SlideShare a Scribd company logo
1 of 37
PRESENTED BY,
ARAVIND M
MEGHA MAHESH
NANDU B RAJAN
S LEKSHMI PRIYA
ARUNIMA RAMAKRISHNAN
INTRODUCTION
Digital door locks have been widely used in households and
offices.
In many cases, an intruder has tried to penetrate a private
area by circumventing the lock.
Here we design and implement an IoT-based digital door
lock to reduce the damage of digital door lock tampering and
to enhance the various security and monitoring functions
using IoT technologies.
The system also provides feature for tracking family
members and contains a provision for broadcast messaging.
OBJECTIVES
• Detecting an intruder who tries to invade by applying physical
force to the lock.
• The user can remotely control the door lock after reviewing the
image.
• The controller can detect a valid user approaching the digital door
lock, if he is carrying the mobile device, and will open door lock
automatically.
SCOPE AND SIGNIFICANCE
• The lock was designed to improve user convenience by allowing
him to check the image of a valid visitor and open or close the door
lock remotely.
• Another efficient system function is that when a valid user
approaches the door, the door lock system opens the door without
additional operations.
EXISTING SYSTEM
 The existing system largely consists of physical lock and
keys.
 The problem with existing system is that the physical key is
easy to manipulate also for multiple doors one needs to
carry multiple keys.
LIMITATIONS OF EXISTING SYSTEM
In traditional locking mechanism we need to carry physical
key with us.
In other digital locks we cannot identify the intruder.
If someone tries to break the lock we wouldn't get informed.
PROPOSED SYSTEM
 LOCKING FEATURE : Lock and Unlock the Door Lock by tapping. Also show the status of Door Lock.
 OPEN LOCK AUTOMATICALY : Automatically open the door when the authenticated devices come
near the door using bluetooth and ultrasonic sensor.
 VISITOR : Capture the image and sent as alert when someone press the calling bell. Provide a
provision to unlock the door for the visitor remotely.
 FAMILY TRACKING : Track the current location of family members.
 MESSAGING : Give Broadcast messages to all members of the family.
 THREAT ALERT : Alert the family members in any case of threat like someone tries to break the door
using vibration sensor. Alert with image captured.
 VISITOR'S HISTORY : Store the Door accessing history. History can be cleaned by admin.
ADVANTAGES OF PROPOSED SYSTEM
 The development of this system will be using the android
phone as to open the door via Bluetooth into the proposed
system.
 The proposed system will function to open the door and
notifies the mobile device with attacker's when the rupture
force happen.
 Development of the system can increase the efficiency of
the security on the house.
SYSTEM OVERVIEW
MODULES
 HARDWARE MODULE
 SOFTWARE MODULE
HARDWARE MODULES
 Microcontroller
 CAMERA
 SENSOR
BLUETOOTH
 WIFI
MICROCONTROLLER
• A Raspberry Pi control board that is
mounted in the lock.
• The controller detects physical impacts
applied by a visitor, and notifies the
user's mobile device.
• Important function of the controller is
automatically opening or closing the door
when a valid user comes near.
CAMERA MODULE
• If a physical impact is applied on the lock, the image will be
captured and sent to the mobile device.
• Pi Cam is used to capture images according to sensors.
• If the visitor press the calling bell, their image will also be captured
and sent to the user’s mobile device so that they can open the door
remotely.
SENSOR MODULE
• Vibration sensor is used to detect the physical impact on the lock.
• Ultrasonic sensor is used to recognize the proximity of the user.
BLUETOOTH MODULE
• Bluetooth module is used for communicating with the mobile
device.
• When a valid user accesses the door holding an object, it is difficult
to operate the door lock.
• Then the controller communicates with the mobile device via
bluetooth and opens the door automatically.
WIFI MODULE
• This module is used to establish connection with smartphone and
help to access device remotely.
SOFTWARE MODULES
 Registration
 Login
 Lock
 Tracking & Messaging
 History
REGISTRATION MODULE
• The module will provide the facility for a user to activate his/her account.
• Customer registers using a unique Lock ID
• An authentication mail i.e., an OTP is sent to provided contact number.
• The registration process allows the user to activate his mobile app for the
specific lock with given Lock ID.
• The first registered member will be the admin and all others users. Admin can
only authenticate other user to get registered by key generation process.
• Admin registers using the lockid given by the provider whereas users registers
using the key which is generated by admin.
LOGIN MODULE
• The module will provide the facility for a user to login to his/her account.
• Customer login using username and password.
• Successful login enables the user to enter the access verification page
which uses phone’s security feature for verification.
• Once successfully logged in, the user will directly enter to access
verification page.
LOCK MODULE
• The user can know the status of the lock (locked/unlocked).
• The security feature of the phone will be directly used for accessing the lock.
• If intruder is identified the image will be sent to all the users as an alert.
• Image of visitor will also be sent when switch is pressed.
TRACKING & MESSAGING MODULE
• The user can see the current location of all family members registered
using the specific Lock ID.
• A provision for broadcasting message to the members are also included
in this module.
HISTORY
• The accessing details of user can be viewed here.
• History contains the information about the user and his activity.
• It also comprises of images of intruders and visitors (if any).
• The history can be wiped by admin .
IMPLEMENTATION
Operating System Raspbian, Android
Coding Language Python, PHP
IDE Android Studio
Database My SQL
ARCHITECTURE
DFD LEVEL 0
DFD LEVEL 1
SCREENSHOTS
APP PREVIEW
Admin Registration
[First User]
User Registration
[Adding Users]
App Overview
CONCLUSION
Our system identifies threat and notifies the user thus enhances the
security features.
It not only helps in accessing the door but also provides a tracking
facility for members including message broadcast facility.
Over than these features it automatically opens the door when the
authenticated devices come near the door using bluetooth and
ultrasonic sensor.
Thank you all....

