Student Access Control System

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 22

A STUDENT’S ACCESS CONTROL SYSTEM

BY

BRIAN MURIUKI MITHAMO

SC201/0656/2018

COURSE : BSC. COMPUTER TECHNOLOGY

UNIT TITLE: PROGRAMMING AND DATABASE PRACTICUM

UNIT CODE: SCS 203

AUGUST 2021
ABSTRACT
An access control system is the first step in protecting your people, property and assets, by
tracking and restricting door, date or other entry point access to a property, building or room to
authorized persons. With an access security system, you know exactly who enters a building or
room, when they enter and what door they use. Access systems include analytics that allow you
to track where your employees are and receive reports of suspicious activity, such as attempts to
access restricted areas. Key card, key fob, biometric (finger print, retina scan and etc.) or PIN-
based access control systems provide you the ability to lock and unlock doors. Many
organizations utilize technology cards for employee badges to track and authorize access to
restricted areas.

The objective and scope of the student access control system is to record the details and various
activities of the user (student/lecturer/worker) which simplifies the task and reduces the manual
work of the school’s security guards who personally have to frisk and search each person
individually thoroughly as they entered the school, which in most cases resulted to time wastage
of the student and the guards themselves. Access control system is one of the most common
used systems in electronic door control using card or a magnetic stripe which can be accessed
by swiping through a reader on the door. These access control systems are used for security
purposes.

ACKNOWLEDGEMENT
The process of developing this system has been very invaluable. Different institutions
organizations and individuals have been very supportive and indeed have largely influenced this
document in being what it is today. I would like to pass my sincere gratitude to my beloved
parents and all those who in one way or another ensured the successful completion of this
project. I wish to extremely appreciate my supervisor and lecturer Mr. for finding time to
correct the work and give the necessary advice and support and also finding time to correct the
work and give the necessary advice and support and also for his patience, sharing of sincere and
valuable guidance extended to me.

TABLE OF CONTENTS
CHAPTER 1: INTRODUCTION………………………………………………….. 5

1.1 Background…………………………………………………………………….. 5
1.2 Objectives………………………………………………………………………. 5
1.3 Purpose…………………………………………………………………………. 6
1.4 Scope……………………………………………………………………………. 6
1.5 Applicability……………………………………………………………………. 6

CHAPTER 2: SURVEY OF TECHNOLOGIES…………………………………… 7

CHAPTER 3: REQUIREMENT ANALYSIS……………………………………… 8

3.1 Hardware Requirement………………………………………………………….. 9

3.2 Software Requirements………………………………………………………….. 10

3.3 Preliminary product description………………………………………………… 10

CHAPTER 4: IMPLEMENTATION AND TESTING…………………………….. 11

4.1 Logical Diagrams………………………………………………………………… 11

4.2 Data design………………………………………………………………………. 12

4.2.1 Entrance monitoring module………………………………………………….. 12

4.2.2 Exit Monitoring Module………………………………………………………..14

4.2.3 Computer system and web server module………………………………………15

4.3 Security issues……………………………………………………………………..16

CHAPTER 5: RESULTS AND DISCUSSIONS…………………………………… 17

5.1 Implementation approaches……………………………………………………… 17

5.2 Coding details and code efficiency……………………………………………… 17

CHAPTER 6: USER DOCUMENTATION AND CONCLUSION……………….. 21

REFERNCES……………………………………………………………………….. 21

CHAPTER 1
INTRODUCTION
1.1 BACKGROUND STUDY

An access control system is the first step in protecting your people, property and assets, by
tracking and restricting door, date or other entry point access to a property, building or room to
authorized persons. With an access security system, you know exactly who enters a building or
room, when they enter and what door they use. Access systems include analytics that allow you
to track where your employees are and receive reports of suspicious activity, such as attempts to
access restricted areas. Key card, key fob, biometric (finger print, retina scan and etc.) or PIN-
based access control systems provide you the ability to lock and unlock doors. Many
organizations utilize technology cards for employee badges to track and authorize access to
restricted areas.

Nowadays, Radio Frequency Identification (RFID) cum Biometric based Access Control
System (ACS) is gaining popularity for authenticating the employees of any organization,
which ensures that only the employees granted permission to get into the organization need to
be granted entry into the complex, without which organization does not function effectively as
all the organization does not function effectively as all the organization invariably depend on
other organization/ companies/firms for their growth. Contrary to this, most of the terrorist
attacks are accessed, planned and implemented through visitors. Thus it becomes highly
essential to implement highly effective method/ system to ensure the genuineness of visitors to
any organization.

1.2 OBJECTIVES OF THE STUDY


The main aim of the system is to develop a functional student access control system that allows
students to access the school facilities. Some other goals include;
 Helps track when a student entered the school and when they left the school
 Helps track which doors\gates the student used to enter the school
 Reduces time wastage from the physical frisking by the security guards
 Improves the security of the school

1.3 PURPOSE
This is a security system that helps improve the safety protocols of a school or any other
organizations.

The system makes sure that any unauthorized person is kept out of bound of the school premises

It provides a database for all the students and other non-teaching staff and also keep tracks of
the several visitors who are allowed to access the school in case of a security issue.

