[National College Student IoT Design Competition] Sharing of the third prize of the ARM Technology competition topic: Lingfei Yunwei - IOT smart access control system based on MM32F5

This article participates in the [Prize-winning Collection] organized by Jishu Community and Lingdong Microelectronics to share works and disseminate technical achievements, and there are even more prizes waiting for you to claim! Online solicitation activities.

The 2023 National University Internet of Biotechnology Design Competition has come to an end, and we will share our works with you below.

team introduction

Participating unit: Hohai University
Team name: This name is already a bad name
Instructor: Shan Minglei and Xie Yingjuan
Participating team members: Zhu Lichao, Cheng Yi, Lin Bohan, Zhang Huanyu
National Finals Award: Third Prize

Anmou Technology Enterprise Proposition

Competition title: IoT smart doorway monitoring system.
Competition content: various door opening methods, corridor personnel detection, camera automatic following, door opening alarm recording, cloud data storage, etc.

Project Description

With the further development of technology and the growth of demand, society's demand for safety and convenience is also rising. In this fast-paced era, people's requirements for access control systems are no longer limited to simple access management, but pay more attention to the intelligence, efficiency and integration capabilities of the system with other systems. The access control system in modern society is no longer just a simple replacement of traditional keys and locks. Instead, it combines advanced technologies such as biometrics, Internet of Things technology, and artificial intelligence to achieve new functions and applications.

The smart access control system is designed to solve many problems existing in traditional access control systems and provide more efficient, safe and convenient access control solutions, which has huge potential and widespread demand. As an advanced access control solution, the access control system meets the needs of various industries for security, access control, data management and convenience. In recent years, smart access control systems have made great progress in technological innovation and application expansion. From education, commerce to communities, smart access control systems are gradually changing the way we live and work, bringing us a smarter, more efficient and safer living environment.

The control board used in this project is the MM32F5270 development board of Lingdong Microelectronics Company. MM32F5270 is an MCU product equipped with Arm China STAR-MC1 core. Its operating frequency can reach 120MHz. It has built-in up to 256KB Flash and 192KB RAM. It is equipped with a floating point unit (FPU) and digital signals. Processing unit (Digital Signal Processing, DSP), signal interconnection matrix MindSwitch, configurable logic unit CLU, trigonometric function acceleration unit CORDIC and other algorithm acceleration units, and integrates a wealth of peripheral modules and sufficient I/O ports. Compared with existing products, MM32F5270 has comprehensively improved performance, storage capacity, bus architecture and peripheral configuration.

Features and Innovation

IoT technology applications

1 Cloud platform connection

With the help of ESP32 wireless WIFI module, the intelligent access control system realizes remote monitoring and control functions. Users can connect to the server through the WIFI module to control the mini program display and mobile devices on the cloud platform, and monitor the status and activities of the access control system in real time anytime and anywhere. No matter where they are, users can easily see who has entered or exited the accessed area and can quickly take necessary actions based on the time reported in real time. This convenience greatly improves the security and manageability of the access control system.
Traditional access control systems are usually managed based on local servers or controllers, but this innovation centralizes the data and functions of the access control system on the cloud platform and uploads the data to the database in real time. This connection method greatly improves the accessibility and manageability of the system. Users can remotely monitor and control the access control system anytime and anywhere through any device connected to the Internet.

2 Communication and interaction

The WiFi module of this work uses TCP transparent transmission, using the cloud platform and cloud server as the data interface, so that a fast and stable real-time communication channel can be established between the user and the access control system. This eliminates the cumbersome AT commands and solves the shortcomings of slow big data transmission and small single data transmission. This means that users can immediately receive key information about the access control system, such as access control status, alarm information, etc. At the same time, users can also interact with the access control system in real time through mobile devices, such as using small programs to remotely unlock the door, remotely monitor the access control status, etc. This ability to communicate and interact in real time greatly improves the operational flexibility and convenience of the access control system.

3 Centralized data management

By connecting the access control system to the cloud platform and database, all access control data can be managed centrally. The cloud platform can store and process a large number of access control records, including the time when users enter and exit the access control area, monitoring pictures, and access control status. Users can use this data to better understand the usage of the access control system, determine whether there are suspicious persons entering and exiting, and make corresponding decisions and improvements.

WeChat mini program integration

1 Ease of use

WeChat mini programs are a widely popular and used mobile application platform that almost everyone can easily download and use. By integrating the smart access control system with the WeChat applet, users can open the applet directly in WeChat to view access control data, capture pictures, and remotely open and close doors without having to download other applications or log in to other platforms. This seamless integration method brings great convenience, allowing users to manage the access control system through the simple WeChat interface anytime and anywhere, making the use of the access control system more convenient and efficient.

