SlideShare a Scribd company logo
1 of 11
WOLKITE UNIVERSITY
COLLAGE OF COMPUTING
AND INFORMATICS
DEPARTMENT OF SOFTWARE ENGINEERING
SECTION 1
PROJECT TITLE :- ORGANIZATION DOOR LOCK SECURITY
YEAR :- 2015/16
GROUP MEMBERS ID
1. TAGAGN DIRIBA CIR/333/06
2. MULUNEH NAGASH CIR/286/06
3. MERON MEZGEBE CIR/253/06
4. DEBEBE HABTE CIR/103/06
5. HABTAMU ABABU CIR/170/06
Submitted to Mr. ALEMU
Submission date :-
TABLE OF CONTENTS
1. Chapter one requirement analysis and design
1.1. Introduction
1.2. Background
1.3. Statement of problem
1.4. Objective
1.5. Constraints and scope
1.6. Feasiblity analysis
2. Chapter two description of the system
2.1. Major functions of the current system
2.2. Users of the Existing System
2.3. Components of the Existing System
2.4. Problems of the Current System
2.5. Business Rules/Security Policy of the current system
3. Chapter three :- Information Security Policy Development
3.1. Introduction
3.2. Purpose
3.3. Scope
3.4. Organization of Information Security/Responsibilities for Information Security
3.5. Policy Statement
3.6. Policy Framework
4. Chapter four :-system design
4.1. High level design
4.2. Low level design
4.3. Physical design
4.4. Logical design
4.5. Component design
4.6. Interfaces design
5. Chapter five
5.1. Testing Strategy
5.2. Maintenance Mechanismm
5.3. Conclusion
5.4. Recommendation
6. References
Chapter ONE (1)
1. Requirement Analysis and Elicitation on Organization Door Lock Security
1.1. INTRODUCTION
Organization Door Lock Security System is one mechanism of securing an organization from
an authorized user for sensitive sites within the organization, like Database, server room and
so on.The purpose of the Organization Door Lock Security System is to create an
environment within the organization that maintains system security, data integrity and
privacy by preventing unauthorized access to data and by preventing misuse of, damage to,
or loss of data. The organization will adhere to the policies identified in this document and
use these standards in which to develop, implement, and maintain the
security. Technological advances and changes in the District requirements will necessitate
periodic revisions; therefore, the organization will review and update IT security plans at
least annually or following any significant change to its business, computing, or
telecommunications environment.
the smart card access system will allow members of the organization to access the building
using a magnetic stripe card, such as a smartcard or atm card. a bas-enabled door would permit
users to swipe a valid card, open the door within five seconds, and enter the building. a secure,
off-site database will monitor system activity by keeping an audit trail of access attempts.
system administrators will be able to modify the list of approved users by adding new or
removing existing cards.in the event of a power failure, the system will be supported by a backup
battery.
users of the organization need a more efficient method of access control than currently employed.
the standard lock and key system requires monitoring the distribution of keys and periodic
replacement of locks and lost or stolen keys. the system will provide organization administrators
with better control over which users are granted access and will allow users to utilize cards that
they already carry with them.
1.2. BACKGROUND
This organization has a secured door lock system, since it holds very sensitive information, but
the system was highly vulnerable. Due to its high vulnerable rate it is recommended to use
highly secured system and here is how it works. Some of the basic mechanisms that used to
know the authorized user are :- finger print reading, granting password, using master card,
detecting iris, and when it is recommended to use highly secured situation the system is
designed in …….. stages, first the user that want to enter that room have to use its password,
and unlock the first door, since the password can be gate by many means, it is necessary to
check its iris, and if the iris detection is matched to the one of the authorized user, but this is
not the last detection, since when the system is secured it’s vulnerability also increase then,
what if the user is not the authorized person but has authorized iris, then the last chance is
catching the movement of his body like arm , leg, neck and so on when he/she is walking.
1.3. Statement of the problem
As it is told earlier no system is 100% secured with no vulnerability, but the level of
vulnerability is different, it is not possible to remove security vulnerability, but we can reduce
it,
In our security system the basic problems are,
a. Password cracking and accessing, passwords of the doors can be cracked or
unauthorized user can gate it throw many systems.
b. The second is some persons can create their id that seems the same to the systems,
and it would read it.
c. The third is, a person that wants to use the sensitive data would create an artificial iris
digitally by copping one of users’ iris.
1.4.Objective
The WCF will be provided with the Buzz Card Access System (BAS), which is an
electric access control system consisting of magnetic card readers and magnetic locks, all
controlled by a central single board computer (SBC). The BAS will replace the current lock
and key system on three of the five doors in the WCF. For each card swipe, the card reader
will transmit the data to the SBC. The SBC will then decode the information and compare it
against a locally stored access list, unlocking the door for five seconds if the user is
approved. Each access attempt will be logged and sent to a secure off-site location via FTP.
System administrators will be able to modify the approved users list, view the access logs,
and override lock status via a web server interface.
1.5.DISCRIPTION OF THE SYSTEM
Here we see the overall description of the security system. How it worked, how it remove
unauthorized user and
