SlideShare a Scribd company logo
PRESENTED BY,
ARAVIND M
MEGHA MAHESH
NANDU B RAJAN
S LEKSHMI PRIYA
ARUNIMA RAMAKRISHNAN
INTRODUCTION
Digital door locks have been widely used in households and
offices.
In many cases, an intruder has tried to penetrate a private
area by circumventing the lock.
Here we design and implement an IoT-based digital door
lock to reduce the damage of digital door lock tampering and
to enhance the various security and monitoring functions
using IoT technologies.
The system also provides feature for tracking family
members and contains a provision for broadcast messaging.
OBJECTIVES
• Detecting an intruder who tries to invade by applying physical
force to the lock.
• The user can remotely control the door lock after reviewing the
image.
• The controller can detect a valid user approaching the digital door
lock, if he is carrying the mobile device, and will open door lock
automatically.
SCOPE AND SIGNIFICANCE
• The lock was designed to improve user convenience by allowing
him to check the image of a valid visitor and open or close the door
lock remotely.
• Another efficient system function is that when a valid user
approaches the door, the door lock system opens the door without
additional operations.
EXISTING SYSTEM
 The existing system largely consists of physical lock and
keys.
 The problem with existing system is that the physical key is
easy to manipulate also for multiple doors one needs to
carry multiple keys.
LIMITATIONS OF EXISTING SYSTEM
In traditional locking mechanism we need to carry physical
key with us.
In other digital locks we cannot identify the intruder.
If someone tries to break the lock we wouldn't get informed.
PROPOSED SYSTEM
 LOCKING FEATURE : Lock and Unlock the Door Lock by tapping. Also show the status of Door Lock.
 OPEN LOCK AUTOMATICALY : Automatically open the door when the authenticated devices come
near the door using bluetooth and ultrasonic sensor.
 VISITOR : Capture the image and sent as alert when someone press the calling bell. Provide a
provision to unlock the door for the visitor remotely.
 FAMILY TRACKING : Track the current location of family members.
 MESSAGING : Give Broadcast messages to all members of the family.
 THREAT ALERT : Alert the family members in any case of threat like someone tries to break the door
using vibration sensor. Alert with image captured.
 VISITOR'S HISTORY : Store the Door accessing history. History can be cleaned by admin.
ADVANTAGES OF PROPOSED SYSTEM
 The development of this system will be using the android
phone as to open the door via Bluetooth into the proposed
system.
 The proposed system will function to open the door and
notifies the mobile device with attacker's when the rupture
force happen.
 Development of the system can increase the efficiency of
the security on the house.
SYSTEM OVERVIEW
MODULES
 HARDWARE MODULE
 SOFTWARE MODULE
HARDWARE MODULES
 Microcontroller
 CAMERA
 SENSOR
BLUETOOTH
 WIFI
MICROCONTROLLER
• A Raspberry Pi control board that is
mounted in the lock.
• The controller detects physical impacts
applied by a visitor, and notifies the
user's mobile device.
• Important function of the controller is
automatically opening or closing the door
when a valid user comes near.
CAMERA MODULE
• If a physical impact is applied on the lock, the image will be
captured and sent to the mobile device.
• Pi Cam is used to capture images according to sensors.
• If the visitor press the calling bell, their image will also be captured
and sent to the user’s mobile device so that they can open the door
remotely.
SENSOR MODULE
• Vibration sensor is used to detect the physical impact on the lock.
• Ultrasonic sensor is used to recognize the proximity of the user.
BLUETOOTH MODULE
• Bluetooth module is used for communicating with the mobile
device.
• When a valid user accesses the door holding an object, it is difficult
to operate the door lock.
• Then the controller communicates with the mobile device via
bluetooth and opens the door automatically.
WIFI MODULE
• This module is used to establish connection with smartphone and
help to access device remotely.
SOFTWARE MODULES
 Registration
 Login
 Lock
 Tracking & Messaging
 History
REGISTRATION MODULE
• The module will provide the facility for a user to activate his/her account.
• Customer registers using a unique Lock ID
• An authentication mail i.e., an OTP is sent to provided contact number.
• The registration process allows the user to activate his mobile app for the
specific lock with given Lock ID.
• The first registered member will be the admin and all others users. Admin can
only authenticate other user to get registered by key generation process.
• Admin registers using the lockid given by the provider whereas users registers
using the key which is generated by admin.
LOGIN MODULE
• The module will provide the facility for a user to login to his/her account.
• Customer login using username and password.
• Successful login enables the user to enter the access verification page
which uses phone’s security feature for verification.
• Once successfully logged in, the user will directly enter to access
verification page.
LOCK MODULE
• The user can know the status of the lock (locked/unlocked).
• The security feature of the phone will be directly used for accessing the lock.
• If intruder is identified the image will be sent to all the users as an alert.
• Image of visitor will also be sent when switch is pressed.
TRACKING & MESSAGING MODULE
• The user can see the current location of all family members registered
using the specific Lock ID.
• A provision for broadcasting message to the members are also included
in this module.
HISTORY
• The accessing details of user can be viewed here.
• History contains the information about the user and his activity.
• It also comprises of images of intruders and visitors (if any).
• The history can be wiped by admin .
IMPLEMENTATION
Operating System Raspbian, Android
Coding Language Python, PHP
IDE Android Studio
Database My SQL
ARCHITECTURE
DFD LEVEL 0
DFD LEVEL 1
SCREENSHOTS
APP PREVIEW
Admin Registration
[First User]
User Registration
[Adding Users]
App Overview
CONCLUSION
Our system identifies threat and notifies the user thus enhances the
security features.
It not only helps in accessing the door but also provides a tracking
facility for members including message broadcast facility.
Over than these features it automatically opens the door when the
authenticated devices come near the door using bluetooth and
ultrasonic sensor.
Thank you all....