2 Real-time data update

The integration of WeChat applet brings the advantage of real-time data updates to the smart access control system. Through the connection with the cloud platform, the smart access control system can synchronize access control data to the WeChat applet in real time. When someone enters or exits the access control area or other access control events occur, the relevant data will be updated immediately and displayed on the WeChat applet interface. This real-time data update function enables users to obtain the latest access control information in time, such as entry and exit records, alarm events, etc., and maintain real-time awareness of the access control system.
Through the advantage of real-time data updates in the WeChat applet, users can quickly understand the status and activities of the access control system. They can see who has entered and exited the access control area in real time, when, and even obtain specific access control records. This ability to update real-time data is important for security management and activity tracking. Users can instantly check the operation of the access control system to ensure that unauthorized personnel cannot enter restricted areas and can take necessary measures in a timely manner.

3 Data recording and analysis

The mini program is not only a simple access control tool, but also a multi-functional application that integrates alarm recording, data analysis and visual presentation. It has historical alarm recording and data analysis functions, as well as intuitive display through curve charts, providing users with more in-depth security information and insights. Whether it is abnormal events in the access control system, visitor records, or other situations that may cause alarms, the mini program will accurately record this information and save the photos as physical evidence. This provides users with a convenient and reliable way to understand the security status of the access control system and conduct verification and backtracking when necessary. It can automatically analyze nearly 30 alarm records to discover potential patterns, trends and anomalies. Through this function, users can better understand the correlation between alarm events, identify possible risk factors, and formulate targeted security improvement plans. This visual presentation not only provides intuitive data presentation, but also helps users more easily identify possible periodic or sudden events.

insert image description here
Figure 1 WeChat applet interface diagram

face recognition technology

1 Authentication Efficiency

Face recognition technology achieves fast and accurate identity verification by collecting image data in access control areas and performing face recognition. Users only need to perform a simple face scan in front of the camera, and the system can quickly compare it with the pre-stored face data of authorized users. The efficiency of this authentication allows the access control system to quickly confirm the user's identity, thereby reducing the trouble and tediousness caused by traditional password or card verification methods.

2 High security guarantee

The introduction of face recognition technology brings higher security to the smart access control system. Traditional access control systems often rely on passwords or cards, but these verification methods are at risk of leakage, loss or theft. Facial recognition technology is based on an individual's unique biological characteristics and is difficult to forge or use, greatly reducing the possibility of illegal break-ins. Only authenticated users can perform unlocking operations, ensuring that the security of the access control area is effectively protected.

3 Improve the convenience of use

Compared with traditional identity verification methods, facial recognition technology is more convenient to use. Users only need to stand in front of the camera in the access control area, and there is no need to carry extra cards or remember complex passwords. This non-perceptual authentication method allows users to quickly enter and exit the access control area, improving the convenience and efficiency of use.

Home Security Monitoring

1 Alarm for children’s abnormality at home

The intelligent access control system is equipped with a child lock. When a child or the elderly is alone at home and finds an abnormality outside the door, press the alarm button, and the access control system will automatically turn on the red light to warn of expulsion and send an alarm message to the guardian. At this time, no matter the password to open the door, Even if I swipe the card to open the door, I can't open it. The child lock feature is a comprehensive security measure that responds to special needs in the home in an innovative way. Through a combination of emergency alarms, automated warnings and timely notifications, it protects the safety of family members when children and the elderly are alone at home. The introduction of this function not only demonstrates the cutting-edge application of technology in the field of security, but also highlights the concern and care for family happiness.

2 Fire related alarm

The camera part is equipped with a smoke recognition algorithm, which can identify and detect fires. When smoke is recognized in the corridor and judged to be a fire hazard, an alarm message will be sent to the user, and the owner of the household will be contacted urgently by taking a photo.