1.4 PROJECT SCOPE


The student access control system is designed based on the student’s course, year and
registration number.
This is made so that it makes it easier for the security team to distinguish beteen the students
and any unauthorized personnel.
The main limitation is that the system is expensive and very difficult to implement hence time
consuming
1.5 APPLICABILTY

This system provides an effective and easy to maintain security; making sure that any
unauthorized personnel is culled out off the school.
The system is applicable in institutions like colleges, universities etc and any other large
populated organizations like hotels, companies etc

CHAPTER 2
RESEACH DESIGN/ SURVEY OF TECHNOLOGIES
C# is a general purpose multi-paradigm programming language encompassing static typing,
strong typing, lexically scoped, imperative, declarative, and functional. Generic, object-oriented
(class-based) and component oriented programming disciplines.

There are also other languages that can be used to implement this system such as php, c++,
java and python.

We used c# because its designed for Common Language Infrastructure (CLI), it is object
oriented, has backward Compatibility and better Integrity and Interoperability.

Microsoft Access is a database management system for Microsoft Jet Database engine with a
graphical user interface and software development tools.

SQL is also a database management system that can be used to implement this project

I chose Microsoft Access since I have interacted with Microsoft Access Database Management
system compared to SQL and also C# compared to other languages which makes it easier to use
and implement.

CHAPTER 3
REQUIREMENT AND ANALYSIS

3.1 PROBLEM DEFINITION


The objective and scope of the student access control system is to record the details and various
activities of the user (student/lecturer/worker) which simplifies the task and reduces the manual
work of the school’s security guards who personally have to frisk and search each person
individually thoroughly as they entered the school, which in most cases resulted to time wastage
of the student and the guards themselves. Access control system is one of the most common
used systems in electronic door control using card or a magnetic stripe which can be accessed
by swiping through a reader on the door. These access control systems are used for security
purposes.

The system is set to provide the electronic version of the school’s manual security gate pass
protocols. Access control system provides security by giving flexible control over who is
allowed to enter the premises. The areas or organization which require high security use
different types of access control systems like bio metric, RFID, door controllers and card
readers etc. Each access point may be controlled individually as per the requirement of company
or organizations where high security is necessary. Network security is also important, especially
in a company which handles sensitive data. Access control offers a secure, convenient, flexible
and cost- effective way of controlling who has access to your building and when access is
allowed. Once an access control system is installed, all doors controlled by the system will
automatically lock when the door is closed. Anyone without a PIN, card or fob is unable to
enter. If necessary, doors can be set to unlock after a designated time frame.

3.2 REQUIREMENT SPECIFICATION


3.2.1 HARDWARE REQUIREMENT
3.2.1.1 RFID tag

IPC80 passive RFID tag operating at a frequency of 125KHz is issued to the user. The tag
transmits information to the reader in ASK fomat

3.2.1.2 RFID Reader

IP10 proximity card reader with operating frequency of 125KHz and reading distance up to 4
inches is used. The reader can be easily installed on metal doors, provides the tag information
serialy in RS232 format and is suitable for indoor as well as outdoor operations.

3.2.1.3 Camera

Logitech C500 wbcam is used to capture images. The camera has 1.3 mega pixel sensors and
can capture video up to 1280x1024 pixels.

3.2.1.4 GSM modem

Nokia 12i GSM modem is used to make emergency call to the security office.

3.2.1.5 Microcontroller

AT89C52 microcontroller is selected because it is a powerful microcomputer which had low


power consumption and prvides a highly flexible and cost-effective solution to many embedded
control applications

3.2.1.6 Nonvolatile RAM

256K Nonvolatile RAM (NV- Ram) DS1230Y-85 is used for storing passwords against
registered RFID numbers. Its selected because it combines the best of RAM and ROM.

3.2.1.7 Door locks

Solenoid operated door locks are used in entrance and exit gates of the school

3.2.1.8 Alarms

Alarms are to be installed at all the entrances and exits of the school. The alarms are turned on if
an illegal person tries to enter the school premises.

3.2.2 SOFTWARE

 Microsoft Windows XP or Microsoft.Net Framework 3.5


 Microsoft SQL Server

3.3 PRELIMINARY PRODUCT DESCRIPTION


The access control software system reads the data taken from the signals received from each
RFID reader, enabling the readers to accept and deny requests to access certain amenities based
on access levels or specific permissions.

Access panels, which are parent devices that control card readers and make these grant and deny
decisions, allow for easy integration with RFID readers. Access control panel hardware is
needed to open the lock or door, which is only done when the proper access is granted to each
authorized cardholder

CHAPTER 4:
SYSTEM DESIGN

4.1 LOGICAL DIAGRAM

4..2 DATA DESIGN


4.2.1 ENTRANCE MONITOR MODULE
The entrance monitoring controller comprises of an RFID reader, a GSM modem a NV RAM,
door lock, alarm, scroll key and 16x4 LCD.