The system will be controlled by a Linux single board computer which will receive
information from the card readers and password reader keyboard, manipulate the magnetic
locks in response to that data, and maintain activity logs. The target price was chosen to be
realistic yet competitive. These goals ensure that WCF members will receive a secure,
efficient, and reliable system for controlling access to their facility.
1.6. Scope and constraints of the project
Magnetic locks were chosen in place of strike locks due to the difficulty that the
previous group found in installing the latter. However, magnetic locks draw a
constant current while active, which in turn may necessitate a larger backup battery.
The card readers were chosen based on convenience. They are the same model
employed throughout campus, and extras are readily available. The Linux SBC was
chosen due the available data from the work done with it by the previous group.
Magnetic stripe reading was selected over RFID-based access because users are far
more likely to carry cards with magnetic stripe encoding.When we come to the
password based doors, it is a low range circuit, i.e. it is not possible to operate the
circuit remotely.
1.7. Feasibility analysis
Chapter two
2. Description of current system
The traditional lock system presently used in this organization facility is cumbersome, time
consuming, and subject to user abuse. Currently, each facility member needs a key in order to
access the building. As the number of members of the organization varies, keys have to be
stored, redistributed, and duplicated. The possibility of unauthorized copying of keys poses a
security threat to the facility and requires periodic expensive lock replacement.The current
system costs the WCF a significant amount of time and money.
By implementing the BAS, administrative and maintenance costs will be reduced.
Approved members can swipe any magnetic stripe card, such as a BuzzCard, and instantly gain
access to the building. System administrators can easily revise the user list by logging on and
adding or removing cards as needed. The magnetic locks do not need to be replaced as different
users lose and gain access, and keys do not need to be issued
Flowchartof the system
Match not found
input combinations
given by user Match found
checking
Increment
counter
Unlock
door
Count
=3
Operation
disabled
2.1. Major functions of the system
The goals for this project are as follows:
 Reads magnetic stripe cards
 Accept number passwords to access the door
 Automatically locks and unlocks doors
 Admits only authorized users
 Records activity logs
 Catch the neck, arm and leg movement to access very sensitive sites in the organization
 Transmits logs off-site
 Allows for administrative control via a web server
 Contains a backup battery
 Alarm
2.2. Users of the existing system
Anyone who used the existing system should have an understanding about the system, and how can
he/she use this system easily. So everyone in the organization should have a training for some days
untill it becomes easy to use. And everybody in the organization should have remember the
password or not forget the magnetic card everyday and time in order to access the room in the
organization, since it is managed digitally no-one is allowed to access the door without the given
password or card. Here it will be hard to implement for some days until the users understand the
system.
2.3. Components of the existing system
The existing system was not digital or electronics, it uses mechanical locks. It have only key and
pad.
2.4. problems of the existing system
if anyone gets the copy of the key he/she can get through it.
Generally, it is easy to say it was not secured.
2.5. Business Rules/Security Policy of the current system
The basic
3. Chapter three :- Information Security Policy Development
Here we see what are the basic information security policy development of the system.
alarm
3.1. Introduction
3.2. Purpose
3.3. Scope
3.4. Organization of Information Security/Responsibilities
for Information Security
3.5. Policy Statement
3.6. Policy Framework
4. Chapter four :-system design
Design principle of password based doorlock security sysetm
Power supply
unit
Output
unit
Input unit
Control
unit
4.1. High level design
The high level design of the system includes the overall System Design in terms
of Functional Architecture and Database design
Our project contains many hardware and software components that have to be
implemented and they have to be compatable with eachother. Some of them are
listed,
1. Hardware components
Workstation,server, ,door,card reader,keyboard,DC motor.lcd,relay.
2. Software components
Database,security system.
The image Below is how the system generally do its task.
Keypad is an input device that helps to enter a code to open the door. It gives the entered code
signals to the microcontroller.
LCD and BUZZER are the final indicating devices for displaying informayion and alarming.
DC Motor it moves the door opens and closes the door.
Relay it drives this motor by recieving control signals from microcontroller.
4.2. Low level design
Low level design is the operations performed in the system. High level design is created based
up on the low level design.
Here is how how the system is performing it’s task.
4.3. Physical design
4.4. Logical design
4.5. Component design
4.6. Interfaces design
Here we see how the user can input data to the system and how the system gives the
output.
First we have to see how the system is lookslike to the endusers by diagrm.
5. Chapter five
5.1. Testing Strategy
5.2. Maintenance Mechanismm
5.3. Conclusion
 Motor specificationistobe determined.
 Choice of flip-flopstill hasascope of verification.
 Microcontrollercanbe implementedforacquiringmore intelligence inoursystem.
 16 bit registercanbe usedfor more protection.
 We can alsolockour systembyusingthe same password.
5.4. Recommendation
6. References
Information security  proposal for electronic door lock