More Related Content

What's hot

Smart home technology
Smart  home technologySmart  home technology
Smart home technologyAnusuaBasu
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056mashiur
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)lynn li
 

What's hot (6)

Home security
Home securityHome security
Home security
 
Smart home technology
Smart  home technologySmart  home technology
Smart home technology
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)
 

Similar to iGUARD: An Intelligent Way To Secure - Presentation

iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithmsBadiginchala Manohari
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEKethavathSrinu
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoTIRJET Journal
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEIRJET Journal
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida26
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcway Technologies
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwaytech
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwayt
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptxPooja541216
 
hikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfhikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfMichelleSaver
 
smartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxsmartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxchiragsojitra180
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control systemEcwaytech
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control systemEcwayt
 
Smart door lock
Smart door lockSmart door lock
Smart door lockaswin5432
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmSai Kumar
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security systemEcway Technologies
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Brundha Sholaganga
 
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVAPHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVAssuser7f90ae
 

Similar to iGUARD: An Intelligent Way To Secure - Presentation (20)

iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
Face Lock.ppt
Face Lock.pptFace Lock.ppt
Face Lock.ppt
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
hikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfhikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdf
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
smartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxsmartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptx
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control system
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control system
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVAPHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
PHONE GUARD MOBILE ANTI THEFT SYSTEM JAVA
 

More from Nandu B Rajan

iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportiGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportNandu B Rajan
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportNandu B Rajan
 
LPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] ReportLPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] ReportNandu B Rajan
 
LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]Nandu B Rajan
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportNandu B Rajan
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Nandu B Rajan
 
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving BiometricsOPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving BiometricsNandu B Rajan
 

More from Nandu B Rajan (7)

iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportiGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - Report
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar Report
 
LPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] ReportLPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] Report
 
LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar Report
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
 
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving BiometricsOPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

