Sie sind auf Seite 1von 25

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

CHAPTER 1: THE PROBLEM AND ITS BACKGROUND

1.1 INTRODUCTION

From

mankinds

very

first access

control

system

to

todays

modern electronic access control, there has always been a need to protect people
and assets by limiting access to sensitive areas. Early humans had their methods,
but these have since evolved to more manageable solutions in the industrial age
with the use of doors and guards, then locks and keys. The practice of installing
electronic access control systems began in the 1960s to eliminate the problems
associated with lost keys, having the ability to instantly add, allow, restrict or
denies someones access, and to be able to immediately generate an activity report
on peoples comings and goings.

As we noticed, the school are still using the traditional way of entering the
rooms. Students or the professor get the appropriate key to the security guard to
access the room. After opening the door, the key needs to return to the security
guard. For us students, its very hassle and time-consuming. There are also some
cases reported that vandalism and ruining of computer peripherals occurs in the
computer laboratories. Most of it are happening without the presence of the
professor that is supposed to be also inside the computer laboratories when the

1|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

class is started. But we dont blame anyone regarding this kind of incidence
because we know that they will not let those things to happen.
We, the researchers, came up to the point of proposing a Door Lock
System Using Barcode Scanner that will be implemented in computer laboratories
of Baliwag Polytechnic College. The system can also monitor the attendance and
time in/out of a person who has an access to the system.

1.2 STATEMENT OF THE PROBLEM

The general problem of the study is how to create a PC Based Door Lock
System Using Barcode Scanner that will be designed for the computer
laboratories of Baliwag Polytechnic College.
This study aims to solve the specific problem stated below:

What are the materials needed in creating the door lock system?

What type of barcode scanner should be used for the access card?

How does the software and hardware will interface?

What will be the alternative way of opening or closing the door if the
system has any problems?

How can the door lock system be able to unlock by using the barcode
scanner?

2|Page

Where will be the appropriate location of the devices?

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

1.3 OBJECTIVES OF THE STUDY

The main objective of this project is to conceptualize, design and develop


a PC Based Door Lock System Using Barcode Scanner for computer laboratories
in Baliwag Polytechnic College. Specifically, the study will provide the following
objectives:

To make computer laboratories easier to access because getting keys are


time consuming.

To monitor the time in and time out of the professors who will use the lab.

To give more authority to the NINMO Staffs for efficiently manipulating


the proposed system.

1.4 SIGNIFICANCE OF THE STUDY

The main purpose of this study is to create a convenient door access


system but the security of each computer laboratories will still remain. Different
groups of people will benefit from this system such as:
Faculty Members The computer laboratory will be much easier to access
because theres no need for them to go to security guard to get the keys.
3|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Admin Staffs Works will be lessened because of the time in and time out of the
professors that will be saved in the database of the system.
NINMO Staffs They can fully monitor the use of the computer laboratory
because of the full access to the system.
Proponents More knowledge are gained because of the researchers and studies
that has been made.
Future Researchers It will serve as an inspiration to those who wanted to
develop and improve the existing system. The study can also be used as a
reference for the study they will conduct.

1.5 SCOPE & DELIMITATION

This study which seeks to create a PC Based Door Lock System that will
be used for the computer laboratories of BTECH. As such, we have set parameters
for the application of it. The researchers enumerated the scope and delimitations
in able for the users to further understand the study.
The scope of the study are the following:

To gain access, access cards are required to be scanned by the barcode


scanner.

Keys are needed for the main access but are still used for whenever
there is a system or power failure.

4|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

The system will be able to monitor the time in and time out of the
instructors that will be saved in the database.

There will be an emergency button inside the laboratory that can be


used during emergency and system malfunction.

The system will be using an Uninterruptable Power Supply (UPS) in


case there is a power failure to be able to unlock or lock again the door
but in limited time only.

The system only allows faculty member who is scheduled on that


particular time to enter the computer laboratory.

NINMO staffs, Program Directors, and faculty members who have


classes in the computer laboratory rooms are the one who have an
access to the system.

Authorized persons like NINMO staffs and Program Directors can


access the system anytime they want but it will also be recorded in the
systems database.
The systems delimitations are the following:

The system cannot stand alone.

NINMO staffs only has the full access to the system.

The design is not capable of monitoring the people inside the computer
laboratory room.

5|Page

The system will not work when the UPS run out of power.

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

The system is computer dependent.

The system still have the manual way to lock the door.