More Related Content

What's hot

Home security
Home securityHome security
Home security
Sathish Kumar
 
Smart home technology
Smart  home technologySmart  home technology
Smart home technology
AnusuaBasu
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056mashiur
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
praful borad
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET Journal
 
Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)
lynn li
 

What's hot (6)

Home security
Home securityHome security
Home security
 
Smart home technology
Smart  home technologySmart  home technology
Smart home technology
 
Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056Maheen.Mehnaz 071618056
Maheen.Mehnaz 071618056
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)Wulian Smart Light Solution (1)
Wulian Smart Light Solution (1)
 

Similar to iGUARD: An Intelligent Way To Secure - Presentation

iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
Badiginchala Manohari
 
doc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsj
doc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsjdoc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsj
doc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsj
muhammadbsme1222
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
KethavathSrinu
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
IRJET Journal
 
Face Lock.ppt
Face Lock.pptFace Lock.ppt
Face Lock.ppt
SruthiReddy112
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
Zahida26
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcway Technologies
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwaytech
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker systemEcwayt
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
Pooja541216
 
hikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfhikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdf
MichelleSaver
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 
smartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxsmartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptx
chiragsojitra180
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control systemEcwaytech
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control systemEcwayt
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
aswin5432
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
Sai Kumar
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security systemEcway Technologies
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
Brundha Sholaganga
 

Similar to iGUARD: An Intelligent Way To Secure - Presentation (20)

iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
 
doc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsj
doc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsjdoc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsj
doc.pdfhsidjej82737wuhsjsjshjsjsjsjsjssjsj
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULEHOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
HOME AUTOMATION AND COUNTERMEASURESYSTEM USING ARDUINO AND LDR MODULE
 
Face Lock.ppt
Face Lock.pptFace Lock.ppt
Face Lock.ppt
 
Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
Finger print based bank locker system
Finger print based bank locker systemFinger print based bank locker system
Finger print based bank locker system
 
finger print based door lock.pptx
finger print based door lock.pptxfinger print based door lock.pptx
finger print based door lock.pptx
 
hikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdfhikcentral_introduction_ppt-version_1.2.pdf
hikcentral_introduction_ppt-version_1.2.pdf
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
smartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptxsmartdoorlock-150516022948-lva1-app6891.pptx
smartdoorlock-150516022948-lva1-app6891.pptx
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control system
 
Finger print based security access control system
Finger print based security access control systemFinger print based security access control system
Finger print based security access control system
 
Smart door lock
Smart door lockSmart door lock
Smart door lock
 
Locker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsmLocker opening and closing system using rfid password and gsm
Locker opening and closing system using rfid password and gsm
 
Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 

More from Nandu B Rajan

iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportiGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - Report
Nandu B Rajan
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar Report
Nandu B Rajan
 
LPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] ReportLPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] Report
Nandu B Rajan
 
LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]
Nandu B Rajan
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar Report
Nandu B Rajan
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
Nandu B Rajan
 
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving BiometricsOPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
Nandu B Rajan
 

More from Nandu B Rajan (7)

iGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - ReportiGUARD: An Intelligent Way To Secure - Report
iGUARD: An Intelligent Way To Secure - Report
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar Report
 
LPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] ReportLPG Booking System [ bookmylpg.com ] Report
LPG Booking System [ bookmylpg.com ] Report
 
LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]LPG BOOKING SYSTEM [ bookmylpg.com ]
LPG BOOKING SYSTEM [ bookmylpg.com ]
 
Search Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar ReportSearch Engine Optimization (SEO) Seminar Report
Search Engine Optimization (SEO) Seminar Report
 
Search Engine Optimization (SEO)
Search Engine Optimization (SEO)Search Engine Optimization (SEO)
Search Engine Optimization (SEO)
 
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving BiometricsOPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
OPENSESAME: Unlocking Smartphone Through Handwaving Biometrics
 

Recently uploaded

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 

Recently uploaded (20)