More Related Content

What's hot

Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharShivnaresh Likhar
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic doorIndira Kundu
 
Final year report on remote control of home appliances via bluetooth
Final year report on remote control of home appliances via bluetoothFinal year report on remote control of home appliances via bluetooth
Final year report on remote control of home appliances via bluetoothShubham Bhattacharya
 
Iot based health monitoring system
Iot based health monitoring systemIot based health monitoring system
Iot based health monitoring systemShaswataMohanta
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduinosayyed sabir
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAHEMANTA SAHU
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Jyothsna Sridhar
 
Light Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterLight Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterRituraj Singh
 
HOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOHOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOEklavya Sharma
 
Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Uttej Kumar Palavai
 
iot industry automation
iot industry automationiot industry automation
iot industry automationmansi sharma
 
RFID Gate Management System
RFID Gate Management SystemRFID Gate Management System
RFID Gate Management Systemimagicsolution
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationNikhil Jadav
 
Smart Digital Door Lock
Smart Digital Door LockSmart Digital Door Lock
Smart Digital Door Lockshakil2604
 

What's hot (20)

Smart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likharSmart door project ppt shivnaresh likhar
Smart door project ppt shivnaresh likhar
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
IoT Home Automation System
IoT Home Automation SystemIoT Home Automation System
IoT Home Automation System
 
Report on automatic door
Report on automatic doorReport on automatic door
Report on automatic door
 
Final year report on remote control of home appliances via bluetooth
Final year report on remote control of home appliances via bluetoothFinal year report on remote control of home appliances via bluetooth
Final year report on remote control of home appliances via bluetooth
 
Home security alarm system
 Home security alarm  system  Home security alarm  system
Home security alarm system
 
Iot based health monitoring system
Iot based health monitoring systemIot based health monitoring system
Iot based health monitoring system
 
Automatic door using arduino
Automatic door using arduinoAutomatic door using arduino
Automatic door using arduino
 
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTAPASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
PASSWORD PROTECTED DOOR OPENING SYSTEM BY HEMANTA
 
Home automation
Home automationHome automation
Home automation
 
Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things Vehicle anti theft tracking system based on internet of things
Vehicle anti theft tracking system based on internet of things
 
Light Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor CounterLight Automation System Using Bidirectional Visitor Counter
Light Automation System Using Bidirectional Visitor Counter
 
HOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINOHOME AUTOMATION USING ARDUINO
HOME AUTOMATION USING ARDUINO
 
smart Home security
smart Home securitysmart Home security
smart Home security
 
Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system Women Security Assistance system with GPS tracking and messaging system
Women Security Assistance system with GPS tracking and messaging system
 
iot industry automation
iot industry automationiot industry automation
iot industry automation
 
RFID Gate Management System
RFID Gate Management SystemRFID Gate Management System
RFID Gate Management System
 
IOT: Home Automation using Android Application
IOT: Home Automation using Android ApplicationIOT: Home Automation using Android Application
IOT: Home Automation using Android Application
 
Smart Digital Door Lock
Smart Digital Door LockSmart Digital Door Lock
Smart Digital Door Lock
 
Home security system
Home security system Home security system
Home security system
 