iGUARD: An Intelligent Way To Secure - Presentation

  • 1. PRESENTED BY, ARAVIND M MEGHA MAHESH NANDU B RAJAN S LEKSHMI PRIYA ARUNIMA RAMAKRISHNAN
  • 2. INTRODUCTION Digital door locks have been widely used in households and offices. In many cases, an intruder has tried to penetrate a private area by circumventing the lock. Here we design and implement an IoT-based digital door lock to reduce the damage of digital door lock tampering and to enhance the various security and monitoring functions using IoT technologies. The system also provides feature for tracking family members and contains a provision for broadcast messaging.
  • 3. OBJECTIVES • Detecting an intruder who tries to invade by applying physical force to the lock. • The user can remotely control the door lock after reviewing the image. • The controller can detect a valid user approaching the digital door lock, if he is carrying the mobile device, and will open door lock automatically.
  • 4. SCOPE AND SIGNIFICANCE • The lock was designed to improve user convenience by allowing him to check the image of a valid visitor and open or close the door lock remotely. • Another efficient system function is that when a valid user approaches the door, the door lock system opens the door without additional operations.
  • 5. EXISTING SYSTEM  The existing system largely consists of physical lock and keys.  The problem with existing system is that the physical key is easy to manipulate also for multiple doors one needs to carry multiple keys.
  • 6. LIMITATIONS OF EXISTING SYSTEM In traditional locking mechanism we need to carry physical key with us. In other digital locks we cannot identify the intruder. If someone tries to break the lock we wouldn't get informed.
  • 7. PROPOSED SYSTEM  LOCKING FEATURE : Lock and Unlock the Door Lock by tapping. Also show the status of Door Lock.  OPEN LOCK AUTOMATICALY : Automatically open the door when the authenticated devices come near the door using bluetooth and ultrasonic sensor.  VISITOR : Capture the image and sent as alert when someone press the calling bell. Provide a provision to unlock the door for the visitor remotely.  FAMILY TRACKING : Track the current location of family members.  MESSAGING : Give Broadcast messages to all members of the family.  THREAT ALERT : Alert the family members in any case of threat like someone tries to break the door using vibration sensor. Alert with image captured.  VISITOR'S HISTORY : Store the Door accessing history. History can be cleaned by admin.
  • 8. ADVANTAGES OF PROPOSED SYSTEM  The development of this system will be using the android phone as to open the door via Bluetooth into the proposed system.  The proposed system will function to open the door and notifies the mobile device with attacker's when the rupture force happen.  Development of the system can increase the efficiency of the security on the house.
  • 11. HARDWARE MODULES  Microcontroller  CAMERA  SENSOR BLUETOOTH  WIFI
  • 12. MICROCONTROLLER • A Raspberry Pi control board that is mounted in the lock. • The controller detects physical impacts applied by a visitor, and notifies the user's mobile device. • Important function of the controller is automatically opening or closing the door when a valid user comes near.
  • 13. CAMERA MODULE • If a physical impact is applied on the lock, the image will be captured and sent to the mobile device. • Pi Cam is used to capture images according to sensors. • If the visitor press the calling bell, their image will also be captured and sent to the user’s mobile device so that they can open the door remotely.
  • 14. SENSOR MODULE • Vibration sensor is used to detect the physical impact on the lock. • Ultrasonic sensor is used to recognize the proximity of the user.
  • 15. BLUETOOTH MODULE • Bluetooth module is used for communicating with the mobile device. • When a valid user accesses the door holding an object, it is difficult to operate the door lock. • Then the controller communicates with the mobile device via bluetooth and opens the door automatically.
  • 16. WIFI MODULE • This module is used to establish connection with smartphone and help to access device remotely.
  • 17. SOFTWARE MODULES  Registration  Login  Lock  Tracking & Messaging  History
  • 18. REGISTRATION MODULE • The module will provide the facility for a user to activate his/her account. • Customer registers using a unique Lock ID • An authentication mail i.e., an OTP is sent to provided contact number. • The registration process allows the user to activate his mobile app for the specific lock with given Lock ID. • The first registered member will be the admin and all others users. Admin can only authenticate other user to get registered by key generation process. • Admin registers using the lockid given by the provider whereas users registers using the key which is generated by admin.
  • 19. LOGIN MODULE • The module will provide the facility for a user to login to his/her account. • Customer login using username and password. • Successful login enables the user to enter the access verification page which uses phone’s security feature for verification. • Once successfully logged in, the user will directly enter to access verification page.
  • 20. LOCK MODULE • The user can know the status of the lock (locked/unlocked). • The security feature of the phone will be directly used for accessing the lock. • If intruder is identified the image will be sent to all the users as an alert. • Image of visitor will also be sent when switch is pressed.
  • 21. TRACKING & MESSAGING MODULE • The user can see the current location of all family members registered using the specific Lock ID. • A provision for broadcasting message to the members are also included in this module.
  • 22. HISTORY • The accessing details of user can be viewed here. • History contains the information about the user and his activity. • It also comprises of images of intruders and visitors (if any). • The history can be wiped by admin .
  • 23. IMPLEMENTATION Operating System Raspbian, Android Coding Language Python, PHP IDE Android Studio Database My SQL
  • 28.
  • 29.
  • 30.
  • 31.
  • 36. CONCLUSION Our system identifies threat and notifies the user thus enhances the security features. It not only helps in accessing the door but also provides a tracking facility for members including message broadcast facility. Over than these features it automatically opens the door when the authenticated devices come near the door using bluetooth and ultrasonic sensor.