Secure Electronic Lock using PIC 16f628a Microcontroller
The proposed system implements an electronic embedded lock that provides a great benefit over a traditional lock, which uses only a manual key. If in case, the key is lost or stolen then anyone can open the lock using the key. On the other hand, losing a long and complex password or getting it stolen is harder as compared to a traditional key. Further, a combination of both, the manual key with a computerized password makes the system more secure. A longer password will reduce the possibilities of getting the code broken and opening the lock. Our system comprises of a keypad and HD44780 20x2 LCD along with a PIC16f628a microcontroller. The firmware controls these components in such a way that interaction with keypad is very easy and smooth. The LCD provides user with messages and notifications to inform about the current system state. User can perform operations such as opening and closing the lock, changing the current password in the microcontroller EEPROM and clearing a single digit while entering the password when wrong digit entered (back space). The proposed system’s firmware is developed using assembly language with MPLAB development environment. It is tested and implemented at the actual hardware level with proper functioning of the system and it is completely bug free.
- Milan, Verle, “PIC Microcontrollers”, mikroElektronika; 1st edition, 2008.
- Nebojsa, Matic, ”PIC Microcontrollers on line”, MikroElektronika, 2000.
- Microchip, “PIC16F628x Data Sheet” Microchip.
- Hitachi, “LCD HD44780 datasheet”, Hitachi.
- Peter, JAKAB, “Electronic Combination Lock based on PIC”, [Online] Available: http://jap.hu/electronic/combination_lock.html
- DAT, “Simple Combination lock Project with keypad and LCD”, [Online] Available: http://www.8051projects.net/download-d195-simple-combination-lock-project-keypad-lcd.htm
- 1. Typical Genomic Framework on Disease Analysis
- 2. Using Virtualization Technique to Increa...
- 3. FPGA Implementation of FIR Filter using ...
- 4. Real-Time Multiple License Plate Recogni...
- 5. Algebraic Fault Attack on the SHA-256 Co...
- 6. Scalable Honeynet Based on Artificial In...
- 7. Optimized Method for Iranian Road Signs ...
- 8. A Two-Level Autonomous Intrusion Detecti...
- 9. LB2CO: A Semantic Ontology Framework for...
- 10. Text Independent Biometric Speaker Recog...
- Volume 4, Issue 1 Published – IJORCS
- IJORCS – Volume 4, Issue 2 – CFP
- Volume 3, Issue 6 – Published – IJORCS
- Call For Papers – IJORCS – Volume 4, Issue 1
- CFP – IJORCS – Volume 3, Issue 6
- Volume 3, Issue 5 – Published – IJORCS
- Volume 3, Issue 4 – Published – IJORCS
- CFP – IJORCS – Volume 3, Issue 5
- Volume 3, Issue 3 – Published – IJORCS
- Call for Papers – IJORCS – Volume 3, Issue 4