Viewers also liked

Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportChinaraja Baratam
 
Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock deviceAmitoj Kaur
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemRajan Bairasriya
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking systemArjun Singh
 
Sample project abstract
Sample project abstractSample project abstract
Sample project abstractklezeh
 
Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security | Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security | techlead-india
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMavinash yada
 

Viewers also liked (10)

Digital Code Lock
Digital Code LockDigital Code Lock
Digital Code Lock
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final report
 
Electronic code lock device
Electronic code lock deviceElectronic code lock device
Electronic code lock device
 
Project ppt
Project pptProject ppt
Project ppt
 
Seminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection SystemSeminar report- Electronic Toll Collection System
Seminar report- Electronic Toll Collection System
 
Rfid security access control system
Rfid security access control systemRfid security access control system
Rfid security access control system
 
Password based door locking system
Password based door locking systemPassword based door locking system
Password based door locking system
 
Sample project abstract
Sample project abstractSample project abstract
Sample project abstract
 
Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security | Gps Tracker with RFID | School Security |
Gps Tracker with RFID | School Security |
 
RFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEMRFID BASED SECURITY ACCESS CONTROL SYSTEM
RFID BASED SECURITY ACCESS CONTROL SYSTEM
 

Similar to Information security proposal for electronic door lock

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Library turnstiles security solutions mairsturnstile 2020
Library turnstiles security solutions   mairsturnstile 2020Library turnstiles security solutions   mairsturnstile 2020
Library turnstiles security solutions mairsturnstile 2020www.mairsturnstile.com
 
Best library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comBest library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comwww.mairsturnstile.com
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET Journal
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemAbhishek Kumar
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)Felipe Prado
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing systemAkshita Pillai
 
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTAUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTIRJET Journal
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric PresentationDarrell Smith
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Querieschennaijp
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEEFINALYEARSTUDENTPROJECTS
 

Similar to Information security proposal for electronic door lock (20)

International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Library turnstiles security solutions mairsturnstile 2020
Library turnstiles security solutions   mairsturnstile 2020Library turnstiles security solutions   mairsturnstile 2020
Library turnstiles security solutions mairsturnstile 2020
 
Best library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.comBest library turnstiles - Mairsturnstile.com
Best library turnstiles - Mairsturnstile.com
 
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...IRJET-  	  Arduino Based Entrance Monitoring System using RFID and Real Time ...
IRJET- Arduino Based Entrance Monitoring System using RFID and Real Time ...
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale System
 
Paper2
Paper2Paper2
Paper2
 
ICEIC_2017_20161013
ICEIC_2017_20161013ICEIC_2017_20161013
ICEIC_2017_20161013
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)2600 v03 n02 (february 1986)
2600 v03 n02 (february 1986)
 
Cake shop billing system
Cake shop billing systemCake shop billing system
Cake shop billing system
 
Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
Ch10
Ch10Ch10
Ch10
 
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoTAUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
AUTOMATIC DOOR UNLOCK WITH FACIAL RECOGNITION USING IoT
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
WNA.pdf
WNA.pdfWNA.pdf
WNA.pdf
 
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424  Privacy-Preserving and Content-Protecting Location Based QueriesJPJ1424  Privacy-Preserving and Content-Protecting Location Based Queries
JPJ1424 Privacy-Preserving and Content-Protecting Location Based Queries
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
IEEE 2014 JAVA DATA MINING PROJECTS Privacy preserving and content-protecting...
 