The system is not capable of detecting any firearms or other gadgets


that a person has upon entering the computer laboratory.

CHAPTER 2: CONCEPTUAL FRAMEWORK

2.1 REVIEW OF RELATED LITERATURE & STUDIES

A. Foreign Literature
A.1 Door Hardware: Security Solution
James Piper - March 2004

It wasnt that long ago that a simple key lock on a door provided the level
of security needed for most applications. Control access to the keys controlled
security within the facility.

But keyed access, while simple and inexpensive, has serious drawbacks
when it comes to maintaining security. Keys could be lost or duplicated. Doors
could be propped or held open. The use of keys did not provide a log of who
entered the facility and when, or where they went within the facility. While

6|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

issuing keys still is sufficient for some facilities, new security needs dictate
greater controls over access into and within facilities.

One of the most significant trends in locksets is the movement to keyless


locks. Keys have long represented a major security threat and maintenance cost to
managers. Keys can be readily lost or duplicated. When employees leave, keys are
not always recovered. Re-keying building entrances or portions of building
interiors is costly and time consuming. Also, it is difficult or impossible to track
peoples entry or exit in keyed buildings.

Managers have a number of keyless lock systems to consider, making it


possible to install one that meets the security and access requirements of their
particular facility. Mechanical and electronic keypad systems, most requiring no
batteries or wiring, can serve as direct replacement of keyed locksets. While they
do not provide a record of who accessed the door or when, they do eliminate
many of the other disadvantages of keyed lock systems.

More recently, self-contained, electronic keypad access systems have been


introduced that make use of individual user codes for access. Since each user must
enter his or her particular code, units can track use of the door and can be changed
easily should it become necessary to change or delete a particular individuals
access code.

7|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Card-access systems can be either standalone or connected to a central


monitoring station. In standalone systems, cards are programmed to present the
proper access code to the system. With no wiring or computer requirements, the
standalone system offers a reasonable level of security without the expense of
having to connect each door lockset to a central station. Many standalone units
can provide a limited history of door use and are well suited for use in
applications with fewer than 200 users.
Central monitoring stations allow full tracking of door entry and exit.
Access through any door can be modified from the central station. In the event of
an emergency, all door locks can be bypassed or locked. Central monitoring
systems are best suited for larger, multi-building facilities, particularly those with
unusual security requirements. In the event of a lost or stolen access card, rekeying can be done electronically.

When selecting door hardware components, managers should start with an


examination of the particular application. What level of use will the door be
subjected to? Is it an application where abuse and vandalism can reasonably
expected? What level of security is required? Can that level of security be
provided on an individual door basis or is a central system required?

8|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Remember too that no matter how well planned and secure the installation,
performance and security will suffer without proper maintenance. Managers must
make certain that the required programs are in place to support the new door
hardware.

B. Foreign Studies

B.1 INTELLIGENT DOOR LOCKING SYSTEM


B. Anubala, M. Rahini, T. Bavithra
3rd year, Department of Information Technology, Velammal College of
Engineering and Technology, Madurai

In the present scenario, home safety is a major threat faced by every


individual. There are lot of solutions available for this issue and complete solution
for this problem is not yet discovered. Our project Intelligent door locking
system provides freedom from mental and physical stress faced by individual
while moving away from their home. Unauthorized access is prohibited by

9|Page

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

designing a lock that stores the fingerprints of one or more authorized users.
Fingerprint is sensed by sensor and is validated for authentication. If the
fingerprint matches, the door will be opened automatically otherwise the system
captures the image of unauthorized person and the microcontroller sends the
image as a multimedia message to the authenticated persons mobile number and
the lock will remain in locked position. This system is highly efficient as it is built
with open source hardware.

Our proposed system overcomes all the security problems in existing


system and provides high security and efficiency. This is a perfect/optimal
solution for saving/protecting one from the hassle of stolen/lost key or an
unauthorized entry. Fingerprint is a boon solution for these problems which
provides high level of recognition accuracy. The skin on our palms and soles
exhibits a flow like pattern of ridges called friction ridges. The pattern of friction
ridges on each finger is unique and immutable. This makes fingerprint a unique
identification for everyone. Fingerprint door lock incorporates the proven
technology. Fingerprint scanner scans the fingerprints of users and used for
ensuring authentication.

