Document Security System Using Arduino-Based Fingerprint And Rfid Module

  • Mohamad Irkam STEKOM University
  • Toni Wijanarko Adi Putra STEKOM University
Keywords: System, Fingerprint, RFID Module, Arduino Uno

Abstract

Documents are valuable/important letters that can be used as evidence of printed or written information. The company where the author conducted research is a company operating in the logistics sector, which of course has a special document storage room, namely the Accounting room . The use of plastic folders containing documents and safes as a place to store important documents and files still carries a lot of risk of misuse and loss. The title of this research is Document Security System Using Arduino- Based Fingerprint and RFID Modules . One of the aims of this research is to minimize loss and prevent misuse of documents/files placed in plastic folders. A security system using fingerprint and RFID is very good to apply as document security because it has double security. The system created uses a fingerprint as a signal breaker or RFID tag electromagnetic waves which are attached to a folder containing important documents/files belonging to the company. This system is also supported by an Arduino kit Uno with an Atmega328 microcontroller as the brain for processing data from the fingerprint sensor and RFID Reader functions as an electromagnetic wave identification system for RFID Tags , therefore two pieces of hardware are needed, called Tags and Readers . Apart from the three main components mentioned, there are several other components used in making this document security system, namely micro SD kit, buzzer, push button, servo . Creating this system is very important to limit misuse of documents and the risk of losing documents in a company.

References

Andhika, R. (2015). Abstract. VARIETY SECURITY SYSTEM USING RFID, KEYPAD AND FINGERPRINT EQUIPPED WITH SMS NOTIFICATION BASED ON ATMEGA328 .

Atmega, M., Yuliza, E., & Kalsum, TU (2015). Safe Door Security Tool Based on Fingerprint Sensor and Digital Password Using. Infotama Media Journal , 11 (1), 1–10.

Borg, Walter, R., Gall, & Meredith, D. (1983). Educational Research An Introduction (4th ed.) . Longman.

Cahyono, FA, & Hari, BP (2016). THE SAFETY SECURITY SYSTEM USES SENSORS. Muhamammadiyah University Surakarta

Campbell, B. J. (1977). Understanding Information Systems: Foundations for control . UK: Winthrop Publishers.

Chamdun, M., Rochim, AF, & Widianto, ED (2014). Layered Security System in the Room Using RFID (Radio Frequency Identification) and Keypad to Open the Door Automatically. Journal of Computer Technology and Systems , 2 (3), 187–194. https://doi.org/10.14710/JTSISKOM.2.3.2014.187-194

Fingerprints, A. A. (2013). Making a Fingerprint Based Lecture Attendance Application, 2 (3)

Gollmann. (1999). Computer Security . (D. Gollman, Ed.). United States of America.

Hamdani, F. (2014). Application of RFID (Radio Frequency Identification) in Libraries: Advantages and Disadvantages. Journal of Library & Archive Science Khizanah Al-Hikmah , 2 (1), 71–79.

Hendra, S., Ngemba, HR, & Mulyono, B. (2017). Design of RFID Technology Prototype and 4x4 Keypad for Double Security on House Doors, 640–646.

Kholilah, I., Rafi, A., & Tahtawi, A. (2016). Arduino-Android Applications for Motorcycle Safety Systems, 1 (1), 53–58.

Putu, P., Winata, T., Wijaya, IWA, & Suartika, IM (2016). Design of an Output Monitoring and Data Recording System for Arduino Microcontroller Based Solar Panels. SPECTRUM E-Journal , 3 (1), 1–6.

Setianingrum, EC, & Purnama, BE (2013). Safe Security System With Using an AT89S51 Microcontroller Based Mobile Phone. Surakarta University .

Zaghloul, M. S. (2014). GSM-GPRS Arduino Shield (GS-001) with SIM 900 chip module in wireless data transmission system for data acquisition and control of power induction furnace, 5(4), 776–780.

Published
2024-05-15
How to Cite
Mohamad Irkam, & Toni Wijanarko Adi Putra. (2024). Document Security System Using Arduino-Based Fingerprint And Rfid Module. Journal of Technology Informatics and Engineering, 2(1), 32-42. https://doi.org/10.51903/jtie.v2i1.174