Recently uploaded

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 

Recently uploaded (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

Information security proposal for electronic door lock

  • 1. WOLKITE UNIVERSITY COLLAGE OF COMPUTING AND INFORMATICS DEPARTMENT OF SOFTWARE ENGINEERING SECTION 1 PROJECT TITLE :- ORGANIZATION DOOR LOCK SECURITY YEAR :- 2015/16 GROUP MEMBERS ID 1. TAGAGN DIRIBA CIR/333/06 2. MULUNEH NAGASH CIR/286/06 3. MERON MEZGEBE CIR/253/06 4. DEBEBE HABTE CIR/103/06 5. HABTAMU ABABU CIR/170/06 Submitted to Mr. ALEMU Submission date :-
  • 2. TABLE OF CONTENTS 1. Chapter one requirement analysis and design 1.1. Introduction 1.2. Background 1.3. Statement of problem 1.4. Objective 1.5. Constraints and scope 1.6. Feasiblity analysis 2. Chapter two description of the system 2.1. Major functions of the current system 2.2. Users of the Existing System 2.3. Components of the Existing System 2.4. Problems of the Current System 2.5. Business Rules/Security Policy of the current system 3. Chapter three :- Information Security Policy Development 3.1. Introduction 3.2. Purpose 3.3. Scope 3.4. Organization of Information Security/Responsibilities for Information Security 3.5. Policy Statement 3.6. Policy Framework 4. Chapter four :-system design 4.1. High level design 4.2. Low level design 4.3. Physical design 4.4. Logical design 4.5. Component design 4.6. Interfaces design 5. Chapter five 5.1. Testing Strategy 5.2. Maintenance Mechanismm 5.3. Conclusion 5.4. Recommendation 6. References
  • 3. Chapter ONE (1) 1. Requirement Analysis and Elicitation on Organization Door Lock Security 1.1. INTRODUCTION Organization Door Lock Security System is one mechanism of securing an organization from an authorized user for sensitive sites within the organization, like Database, server room and so on.The purpose of the Organization Door Lock Security System is to create an environment within the organization that maintains system security, data integrity and privacy by preventing unauthorized access to data and by preventing misuse of, damage to, or loss of data. The organization will adhere to the policies identified in this document and use these standards in which to develop, implement, and maintain the security. Technological advances and changes in the District requirements will necessitate periodic revisions; therefore, the organization will review and update IT security plans at least annually or following any significant change to its business, computing, or telecommunications environment. the smart card access system will allow members of the organization to access the building using a magnetic stripe card, such as a smartcard or atm card. a bas-enabled door would permit users to swipe a valid card, open the door within five seconds, and enter the building. a secure, off-site database will monitor system activity by keeping an audit trail of access attempts. system administrators will be able to modify the list of approved users by adding new or removing existing cards.in the event of a power failure, the system will be supported by a backup battery. users of the organization need a more efficient method of access control than currently employed. the standard lock and key system requires monitoring the distribution of keys and periodic replacement of locks and lost or stolen keys. the system will provide organization administrators with better control over which users are granted access and will allow users to utilize cards that they already carry with them. 1.2. BACKGROUND This organization has a secured door lock system, since it holds very sensitive information, but the system was highly vulnerable. Due to its high vulnerable rate it is recommended to use
  • 4. highly secured system and here is how it works. Some of the basic mechanisms that used to know the authorized user are :- finger print reading, granting password, using master card, detecting iris, and when it is recommended to use highly secured situation the system is designed in …….. stages, first the user that want to enter that room have to use its password, and unlock the first door, since the password can be gate by many means, it is necessary to check its iris, and if the iris detection is matched to the one of the authorized user, but this is not the last detection, since when the system is secured it’s vulnerability also increase then, what if the user is not the authorized person but has authorized iris, then the last chance is catching the movement of his body like arm , leg, neck and so on when he/she is walking. 1.3. Statement of the problem As it is told earlier no system is 100% secured with no vulnerability, but the level of vulnerability is different, it is not possible to remove security vulnerability, but we can reduce it, In our security system the basic problems are, a. Password cracking and accessing, passwords of the doors can be cracked or unauthorized user can gate it throw many systems. b. The second is some persons can create their id that seems the same to the systems, and it would read it. c. The third is, a person that wants to use the sensitive data would create an artificial iris digitally by copping one of users’ iris. 1.4.Objective The WCF will be provided with the Buzz Card Access System (BAS), which is an electric access control system consisting of magnetic card readers and magnetic locks, all controlled by a central single board computer (SBC). The BAS will replace the current lock and key system on three of the five doors in the WCF. For each card swipe, the card reader will transmit the data to the SBC. The SBC will then decode the information and compare it against a locally stored access list, unlocking the door for five seconds if the user is approved. Each access attempt will be logged and sent to a secure off-site location via FTP. System administrators will be able to modify the approved users list, view the access logs, and override lock status via a web server interface. 1.5.DISCRIPTION OF THE SYSTEM Here we see the overall description of the security system. How it worked, how it remove unauthorized user and The system will be controlled by a Linux single board computer which will receive information from the card readers and password reader keyboard, manipulate the magnetic locks in response to that data, and maintain activity logs. The target price was chosen to be realistic yet competitive. These goals ensure that WCF members will receive a secure, efficient, and reliable system for controlling access to their facility. 1.6. Scope and constraints of the project Magnetic locks were chosen in place of strike locks due to the difficulty that the previous group found in installing the latter. However, magnetic locks draw a