Fingerprint scanning is more accurate and cost effective method and


duplication is virtually impossible. A Fingerprint recognition system can easily
perform verification. In verification, the system compares an input fingerprint to

10 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

the enrolled fingerprint of a specific user to determine if they are from the same
finger. Now the security of our home/office is literally in our hands or rather on
our fingertips.

B.2 A Digital Security System with Door Lock System Using RFID Technology
Gyanendra K Verma & Pawan Tripathi
Indian Institute of Information Technology
Allahabad-India

RFID, Radio Frequency Identification is an inexpensive technology, can


be implemented for several applications such as security, asset tracking, people
tracking, inventory detection, access control applications. The main objective of
this paper is to design and implement a digital security system which can deploy
in secured zone where only authentic person can be entered. We implemented a
security system containing door locking system using passive type of RFID which
can activate, authenticate, and validate the user and unlock the door in real time
for secure access. The advantage of using passive RFID is that it functions
without a battery and passive tags are lighter and are less expensive than the
active tags. A centralized system manages the controlling, transaction and
operation task. The door locking system functions in real time as the door open
quickly when user put their tag in contact of reader. The system also creates a log

11 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

containing check-in and check-out of each user along with basic information of
user.

C. Local Studies

C.1 DOOR ACCESS SECURITY SYSTEM


FEBRUARY 2013
BERBA ALFREDO JR. D, CRUZ GLEN MICHAEL S., MELITON, VINCENT
RAFAEL C., RAYMUNDO CLARK KEEN L., TOLENTINO ROLAND CARLO B.,
VERGARA PETER PAUL S.

The system uses a technique yet effective design of a door access security
system that would utilize the use of combination of passwords. Keypad based
pass code and a spoken password processed by a speech recognition system.
Theses passwords should both match in order to gain access to entry.
Furthermore, the system will inform the authorities involved whenever a
suspected access intrusion occurred and have captured images of that person. The
authority will be notify through SMS when three wrong combinations have been
entered.

C.2 PC BASED CENTRALIZED DOOR LOCK SECURITY SYSTEM OF ASIAN


COLLEGE OF SCIENCE AND TECHNOLOGY BALIWAG

12 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

MARCH 2007

This study used PCs to centralized the unlocking and locking the doors of
the school, it also has a database that have the records of the class schedule in all
rooms. If the system have malfunctioned there is an alternative way to open the
door by the use of an emergency button. They used Visual Basic programming
language for their software. The main goal of the system is to enhance and ensure
the security in all rooms of the school, so it can avoid incidents of vandalisms,
loitering and stealing of the properties inside the room. The room will only open
if there is a scheduled class that save in the database regarding to that room.

C.3 RADIO FREQUENCY IDENTIFICATION (RFID) DOOR ACCESS SYSTEM


ERICK TAEZA
AUGUST 7, 2013

Every Office inside Camp Crame is considered as a Vital Installation that


should be given a high level of security as possible. Security is the degree of
protection against danger, damage, loss, and crime not only for human but also for

13 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

logistical assets or even communication files due to uncontrolled/unmanaged


entry of unauthorized person.

The DICTM being the Office that oversees the development of


Information and Communications Technology (ICT) in the PNP. Through the
initiative of the Director, DICTM has deployed the Radio Frequency
Identification (RFID) System on its own premises through the use of door locking
system using passive type RFID that can activate, authenticate and validate
concerned user.

While the main consideration is the security, the DICTM RFID System
will complement in enhancing the accounting of DICTM personnel pursuant to
Daily PNP Personnel Accounting Report rules and regulations. This will further
provide a mechanism as a security access control and attendance monitoring
facility of this Directorate.
The primary objective in the deployment of the DICTM RFID System is
to provide security to personnel, logistics and data files of this Directorate.
Likewise, the system aims to provide effective monitoring and management of
personnel and visitors/guests. This will be complemented by RFID desk officer
who will be responsible for monitoring the system.
Radio Frequency Identification (RFID) Door Access System is the
wireless reading of physical tags attached/carried by authorized personnel that

14 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

emit radio frequency signals to be picked up by electronic reader devices attached


to door entry. These reader devices collect information in real time to
acknowledge the identity of the carrier. RFID System can also be used for various
applications such as Gates security, different door access/entry and ID system.
How does the system work?
Procedure:
1. Scan the Magnetic ID Tag to the electronic reader upon entry.
2. The following will take place: (IN SPLIT SECONDS)
- The Tag transmits the stored data;
- The Electronic receiver collects the data;
- The electronic receiver sends the collected data to the reader;
- The reader reads the data and inquires to the computer; and
- The Computer acknowledges the data and command the circuit to release the
magnetic door lock.
3. Tag bearer will be notified thru green light or sounds as a go.
4. Push/Pull the door for entry/exit.
C.4 AUTOMATIC DOOR CONTROLLER SYSTEM (2005)
PRESENTED

BY: AGUILAR GETSEMANI S., ARAHAN MARVIN P.,

GUEVARRA MA. CORAZON T., ORALLNA MELANIE A.