Through the above technical innovations, this work realizes the application of IoT technology, the integration of WeChat applets, the application of face recognition and home security monitoring. The application of these technologies and functional innovations make the intelligent access control system more intelligent, safe, convenient and efficient , meets the ever-evolving security management needs, and provides users with a better access control management experience.

system design

overall structural design

The perception layer of this work includes camera module, password key and NFC card reader, the main function is to interact with users and obtain necessary input data.
The MM32F5270 development board is the core main control part of the entire product. As the control core function, it performs the tasks of processing sensor data, controlling access control equipment, and interacting with the cloud. And there will be corresponding voice broadcasts in each state.
The transport layer uses the WIFI module to realize cloud data interaction. The WIFI module is responsible for transparent transmission with the server, and transmits the collected image data, home appliance status, emergency alarm information, etc. to the cloud server. The cloud server then transmits the data to the applet, and finally the applet sends the data to the microcontroller for override.
insert image description here

Figure 2 Schematic diagram of overall structural design

Mechanical structure construction

This work controls the door switch by controlling the rotation of the motor. The camera is mounted on a two-dimensional pan-tilt platform. There is no wired connection between the main control core and the camera. Instead, a wireless serial port is used to achieve a separate design, and the camera is added. A PTZ, through deep learning algorithms, can automatically track the human body without blind spots.
insert image description here
Figure 3 Structural drawing of the work
The external link image transfer failed. The source site may have an anti-leeching mechanism. It is recommended to save the image and upload it directly.
Figure 4 Two-dimensional pan/tilt

Control Circuit Design

This work uses a camera module, password keyboard, voice broadcast module and NFC card to implement the perception layer technology, uses the esp32 IoT module to implement the transmission layer technology, uses MM32F5270 as the control core, and uses the Alibaba Cloud IoT platform for data interaction and remote control. control. Through software development technology and cloud applications, the functions and cloud management of the access control system are realized. Moreover, through data mining and visualization applications, the data of the access control system is analyzed and displayed to provide more comprehensive and intuitive information.
The external link image transfer failed. The source site may have an anti-leeching mechanism. It is recommended to save the image and upload it directly.
Figure 5 Functional structure block diagram of the work

1 Perceptual layer technology

1.1 Camera module

OpenMV is an open source computer vision platform based on MicroPython specifically designed for embedded systems and IoT applications. It is small, efficient and integrates an image sensor, processor and environment to run MicroPython. Through the OpenMV module, the access control system can obtain image data of the access control area and perform the following functions:
1. Image processing: The OpenMV module has a built-in image processing library that can perform common image processing operations, such as image filtering, edge detection, and binarization. wait. This can process the image of the access control area, extract useful information, and provide support for subsequent face recognition and human body sensing functions.
2. Face recognition: The OpenMV module supports face recognition algorithms and provides corresponding APIs and libraries. By collecting image data in the access control area, faces can be recognized and verified to determine whether the user's identity is legitimate. This can enhance the security of the access control system, and only authenticated users can perform unlocking operations.
3. Human body sensing: The OpenMV module integrates infrared sensors and image sensors, which can perform human body sensing functions. By detecting the presence of people in the access control area, the corresponding operations of the access control system can be triggered, such as automatic door opening or alarm. At the same time, when no one is outside the door, the system can enter a sleep state to reduce energy consumption.
To sum up, as part of the perception layer, the OpenMV module has functions such as image processing, face recognition, and human body sensing in the access control system, providing the system with perception capabilities to support the normal operation and security enhancement of the access control system.
The external link image transfer failed. The source site may have an anti-leeching mechanism. It is recommended to save the image and upload it directly.
Figure 6 Camera module

1.2 Password button

The password button has four buttons, and the user can enter the password by pressing the three buttons E0, E1, and E2. In the access control system, when the confirm password button (E3) is triggered, the system will read the password entered by the user.
Through the use of password buttons, access control systems can provide a traditional authentication method to supplement the functions of image processing and facial recognition. Users can choose to use the password button to open the door to increase the flexibility and security of the access control system.

1.3 Swipe the card to open the door

NFC (Near Field Communication) card is a wireless communication technology that can communicate with the access control system at a short distance. The following is how NFC cards are used in access control systems:
NFC cards can be used as a convenient and fast authentication method. Users only need to hold the NFC card close to the reader for quick authentication without having to manually enter a password. In addition, users can save the NFC card on their mobile phone and use the NFC function of the mobile phone to swipe the card to open the door.

By combining OpenMV modules, password buttons and NFC cards, the access control system can provide multiple authentication methods to increase flexibility and security. Users can choose the appropriate authentication method to open the access control system according to their needs and preferences.
The external link image transfer failed. The source site may have an anti-leeching mechanism. It is recommended to save the image and upload it directly.
Figure 7 NFC card reading module

2 Transport layer technology

2.1TCP transparent transmission technology

TCP protocol is the basis of the transmission layer of the intelligent access control system. It is the core protocol for transmitting data on the Internet and has reliability and stability. TCP (Transmission Control Protocol) is responsible for data packetization, transmission, retransmission and other operations during transmission to ensure data integrity and accuracy. After the Wifi module turns on the transparent transmission mode, it can no longer be bound by specific AT commands, and can quickly and accurately transmit a large amount of data, and avoid the inconvenience caused by different data types or formats.

