AUTOMATIC DOOR LOCK SYSTEM
USING BIOMETRICS AND MCU
COLLEGE OF ENGINEERING
By:
Algene Frias
Jester Mallari
Von William Opelanio
At
The Lyceum of the Philippines University – Laguna
2011-2012
APPROVAL PAGE
In partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Engineering, this feasibility study entitled “Automatic Door Lock System Using Biometrics and MCU” has been prepared by Algene Frias, Jester Mallari and Von William Opelanio.
Approved by: _________________________________ Engr. Juliet Niega Adviser
ACKNOWLEDGEMENT
This project is dedicated to our Parents who have never failed to give us financial and moral support, for giving
…show more content…
This has caused fire marshals to impose strict codes on the use of mag locks and the access control practice in general. Additionally, NFPA 101, Standard for Life Safety and Security, as well as the ADA (Americans with Disability Act) require "no prior knowledge" and "one simple movement" to allow "free egress". This means that a person must be able to walk up to a door and with one motion (no push buttons, or having another person unlock the door, or read a sign "special knowledge") and exit. Other problems include a lag time (delay) in releasing as the collapsing magnetic field is not instantaneous. This lag time can cause a user to walk into the door. Finally, mag locks by design fail unlocked, that is if power is removed they unlock. This could be a problem where security is a prime concern. Additionally, power outages could affect mag locks installed on fire listed doors, which are required to remain latched at all times. Thus, a mag lock would not meet current fire codes as the primary means of securing a fire listed door to a frame. Because of this, many commercial doors (this typically does not apply to private residences) are moving over to stand alone locks, or electric locks installed under a Certified Personnel Program. The first mechanical recodable card lock was invented in 1976 by Tor Sørnes, who had worked for VingCard since the 1950s. The first card lock order was shipped in 1979 to Westin Peachtree Plaza Hotel, Atlanta, USA. This product triggered the
It is important to note that the main applications of biometrics are utilized for preventing fraud and ensuring security. The use of biometrics has increased tremendously but so has social, ethical, privacy, practical and even political issues associated with it (Duquenoy, Jones & Blundell, 2008). Following is the detail regarding its ethical and privacy issue implications.
The physical protection of information, personnel, software, buildings and other material resources are the first thing that should be assessed when looking into security, obviously there are unavoidable disasters such as natural disasters, man-made disasters and loss of electricity, air or water but most issues are preventable, by monitoring who has access to what and how much access they have, by locking rooms and PC’s, using person specific swipe cards, bolting computers to desks, having effective CCTV in place, and by having effective monitoring tools an IT team can keep a close eye on valuable data and prevent risks. Electronic security systems are designed to protect against unwanted personnel and they provide free roaming for wanted personnel. An electronic security system is a series of biometric locks, or a single biometric lock. A biometric lock is a system that can provide control of entry (or exit) within a designated area by the use of an electronic locking facility. The most common biometric lock is a pin pad system which is a keypad that requires the exact combinations of keys to open the lock, the keys are generally numbers but can be emphasised as letters, shapes, or sounds. Secondly and commonly are swipe cards which are encoded cards which hold information on the user, there is normally a swipe slot to enter a facility that have chosen to
Portable equipment often doesn't need passwords enabled. Mobile device apparatuses often need passwords on validating clients and control entry should information saved on the gadgets. a large number unit have those specialized foul abilities should backing passwords, particular ID number numbers (PIN), or design screen bolts to Confirmation. Some versatile apparatuses likewise incorporate a biometric spectator to examine a finger impression to verification. However, ane data demonstrates that shoppers sometimes utilize these instruments. Additionally, if clients would utilization A secret key alternately PIN they often decide passwords alternately PINs that camwood make effortlessly decided alternately bypassed, for example, 1234 or 0000.
Alongside my studies, I run a nonprofit organization called The Esther Enaholo Foundation (www.teef.org.ng). This foundation is a platform for reaching out to children in motherless babies’ home. Our most recent project was organizing a Christmas party for children in Arrows of God orphanage home, Ajah. This party had in attendance 50 children from the orphanage home, masters’ students from Pan-Atlantic University and staff of the
Biometrics are important to not only information systems, but to information security as a subject. Today, most information is kept secure via ID cards or secret information, such as a PIN, password, pattern, etc., the downside to this type of security is the lack of a failsafe (Ashok, Shivashankar and Mudiraj)! What would happen if an ID card was lost? Or a PIN, password or pattern was leaked to individuals who were not on a “need to know” basis”? This is where the importance of biometrics comes into play.
