Student Access Control System
Student Access Control System
Student Access Control System
BY
SC201/0656/2018
AUGUST 2021
ABSTRACT
An access control system is the first step in protecting your people, property and assets, by
tracking and restricting door, date or other entry point access to a property, building or room to
authorized persons. With an access security system, you know exactly who enters a building or
room, when they enter and what door they use. Access systems include analytics that allow you
to track where your employees are and receive reports of suspicious activity, such as attempts to
access restricted areas. Key card, key fob, biometric (finger print, retina scan and etc.) or PIN-
based access control systems provide you the ability to lock and unlock doors. Many
organizations utilize technology cards for employee badges to track and authorize access to
restricted areas.
The objective and scope of the student access control system is to record the details and various
activities of the user (student/lecturer/worker) which simplifies the task and reduces the manual
work of the school’s security guards who personally have to frisk and search each person
individually thoroughly as they entered the school, which in most cases resulted to time wastage
of the student and the guards themselves. Access control system is one of the most common
used systems in electronic door control using card or a magnetic stripe which can be accessed
by swiping through a reader on the door. These access control systems are used for security
purposes.
ACKNOWLEDGEMENT
The process of developing this system has been very invaluable. Different institutions
organizations and individuals have been very supportive and indeed have largely influenced this
document in being what it is today. I would like to pass my sincere gratitude to my beloved
parents and all those who in one way or another ensured the successful completion of this
project. I wish to extremely appreciate my supervisor and lecturer Mr. for finding time to
correct the work and give the necessary advice and support and also finding time to correct the
work and give the necessary advice and support and also for his patience, sharing of sincere and
valuable guidance extended to me.
TABLE OF CONTENTS
CHAPTER 1: INTRODUCTION………………………………………………….. 5
1.1 Background…………………………………………………………………….. 5
1.2 Objectives………………………………………………………………………. 5
1.3 Purpose…………………………………………………………………………. 6
1.4 Scope……………………………………………………………………………. 6
1.5 Applicability……………………………………………………………………. 6
REFERNCES……………………………………………………………………….. 21
CHAPTER 1
INTRODUCTION
1.1 BACKGROUND STUDY
An access control system is the first step in protecting your people, property and assets, by
tracking and restricting door, date or other entry point access to a property, building or room to
authorized persons. With an access security system, you know exactly who enters a building or
room, when they enter and what door they use. Access systems include analytics that allow you
to track where your employees are and receive reports of suspicious activity, such as attempts to
access restricted areas. Key card, key fob, biometric (finger print, retina scan and etc.) or PIN-
based access control systems provide you the ability to lock and unlock doors. Many
organizations utilize technology cards for employee badges to track and authorize access to
restricted areas.
Nowadays, Radio Frequency Identification (RFID) cum Biometric based Access Control
System (ACS) is gaining popularity for authenticating the employees of any organization,
which ensures that only the employees granted permission to get into the organization need to
be granted entry into the complex, without which organization does not function effectively as
all the organization does not function effectively as all the organization invariably depend on
other organization/ companies/firms for their growth. Contrary to this, most of the terrorist
attacks are accessed, planned and implemented through visitors. Thus it becomes highly
essential to implement highly effective method/ system to ensure the genuineness of visitors to
any organization.
1.3 PURPOSE
This is a security system that helps improve the safety protocols of a school or any other
organizations.
The system makes sure that any unauthorized person is kept out of bound of the school premises
It provides a database for all the students and other non-teaching staff and also keep tracks of
the several visitors who are allowed to access the school in case of a security issue.
This system provides an effective and easy to maintain security; making sure that any
unauthorized personnel is culled out off the school.
The system is applicable in institutions like colleges, universities etc and any other large
populated organizations like hotels, companies etc
CHAPTER 2
RESEACH DESIGN/ SURVEY OF TECHNOLOGIES
C# is a general purpose multi-paradigm programming language encompassing static typing,
strong typing, lexically scoped, imperative, declarative, and functional. Generic, object-oriented
(class-based) and component oriented programming disciplines.
There are also other languages that can be used to implement this system such as php, c++,
java and python.
We used c# because its designed for Common Language Infrastructure (CLI), it is object
oriented, has backward Compatibility and better Integrity and Interoperability.
Microsoft Access is a database management system for Microsoft Jet Database engine with a
graphical user interface and software development tools.
SQL is also a database management system that can be used to implement this project
I chose Microsoft Access since I have interacted with Microsoft Access Database Management
system compared to SQL and also C# compared to other languages which makes it easier to use
and implement.