When the visitor pushes the doorbell button, it will initialize by the
computer that is connected to the telephone. It will automatically call the pre-

15 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

programmed number of the GSM phone in the system. If the house owner
recognizes the visitors voice and wants to open the door for the visitor, the home
owner will now enter the 4 digit code. When the DTMF signal is received by the
DTMF decoder, it leaves the signal into a 4-bit code and sends it to the computer.
Once computer receives a 4-bit code from the GSM phone it then compares it to
the software setting. The computer will send an instruction to unlock the door
immediately when it detects the correct DTMF signal.

BRIEF ANALYSIS OF ALL THE RELATED LITERATURES AND STUDIES

Based on the researches that we have conducted, these foreign and local
studies and literatures have helped us to further understand the concept of our
proposed system. Those information gave us important details related to our study
like different processes that we may apply to the system, advantages and
disadvantages of using those kind of electronic access control OUTPUT
devices.

INPUT

PROCESS

Knowledge
Software
2.2 RESEARCH PARADIGM
/ CONCEPTUAL FRAMEWORK
Requirements
Development
Computer
Requirements
Technology
Analysis
PC BASED DOOR
Electronics &
Create Database
InputDesign
Process Output Diagram LOCK SYSTEM
Electrical
USING
Programming
Coding
Languages
Testing
BARCODE
Databasing
Acceptance
SCANNER FOR
Hardware
COMPUTER
Software
Development
LABORATORIES
Requirements
Prototyping
VB.net, MySQL 5.5
Designing
OF BALIWAG
16 | PWindows
age
OS
Wiring
POLYTECHNIC
Troubleshooting
COLLEGE
Hardware
Evaluating
Requirements
Combination

Barcode Scanner
Emergency Button
Computer
Solenoid
Power Supply

Testing
Evaluating
Documentation

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Figure 1 Input Process Output Diagram

Figure 1 shows all the requirements needed for the development of the
system, in order to accomplish the study and achieve the desired output.

2.3 DEFINITION OF TERMS

A. Operational

17 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

PC-Based Monitoring of attendance by the use of personal computer.

Door Lock System The system that will hold the control of each door lock in
computer laboratories.

Barcode an optical machine-readable representation of data relating to the


object to which it is attached. Originally barcodes systematically represented data
by varying the widths and spacing of parallel lines, and may be referred to as
linear or one-dimensional (1D). (http://en.wikipedia.org/wiki/Barcode)

Barcode Scanner an electronic device for reading printed barcodes. Like a


flatbed scanner, it consists of a light source, a lens and a light sensor translating
optical

impulses

into

electrical

ones.

(http://en.wikipedia.org/wiki/Barcode_reader)

B. Conceptual

Access Card A plastic card with a magnetic strip containing encoded data that
is read by passing the card through or over an electronic device, used especially to
make electronic transactions and to provide access to restricted or secure areas.
(http://www/thefreedictionary.com/access+card)

18 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Solenoid a coil wound into a tightly packed helix. The term was invented by
French

physicist

Andr-Marie

Ampre

to

designate

helical

coil.

(http://en.wikipedia.org/wiki/Solenoid)

Database an organized collection of data. The data is typically organized to


model aspects of reality in a way that supports processes requiring information.
(http://en.wikipedia.org/wiki/Database)

Relay an electrical device such that current flowing through it in one circuit can
switch

on

and

off

current

in

second

circuit.

(www.thefreedictionary.com/Circuit,+Electric)

Uninterruptible Power Supply also uninterruptible power source, UPS or


battery/flywheel backup, is an electrical apparatus that provides emergency power
to a load when the input power source, typically main power, fails.
(http://en.wikipedia.org/wiki/Uninterruptible_power_supply)

CHAPTER 3: RESEARCH METHODOLOGY

19 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

3.1 SOURCES OF DATA

The data and information were collected from a range of resources. It


includes evaluation of different sources of data and information that we have to be
able for us to get the information that we need. Gathering facts and information
related to this study were made to finds solutions to the presented problems.

