The document describes an access control system that uses authentication, authorization, and access control to manage entry points and monitor security breaches. It uses an electromagnetic proximity card reader, keypad, and PIC microcontroller authenticated by a connected computer to determine authorization and access rights, with information sent to a central workstation. The system controls a door relay and displays the login date, time, and person's name on an LCD screen.