CHAPTER 3
REQUIREMENT AND ANALYSIS
The system is set to provide the electronic version of the school’s manual security gate pass
protocols. Access control system provides security by giving flexible control over who is
allowed to enter the premises. The areas or organization which require high security use
different types of access control systems like bio metric, RFID, door controllers and card
readers etc. Each access point may be controlled individually as per the requirement of company
or organizations where high security is necessary. Network security is also important, especially
in a company which handles sensitive data. Access control offers a secure, convenient, flexible
and cost- effective way of controlling who has access to your building and when access is
allowed. Once an access control system is installed, all doors controlled by the system will
automatically lock when the door is closed. Anyone without a PIN, card or fob is unable to
enter. If necessary, doors can be set to unlock after a designated time frame.
IPC80 passive RFID tag operating at a frequency of 125KHz is issued to the user. The tag
transmits information to the reader in ASK fomat
IP10 proximity card reader with operating frequency of 125KHz and reading distance up to 4
inches is used. The reader can be easily installed on metal doors, provides the tag information
serialy in RS232 format and is suitable for indoor as well as outdoor operations.
3.2.1.3 Camera
Logitech C500 wbcam is used to capture images. The camera has 1.3 mega pixel sensors and
can capture video up to 1280x1024 pixels.
Nokia 12i GSM modem is used to make emergency call to the security office.
3.2.1.5 Microcontroller
256K Nonvolatile RAM (NV- Ram) DS1230Y-85 is used for storing passwords against
registered RFID numbers. Its selected because it combines the best of RAM and ROM.
Solenoid operated door locks are used in entrance and exit gates of the school
3.2.1.8 Alarms
Alarms are to be installed at all the entrances and exits of the school. The alarms are turned on if
an illegal person tries to enter the school premises.
3.2.2 SOFTWARE
Access panels, which are parent devices that control card readers and make these grant and deny
decisions, allow for easy integration with RFID readers. Access control panel hardware is
needed to open the lock or door, which is only done when the proper access is granted to each
authorized cardholder
CHAPTER 4:
SYSTEM DESIGN
After detecting and receiving RFID tag data through a serial interrupt routine, microcontroller
searches the NV- RAM for this number.
If no match is found, the microcontroller makes an emergency call to the security office through
the GSM modem. At the same time, it sends a request to the computer system through main
controller to capture the user image and turns on the alarm signal.
On the other hand, if a match is found, the microcontroller checks the entrance status of the
user. If the user has not entered in the hostel yet the controller sends a request to the computer
system to capture and process image; after that the computer system generates one of three
messages “access granted” corresponding to registered and clear user, “access denied”
corresponding to a non-registered user and “user is a defaulter” corresponding to a registered
and defaulter user.
The entrance monitoring module thus ensures the entry of registered and clear uses in the school
and also helps in catching suspicious persons that are not authorized to enter the school.
4.2.2 EXIT MONITORING MODULE
The exit monitoring module comprises of RFID reader, an alarm and door lock; all interfaced to
AT89C52 microcontroller as shown in figure 4.2.2 (a block diagram of exit monitoring module)
After receiving RFID tag information through reader, microcontroller sends a request to the
entrance monitoring controller to search user and its entrance status in NV-RAM.
Upon receiving a ‘no’ signal from the entrance controller, exit controller blocks RFID tag and
makes an emergency call through GSM modem interface to entrance controller and turns on
alarm signal.
On the other hand if a ‘yes’ signal is received, the exit controller sends a request to computer
system to capture and process user image. The computer system uses face recognition to verify
the user. If a match is found, computer system asks the exit controller to grant permission to the
user to leave the hostel. After the user has left the school, exit controller sends a request to the
entrance controller through main controller to update the user entrance status.
4.2.3 COMPUTER SYSTEM AND WEB SERVER MODULE
The information provided by the system module is maintained in a database inside the computer
system. The database keeps record of user history including check in time and date, check out
time and date, RFID card lost details and user’s visitor record.
*Description
* Handles program initialitization, processes command-line argument, and opens the serial
reader
*/
#include<stdio>
#include<Windows.h>
#include “SerialReader.h”
SerialReader* reader=NULL;
Void ShowUsage ()
Switch
Case CTRL_C_EVENT:
If (reader != NULL)
Reader-> Close();
Exit(0);
Break;
Return TRUE;
{
Int comport= -1;
Int dataBits= 8;
Size_t bufSize= 8;
Bool success;
If (argc< 2)
ShowUsage();
Return 0;
Else
}
Success= SetConsoleCtrl Handler (ConsoleHandler, TRUE);
If (!success)
Return1;
If (!success)
Return 1;
return 0;
}
CHAPTER 6:
6.2 CONCLUSION
This project has made us aware os the immense capabilities and the various uses of c# and
ACCESS, we have raised one step further in terms of designing and developing a student access
control system. It has made security more effective and efficient.
REFERENCES