After detecting and receiving RFID tag data through a serial interrupt routine, microcontroller
searches the NV- RAM for this number.

If no match is found, the microcontroller makes an emergency call to the security office through
the GSM modem. At the same time, it sends a request to the computer system through main
controller to capture the user image and turns on the alarm signal.

On the other hand, if a match is found, the microcontroller checks the entrance status of the
user. If the user has not entered in the hostel yet the controller sends a request to the computer
system to capture and process image; after that the computer system generates one of three
messages “access granted” corresponding to registered and clear user, “access denied”
corresponding to a non-registered user and “user is a defaulter” corresponding to a registered
and defaulter user.

The entrance monitoring module thus ensures the entry of registered and clear uses in the school
and also helps in catching suspicious persons that are not authorized to enter the school.
4.2.2 EXIT MONITORING MODULE
The exit monitoring module comprises of RFID reader, an alarm and door lock; all interfaced to
AT89C52 microcontroller as shown in figure 4.2.2 (a block diagram of exit monitoring module)

After receiving RFID tag information through reader, microcontroller sends a request to the
entrance monitoring controller to search user and its entrance status in NV-RAM.

Upon receiving a ‘no’ signal from the entrance controller, exit controller blocks RFID tag and
makes an emergency call through GSM modem interface to entrance controller and turns on
alarm signal.

On the other hand if a ‘yes’ signal is received, the exit controller sends a request to computer
system to capture and process user image. The computer system uses face recognition to verify
the user. If a match is found, computer system asks the exit controller to grant permission to the
user to leave the hostel. After the user has left the school, exit controller sends a request to the
entrance controller through main controller to update the user entrance status.
4.2.3 COMPUTER SYSTEM AND WEB SERVER MODULE
The information provided by the system module is maintained in a database inside the computer
system. The database keeps record of user history including check in time and date, check out
time and date, RFID card lost details and user’s visitor record.

Figure 4.2.3 ( A student form in the database)


4.3 SECURITY ISSUES
 Materials like metal and liquid can impact the signal
 Cost- RFID readers can be 10x more expensive than barcode readers
 Implementation can be difficult and time consuming.
 RFID tags are usually larger than barcode labels
 More than one tag can respond at the same time.
CHAPTER 5:

IMPLEMENTATION AND TESTING

5.1 IMPLEMENTATION APPROACHES


The implementation of this system needs for the school physical security system to embrace the
technological system, so as to maximize efficiency and effectiveness hence increasing the
school’s security in general.

5.2 CODING DETAILS AND CODE EFFICIENCY


The following is a c# code that helps read the serial RFID Card reader code;

/*Serial RFID Card reader

*Description

* Handles program initialitization, processes command-line argument, and opens the serial
reader

*/

#include<stdio>

#include<Windows.h>

#include “SerialReader.h”

Const char* APP_NAME= “RFIDReader”

SerialReader* reader=NULL;

Void ShowUsage ()

Printf(“%$- Reads data from a serial RFID scanner.\n” APP_NAME);

Printf(“\nUsage:\n %s com_port\n”, APP_NAME);


Printf (“\nOptions:\n”);

Printf(“com_port The COM port number on which to listen (1-9).\n”);

Printf(“\n\nWritten by Wes Hampton(2016).\n”);

BOOL WINAPI ConsoleHandler (DWORD dwSignal)

Switch

Case CTRL_C_EVENT:

If (reader != NULL)

Printf(“CTRL+C detected! Closing…\n”);

Reader-> Close();

Exit(0);

Break;

Return TRUE;

Void PrintData (char* data)

Printf (“%s\n”, data);


}

Int main(int argc, char* argv[ ])

{
Int comport= -1;

Int baudRate= 9600;

Int dataBits= 8;

Int stopBits= ONESTOPBIT;

Int parity= NOPARITY;

Size_t bufSize= 8;

Bool success;

If (argc< 2)

ShowUsage();

Return 0;

Else

comport = atoi (arvg [ 1] );

}
Success= SetConsoleCtrl Handler (ConsoleHandler, TRUE);

If (!success)

Printf (“Error setting console handler! (%d)”, GetLatError() );

Return1;

Reader= newSerialReader (commPort);

Success = reader-> Initialize (baudRate, dataBits, stopBits,parity);

If (!success)

Printf (“ Error opening COM port! (%d) \n”, GetLastError() )

Return 1;

reader-> Read (bufSize, PrintData);

return 0;

}
CHAPTER 6:

RESULTS AND DISCUSSION

6.1 USER DOCUMENTATION


The following shows the students database as seen by the security team

6.2 CONCLUSION
This project has made us aware os the immense capabilities and the various uses of c# and
ACCESS, we have raised one step further in terms of designing and developing a student access
control system. It has made security more effective and efficient.

REFERENCES

www. GOOGLE. com

You might also like