2.2WiFi technology

Smart access control systems often use WiFi technology for data transmission. WiFi technology provides high-speed and stable wireless data transmission capabilities, which is suitable for scenarios that require high real-time data, and provides technical support for real-time display of images and time data. Through the WiFi module, the access control device can establish a network connection with the cloud platform or other management terminals, and realize rapid upload and transmission of data.

2.3HTTP transmission technology

Cloud servers and WeChat applets use the HTTP protocol for data transmission, which is a common application layer protocol widely used for Internet communications. The HTTP protocol is a stateless, request-response-based protocol that uses URLs as identifiers for locating network resources, and indicates operations on resources through request methods (such as GET, POST, etc.). When the WeChat applet communicates with the cloud server, and the WiFi module communicates with the server distribution network, the JSON format is used to transmit data, because the JSON format is concise, lightweight and easy to parse.
The external link image transfer failed. The source site may have an anti-leeching mechanism. It is recommended to save the image and upload it directly.
Figure 8 Schematic diagram of the transport layer

3 Control layer technology

The functions of MM32F5270 as the control core include processing sensor data and controlling access control equipment. At the same time, it communicates with the esp32 module, receives instructions from the cloud platform, determines the legality of the unlocking request, and finally sends the unlocking instruction to the access control device.

3.1 Sensor data processing

MM32F5270 is responsible for receiving and processing sensor data from the sensing layer (such as OpenMV module and NFC reader). It can process the collected image data, perform facial recognition algorithm calculations, or obtain NFC card information. By processing this sensor data, the MM32F5270 can extract key information to perform authentication or determine the status of the access control system.

3.2 Control access control equipment

MM32F5270 controls the unlocking operation of the access control device through the communication interface with the access control device. It can send unlocking instructions to the access control device to unlock it, thereby allowing legitimate users to enter.

3.3 Communication with esp32 module

MM32F5270 communicates with the esp32 module to achieve connection with the cloud platform. It is responsible for receiving data from the esp32 module, such as instructions from the cloud platform or access control status information. At the same time, MM32F5270 sends the processed sensor data or access control status information to the esp32 module for transmission to the cloud platform through the Internet.

3.4 Determine the legality of unlocking request

When MM32F5270 receives the unlock request command from the cloud platform, it will judge the validity of the request. By comparing the results of user authentication, password input, NFC card information, etc., MM32F5270 can determine whether the request is legitimate and decide whether to perform the unlocking operation.

4 Cloud applications

4.1 Technical Overview

This work uses Alibaba Cloud server as a cloud application for data interaction and storage of access control equipment. At the same time, combined with the WeChat applet as a user interaction page, users can obtain various data and information about access control equipment from the cloud server through the applet, and achieve remote control by establishing a TCP connection with the access control equipment.

4.2 Technical details

In terms of cloud applications, Alibaba Cloud Cloud Server is used as the cloud application platform. Through the high availability and fault tolerance mechanism provided by the cloud server, the springboot technology framework is used to ensure the stability and reliability of the access control system. The data storage and management of the access control system uses databases such as MySQL and Redis to achieve rapid storage and query of access control system data.

In terms of mini programs, users can remotely access and control the access control system through data interaction with Alibaba Cloud servers. Users can obtain real-time monitoring data, door opening records, alarm information, etc. of the access control system through the WeChat applet. At the same time, they can remotely control the access control system's switches, password settings, and view suspicious person alerts through the applet.

In terms of access control equipment, remote control and data transmission of access control equipment are achieved by establishing a TCP connection with the Alibaba Cloud server. Access control equipment can upload monitoring data, alarm information, etc. to the cloud server in real time, and can also receive remote control instructions from the cloud server to implement operations such as opening the door and alarming.

Video display

https://www.bilibili.com/video/BV1Rm4y1T71w/?aid=702994717&cid=1253139068&page=1

Participate in the Jishu Community’s [Prize Collection] to share your works and disseminate technical achievements, and there are even more prizes waiting for you!
For more shared works in the Internet of Things Design Competition, please pay attention to the sharing of IC Technology Competition works .

Guess you like

Origin blog.csdn.net/weixin_47569031/article/details/132620918