June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 

iGUARD: An Intelligent Way To Secure - Presentation

  • 1. PRESENTED BY, ARAVIND M MEGHA MAHESH NANDU B RAJAN S LEKSHMI PRIYA ARUNIMA RAMAKRISHNAN
  • 2. INTRODUCTION Digital door locks have been widely used in households and offices. In many cases, an intruder has tried to penetrate a private area by circumventing the lock. Here we design and implement an IoT-based digital door lock to reduce the damage of digital door lock tampering and to enhance the various security and monitoring functions using IoT technologies. The system also provides feature for tracking family members and contains a provision for broadcast messaging.
  • 3. OBJECTIVES • Detecting an intruder who tries to invade by applying physical force to the lock. • The user can remotely control the door lock after reviewing the image. • The controller can detect a valid user approaching the digital door lock, if he is carrying the mobile device, and will open door lock automatically.
  • 4. SCOPE AND SIGNIFICANCE • The lock was designed to improve user convenience by allowing him to check the image of a valid visitor and open or close the door lock remotely. • Another efficient system function is that when a valid user approaches the door, the door lock system opens the door without additional operations.
  • 5. EXISTING SYSTEM  The existing system largely consists of physical lock and keys.  The problem with existing system is that the physical key is easy to manipulate also for multiple doors one needs to carry multiple keys.
  • 6. LIMITATIONS OF EXISTING SYSTEM In traditional locking mechanism we need to carry physical key with us. In other digital locks we cannot identify the intruder. If someone tries to break the lock we wouldn't get informed.
  • 7. PROPOSED SYSTEM  LOCKING FEATURE : Lock and Unlock the Door Lock by tapping. Also show the status of Door Lock.  OPEN LOCK AUTOMATICALY : Automatically open the door when the authenticated devices come near the door using bluetooth and ultrasonic sensor.  VISITOR : Capture the image and sent as alert when someone press the calling bell. Provide a provision to unlock the door for the visitor remotely.  FAMILY TRACKING : Track the current location of family members.  MESSAGING : Give Broadcast messages to all members of the family.  THREAT ALERT : Alert the family members in any case of threat like someone tries to break the door using vibration sensor. Alert with image captured.  VISITOR'S HISTORY : Store the Door accessing history. History can be cleaned by admin.
  • 8. ADVANTAGES OF PROPOSED SYSTEM  The development of this system will be using the android phone as to open the door via Bluetooth into the proposed system.  The proposed system will function to open the door and notifies the mobile device with attacker's when the rupture force happen.  Development of the system can increase the efficiency of the security on the house.
  • 11. HARDWARE MODULES  Microcontroller  CAMERA  SENSOR BLUETOOTH  WIFI
  • 12. MICROCONTROLLER • A Raspberry Pi control board that is mounted in the lock. • The controller detects physical impacts applied by a visitor, and notifies the user's mobile device. • Important function of the controller is automatically opening or closing the door when a valid user comes near.
  • 13. CAMERA MODULE • If a physical impact is applied on the lock, the image will be captured and sent to the mobile device. • Pi Cam is used to capture images according to sensors. • If the visitor press the calling bell, their image will also be captured and sent to the user’s mobile device so that they can open the door remotely.
  • 14. SENSOR MODULE • Vibration sensor is used to detect the physical impact on the lock. • Ultrasonic sensor is used to recognize the proximity of the user.
  • 15. BLUETOOTH MODULE • Bluetooth module is used for communicating with the mobile device. • When a valid user accesses the door holding an object, it is difficult to operate the door lock. • Then the controller communicates with the mobile device via bluetooth and opens the door automatically.
  • 16. WIFI MODULE • This module is used to establish connection with smartphone and help to access device remotely.
  • 17. SOFTWARE MODULES  Registration  Login  Lock  Tracking & Messaging  History
  • 18. REGISTRATION MODULE • The module will provide the facility for a user to activate his/her account. • Customer registers using a unique Lock ID • An authentication mail i.e., an OTP is sent to provided contact number. • The registration process allows the user to activate his mobile app for the specific lock with given Lock ID. • The first registered member will be the admin and all others users. Admin can only authenticate other user to get registered by key generation process. • Admin registers using the lockid given by the provider whereas users registers using the key which is generated by admin.
  • 19. LOGIN MODULE • The module will provide the facility for a user to login to his/her account. • Customer login using username and password. • Successful login enables the user to enter the access verification page which uses phone’s security feature for verification. • Once successfully logged in, the user will directly enter to access verification page.
  • 20. LOCK MODULE • The user can know the status of the lock (locked/unlocked). • The security feature of the phone will be directly used for accessing the lock. • If intruder is identified the image will be sent to all the users as an alert. • Image of visitor will also be sent when switch is pressed.
  • 21. TRACKING & MESSAGING MODULE • The user can see the current location of all family members registered using the specific Lock ID. • A provision for broadcasting message to the members are also included in this module.
  • 22. HISTORY • The accessing details of user can be viewed here. • History contains the information about the user and his activity. • It also comprises of images of intruders and visitors (if any). • The history can be wiped by admin .
  • 23. IMPLEMENTATION Operating System Raspbian, Android Coding Language Python, PHP IDE Android Studio Database My SQL
  • 28.
  • 29.
  • 30.
  • 31.
  • 36. CONCLUSION Our system identifies threat and notifies the user thus enhances the security features. It not only helps in accessing the door but also provides a tracking facility for members including message broadcast facility. Over than these features it automatically opens the door when the authenticated devices come near the door using bluetooth and ultrasonic sensor.