Internet is a big help to us. Most of the information and ideas we have
researched came from the internet. Other resource like thesis, books and articles
from different libraries also contribute to our study.

We also got information we need through series of interviews with


different kinds of people that have knowledge regarding our research. Their ideas
and suggestions help us to gain more information in our study.

3.2 PROJECT DESIGN

20 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Flow Chart

START

Input class schedules and profile of


faculty member

Scan the ID to the barcode scanner


NO
If the input
matches to
the database
YES

YES
If the user is
allowed to enter

Save the time to the database

NO
Send the signal to relay the switch

Pull the door lock

Scan the ID to the barcode scanner

Save the time out to the database

Close the door lock

END

Figure 2 Flowchart of the System

21 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Figure 2 shows the flow of processes of the door lock system. First, class
schedules and some personal information of a person shall be inputted first to the
database. It will serve as the central depository of all the data. Professor scan their
I.D. to the Barcode Scanner then it will send input to the PC and check if database
matches to the input. If it match, the database will now record the time it was
inputted and directly sends signal to the relay switch to open the door lock. Else
the door will still remain close if did not match to the database, unless the
NINMO staff will allow to use the professor to use the room by clicking allow
button. The professor will scan again in order to time out and lock again the door.

Block Diagram

POWER
SUPPY

OPEN
LOCK

ID

BARCODE
SCANNER

PC

CONTROL
PANEL
CLOSE
LOCK

Figure 3 Block Diagram of the System

22 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

Figure 3 shows the block representation of the system. Barcode of the I.D.
will be use as the input of the system, and it will be read by a Barcode Scanner.
The input will now go to the PC to check the database. Signal will be sent to the
Control Panel to unlock the door lock. It has the same process when closing the
door. Power Supply will be connected to the Barcode Scanner and PC to run the
system.

The proposed system will be using barcode scanner as the main access to
the computer laboratories. There will be an information form needed to be filled
up by those who will be having an access to the system like faculty members,
NINMO staffs, Program Directors, and etc. The gathered information will be
inputted to the system and should be saved to the database, it will serve as the
central depository of all the data. Each person that authorized to access will have
their own unique barcode on their I.D.

All the hardware components are connected to a power supply, also to


UPS that will automatically be the substitute power whenever theres a power
failure. Emergency button inside the room can be used to open the door lock if the
door will closed unexpectedly or theres a system malfunction occurred. The
computer laboratory rooms will remain open after gaining access inside, unless
the professor scan again the I.D. to time out and lock again the door. The door can

23 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

still be open or close when the rooms are still in use by using the main lock of
door.
3.3 PROJECT DEVELOPMENT

The concept of this system is divided into three stages. First is the input
necessary for the development of the door lock system. It was also divided into
three categories namely: knowledge requirements, software requirements, and
hardware requirements. In order to accomplish the study, ones should know
enough knowledge and skills regarding electronics and electrical application,
different programming languages available, computer technology and databasing.
The different software requirements should also be completed like the required
operating system, VB.net, MySQL 5.5. The Hardware parts should also present
like the computer, barcode scanner, relay, power supply, UPS and Solenoid. All
the aforementioned terms will be discussed on the latter part of the study.

Second stage is where the actual development of the system happens. The
process by which the software is to be developed consists of defined procedures
such as requirements, analysis, design, coding, testing, and acceptance. Software
development consists of the program that will be encoded and will be debug. If
there is no error, the program will be executed. The hardware development is
much crucial than the software. It consists of designing, wiring, soldering,
troubleshooting, evaluating and revision of all the components. The combination

24 | P a g e

PC BASED DOOR LOCK SYSTEM USING BARCODE SCANNER

is about on how the software and hardware will work after they combined. This is
how they will interact the flow of the program to the device.
And the last stage is the output of the system. It refers to the proposed PC
Based Door Lock System Using Barcode Scanner for Computer Laboratories of
Baliwag Polytechnic College.

This represents the different steps in the development of the


research. The study must characterize the proposed device or system and site the
possible problems which may encounter while doing the project. When all the
process is done, the working plan should be carefully follow and this lead to the
development of the project. To determine whether the specified goals and
objectives are met by the system, testing and evaluation should be done and doing
necessary modifications if needed.

25 | P a g e

Das könnte Ihnen auch gefallen