  • 5. constant current while active, which in turn may necessitate a larger backup battery. The card readers were chosen based on convenience. They are the same model employed throughout campus, and extras are readily available. The Linux SBC was chosen due the available data from the work done with it by the previous group. Magnetic stripe reading was selected over RFID-based access because users are far more likely to carry cards with magnetic stripe encoding.When we come to the password based doors, it is a low range circuit, i.e. it is not possible to operate the circuit remotely. 1.7. Feasibility analysis Chapter two 2. Description of current system The traditional lock system presently used in this organization facility is cumbersome, time consuming, and subject to user abuse. Currently, each facility member needs a key in order to access the building. As the number of members of the organization varies, keys have to be stored, redistributed, and duplicated. The possibility of unauthorized copying of keys poses a security threat to the facility and requires periodic expensive lock replacement.The current system costs the WCF a significant amount of time and money. By implementing the BAS, administrative and maintenance costs will be reduced. Approved members can swipe any magnetic stripe card, such as a BuzzCard, and instantly gain access to the building. System administrators can easily revise the user list by logging on and adding or removing cards as needed. The magnetic locks do not need to be replaced as different users lose and gain access, and keys do not need to be issued Flowchartof the system Match not found input combinations given by user Match found checking Increment counter Unlock door Count =3 Operation disabled
  • 6. 2.1. Major functions of the system The goals for this project are as follows:  Reads magnetic stripe cards  Accept number passwords to access the door  Automatically locks and unlocks doors  Admits only authorized users  Records activity logs  Catch the neck, arm and leg movement to access very sensitive sites in the organization  Transmits logs off-site  Allows for administrative control via a web server  Contains a backup battery  Alarm 2.2. Users of the existing system Anyone who used the existing system should have an understanding about the system, and how can he/she use this system easily. So everyone in the organization should have a training for some days untill it becomes easy to use. And everybody in the organization should have remember the password or not forget the magnetic card everyday and time in order to access the room in the organization, since it is managed digitally no-one is allowed to access the door without the given password or card. Here it will be hard to implement for some days until the users understand the system. 2.3. Components of the existing system The existing system was not digital or electronics, it uses mechanical locks. It have only key and pad. 2.4. problems of the existing system if anyone gets the copy of the key he/she can get through it. Generally, it is easy to say it was not secured. 2.5. Business Rules/Security Policy of the current system The basic 3. Chapter three :- Information Security Policy Development Here we see what are the basic information security policy development of the system. alarm
  • 7. 3.1. Introduction 3.2. Purpose 3.3. Scope 3.4. Organization of Information Security/Responsibilities for Information Security 3.5. Policy Statement 3.6. Policy Framework 4. Chapter four :-system design Design principle of password based doorlock security sysetm Power supply unit Output unit Input unit Control unit
  • 8. 4.1. High level design The high level design of the system includes the overall System Design in terms of Functional Architecture and Database design Our project contains many hardware and software components that have to be implemented and they have to be compatable with eachother. Some of them are listed, 1. Hardware components Workstation,server, ,door,card reader,keyboard,DC motor.lcd,relay. 2. Software components Database,security system. The image Below is how the system generally do its task. Keypad is an input device that helps to enter a code to open the door. It gives the entered code signals to the microcontroller. LCD and BUZZER are the final indicating devices for displaying informayion and alarming. DC Motor it moves the door opens and closes the door. Relay it drives this motor by recieving control signals from microcontroller. 4.2. Low level design Low level design is the operations performed in the system. High level design is created based up on the low level design. Here is how how the system is performing it’s task. 4.3. Physical design 4.4. Logical design
  • 9. 4.5. Component design 4.6. Interfaces design Here we see how the user can input data to the system and how the system gives the output. First we have to see how the system is lookslike to the endusers by diagrm. 5. Chapter five 5.1. Testing Strategy 5.2. Maintenance Mechanismm 5.3. Conclusion  Motor specificationistobe determined.  Choice of flip-flopstill hasascope of verification.  Microcontrollercanbe implementedforacquiringmore intelligence inoursystem.  16 bit registercanbe usedfor more protection.  We can alsolockour systembyusingthe same password. 5.4. Recommendation