I wish to show them that we can have a better life and still hold on to our traditions. I never thought I could afford to attend college, but with the help of many people and scholarships, many of my financial worries have been alleviated. I am very grateful and hope that I could one day be a blessing to someone in need. My determination and the help I may receive from this scholarship will enable me to continue my studies at UNM and achieve my goal of obtaining a master’s degree. Thank you for your time and
It is a great example of dedication and an exhibition of kindness for others; I feel that it is from my parents that I have learned how to exemplify it in my own life. My parents fled their homeland Nigeria to make a better life for themselves and in turn help their family. This has impacted me in that I hope to also selflessly serve and make improving the lives of others important to me. I have demonstrated this as a mentor in the University of Oklahoma Future Health Scientists Program, and through my involvement in student government, HOSA-Future Health Professionals, Key Club, and as a member of the Oklahoma City Youth Council. As a mentor, I help in the sustainment and empowerment of Oklahoma’s youth by teaching them concepts of science related to health which will in turn prepare them for their future career. Being a part of student government has allowed me to help organize Care Share and HEISMAN Week. During Care Share, I planned what items needed to be donated and delivered those items. During HEISMAN Week, I encouraged my peers to donate money for the Make-A-Wish Foundation by leading dares and other events. As a member of the Oklahoma City Youth Council, I attend council meetings and visit with government officials which has also allowed me to serve my peers for I am the connection between them and city officials. As a member of HOSA-Future Health Professionals and Key Club, I notify others of volunteering
The Foundation had just donated the funds to expand housing for the Seed’s Orphanage, which was home to seventy- five children. Our mission when going was to spend quality time with the children by organizing ten days of fun activities. Each of the children in the orphanage had endured various versions of abandonment, abuse, rape, and neglect. Bonding with the children and experiencing life in an impoverished area was truly life giving.
Some residential property owners may need an emergency locksmith in the event they have locked themselves out of the house, apartment or car. Before a locksmith begins to gain entrance into the property, he will usually ask for the owner to prove that he does reside there. Upon proof of residence, the locksmith will "pick" the lock. This means that the locksmith will bypass using a key to open the lock. Instead he will use long, narrow, needle-shaped tools with a hook on the end to catch tumblers inside the lock and move them into the unlock position. Each tumble must be moved to its unlocked position for the lock to open. Sometimes a locksmith will make a duplicate of the key on site by using tools that determine the shapes of the cutouts that would match the key and the lock tumblers. Sometimes the locksmith may have to drill out the old lock and then replace it with a new one.
Thirdly, nobody has been more important to me in the pursuit of this project than the members of my family. I would like to thank my parents, whose love and guidance are with me in whatever I pursue. They are the ultimate
Hello I’m Jefferson Clemmons, a senior Human Development and Family Studies major. I’m so honored to receive this award from you, and I’m equally as honor to be selected to do this research project. I’m the first in my family to go to college, so your contribution is greatly appreciated. With your contribution, I will be able to afford more books and supplies for my classes. Also the scholarship will allow me to gain experience in research which will help me during the remainder of my academic career. Again, thanks for your contribution it is truly appreciated both financially and academically.
Last but not the least, it is imperative for you to hire a proper Locksmith because you can be properly assisted regarding your specific lock
Thank you for the sponsorship you provided me last year, it helped me very much. It especially helped my parents financially wise. I hope to receive your help this year as well.
Biometric technology offers an alternative to the most used system currently in place in most operations: passwords or personal identification numbers (PIN). Instead of users inputting their password or PIN, users interact with a computer terminal that will scan their finger, face, voice, retina, etc. to identify them. Many of the next generation personal computer systems will have integrated biometric technology so that no external hardware is needed. In the mean time, users can buy small peripherals, like a mouse with integrated biometric technology or a small finger terminal for finger scans, to secure their personal computers.
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.