfanumerik suyuq kristall displeydan (LCD) foydalanmoqchimiz, ya'ni u har biri 16 ta belgidan iborat bo'lgan 2 satrda alifbolarni raqamlar bilan birga ko'rsatishi mumkin.

  5. Klaviatura: Foydalanuvchi klaviatura yordamida parolni kiritadi. Klaviaturaning turli tugmalari quyidagilardan iborat:

  1. 0 dan 9 gacha.

  2. Kirish.

  3. Qochish.

  1. Teglar: eshikdan kirish tizimi, raqamli kodli qulf, uyga kalitsiz kirish.



Ilovalar va afzalliklar:
Ushbu loyihadan ofislarda, kompaniyalarda ham uyda foydalanish mumkin.

  1. Bu banklarda xavfsizlikni blokirovka qilish uchun ishlatilishi mumkin.

  2. Foydalanuvchi o'zi bilan kalitlarni olib yurishi shart emas.

  3. Foydalanuvshi uchun o`z korxonasi yoki tashkiloti uchun havfsizlik tizimini qurishida ancha havfsiz generatsiyani amalga oshiradi .

  4. Qo`shimcha sifatida foydalanuvchi o`zininig shaxsiy inestifikatsiyasi hissoblanag biometrik terminlarini kiritishi mumkin albatta qo`shimcha device orqali loyhaga kiritiligandan keyin.

  5. Shaxsiy malumotlarni boshqa qurilmalarga uzatmaydi va ulardan qabul qilmaydi .

  6. Dasturiy taminot qismi soft qismidan alohida bo`lganligi sababli havfsizlik darajasi juda yuqori tarzda ishlaydi .

  7. Soft qismi uchun alohida dastur ishlab chiqilgan bo`lib uni faqat local tarda foydalanish mumkin


XULOSA
Ushbu loyhani bajarish davomida qulflanring arxitekturayiv tuzilish va qanday detallardan asosida yig`ilishi barafsil yoritib o`tilgan. Qulflash tizimining mexanik va elektron bo`limlarga bo`linganligi va har bir bo`lim uchun alohida arxitektura ishlab chiqilganligini ko`rishimiz mumkin . Loyha davomida Biometrik xavfsizlik va identifikatsiya jarayonini faqat elektron qulf uchun mo`jjalanganini va u orqali havfsizlik tizimini oson qurish va javobgarlikni kamaytirish uchun ishlab chiqilgan tizimni ko`rishingiz mumkin .RFID texnalogiyasi yordamida biometlik autentifikatsiya jarayonida yuz beradigan kamchiliklarni bartaraf etish va autorizatsiya section ga permission olishni kuzatishimiz, va RFID texnalogiyanini sanot va unga teng qatorda rivojlanayotgan texnik tashkilotlar uchun ancha foydali ekanligini guvohi bo`lamiz . Quydagi keltririb o`tilgan Loyhani texnik qizimlarini batafsil o`rgangandan keyin uning soft qismi uchun kerakli dasturlarni sozlash va assembler muhitida yoki c dasturlsh tili orqali code yozish va generatsiya qilishni ko`rib chiqishimiz mumkin .Code ning texnik qismini tushunish uchun ixohlar yo`qligi sasbabli pasida keltirib o`tilgan batafsil ma`lumot orqali o`zingiz uchun ushbu tizimdan foydalansangiz maqsadga muofiq! Keltirilgan havfsizlik tizmi asosan korxona va tashkilotlar uchun avfzal hissoblanadi ,shaxsiy uy yoki o`zingiz egalik qiladigan buyumlar uchun pastda keltirib o`tilgan biometrik qulflardan foydalanish tavsiya etiladi


FOYDALANILGAN ADABIYOTLAR RO‘YXATI



  1. Anil K.; Ross, Arun (2008). "Introduction to Biometrics". In Jain, AK; Flynn; Ross, A (tahr.). Biometriya bo'yicha qo'llanma. Springer. 1-22 betlar. ISBN 978-0-387-71040-2Arxivlandi from the original on 9 March 2011.

  2. „2017 Global Information Security Workforce Study“.Benchmarking Workforce Capacity and Response to Cyber Risk— EMEA (PDF). (ISC)². Frost & Sullivan (2017).

  3. „Crime in the age of technology“. Europol’s serious and organised crime threat assessment 2017 (en). Europol (9-mart 2017-yil).

  4. Cherdantseva, Y.; Hilton, J.. Organizational, Legal, and Technological Dimensions of Information System Administrator. IGI Global Publishing, 2013. 

  5. NFPA 80, Standard for Fire Doors, Frames and Other Opening Protectives, Section 5.2."Programmable digital electronic lock", issued 1996-03-12

  6. Lockmanage (6 November 2020). "electronic lock system"Electronic Lock System | Key Access Control Solution - JWM. Retrieved 2020-12-01.

  7. Hayes, Adam. "Radio Frequency Identification (RFID)"Investopedia. Retrieved 2020-11-29.

  8. Alzubaidi, Abdulaziz; Kalita, Jugal (2016). "Authentication of Smartphone Users Using Behavioral Biometrics"IEEE Communications Surveys & Tutorials. 18 (3): 1998–2026. doi:10.1109/comst.2016.2537748ISSN 1553-877X.

  9. A. K.; Bolle, R.; Pankanti, S., eds. (1999). Biometriya: Tarmoqli jamiyatda shaxsiy identifikatsiya. Kluwer akademik nashrlari. ISBN 978-0-7923-8345-1.

  10. Bleicher, Paul (2005). "Biometrics comes of age: despite accuracy and security concerns, biometrics are gaining in popularity"Applied Clinical Trials. Olingan 6 dekabr 2019.

  11. NIST Special Publication 800-160 Systems Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (en). Gaithersburg, MD, USA: National Institute of Standards and Technology, 2016.


INTERNET SAHIFALARI.

  1. Amazon.com

  2. Aliexpress.com

  3. projectsof8051.com

  4. Biometriya (wikidea.ru)

  5. how2electronics.com

Download 0.93 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling