PC Based Door Lock System Using Barcode
PC Based Door Lock System Using Barcode
1.1 INTRODUCTION
From
mankinds
very
first access
control
system
to
todays
modern electronic access control, there has always been a need to protect people
and assets by limiting access to sensitive areas. Early humans had their methods,
but these have since evolved to more manageable solutions in the industrial age
with the use of doors and guards, then locks and keys. The practice of installing
electronic access control systems began in the 1960s to eliminate the problems
associated with lost keys, having the ability to instantly add, allow, restrict or
denies someones access, and to be able to immediately generate an activity report
on peoples comings and goings.
As we noticed, the school are still using the traditional way of entering the
rooms. Students or the professor get the appropriate key to the security guard to
access the room. After opening the door, the key needs to return to the security
guard. For us students, its very hassle and time-consuming. There are also some
cases reported that vandalism and ruining of computer peripherals occurs in the
computer laboratories. Most of it are happening without the presence of the
professor that is supposed to be also inside the computer laboratories when the
1|Page
class is started. But we dont blame anyone regarding this kind of incidence
because we know that they will not let those things to happen.
We, the researchers, came up to the point of proposing a Door Lock
System Using Barcode Scanner that will be implemented in computer laboratories
of Baliwag Polytechnic College. The system can also monitor the attendance and
time in/out of a person who has an access to the system.
The general problem of the study is how to create a PC Based Door Lock
System Using Barcode Scanner that will be designed for the computer
laboratories of Baliwag Polytechnic College.
This study aims to solve the specific problem stated below:
What are the materials needed in creating the door lock system?
What type of barcode scanner should be used for the access card?
What will be the alternative way of opening or closing the door if the
system has any problems?
How can the door lock system be able to unlock by using the barcode
scanner?
2|Page
To monitor the time in and time out of the professors who will use the lab.
Admin Staffs Works will be lessened because of the time in and time out of the
professors that will be saved in the database of the system.
NINMO Staffs They can fully monitor the use of the computer laboratory
because of the full access to the system.
Proponents More knowledge are gained because of the researchers and studies
that has been made.
Future Researchers It will serve as an inspiration to those who wanted to
develop and improve the existing system. The study can also be used as a
reference for the study they will conduct.
This study which seeks to create a PC Based Door Lock System that will
be used for the computer laboratories of BTECH. As such, we have set parameters
for the application of it. The researchers enumerated the scope and delimitations
in able for the users to further understand the study.
The scope of the study are the following:
Keys are needed for the main access but are still used for whenever
there is a system or power failure.
4|Page
The system will be able to monitor the time in and time out of the
instructors that will be saved in the database.
The design is not capable of monitoring the people inside the computer
laboratory room.
5|Page
The system will not work when the UPS run out of power.
The system still have the manual way to lock the door.
A. Foreign Literature
A.1 Door Hardware: Security Solution
James Piper - March 2004
It wasnt that long ago that a simple key lock on a door provided the level
of security needed for most applications. Control access to the keys controlled
security within the facility.
But keyed access, while simple and inexpensive, has serious drawbacks
when it comes to maintaining security. Keys could be lost or duplicated. Doors
could be propped or held open. The use of keys did not provide a log of who
entered the facility and when, or where they went within the facility. While
6|Page
issuing keys still is sufficient for some facilities, new security needs dictate
greater controls over access into and within facilities.
7|Page
8|Page
Remember too that no matter how well planned and secure the installation,
performance and security will suffer without proper maintenance. Managers must
make certain that the required programs are in place to support the new door
hardware.
B. Foreign Studies
9|Page
designing a lock that stores the fingerprints of one or more authorized users.
Fingerprint is sensed by sensor and is validated for authentication. If the
fingerprint matches, the door will be opened automatically otherwise the system
captures the image of unauthorized person and the microcontroller sends the
image as a multimedia message to the authenticated persons mobile number and
the lock will remain in locked position. This system is highly efficient as it is built
with open source hardware.
10 | P a g e
the enrolled fingerprint of a specific user to determine if they are from the same
finger. Now the security of our home/office is literally in our hands or rather on
our fingertips.
B.2 A Digital Security System with Door Lock System Using RFID Technology
Gyanendra K Verma & Pawan Tripathi
Indian Institute of Information Technology
Allahabad-India
11 | P a g e
containing check-in and check-out of each user along with basic information of
user.
C. Local Studies
The system uses a technique yet effective design of a door access security
system that would utilize the use of combination of passwords. Keypad based
pass code and a spoken password processed by a speech recognition system.
Theses passwords should both match in order to gain access to entry.
Furthermore, the system will inform the authorities involved whenever a
suspected access intrusion occurred and have captured images of that person. The
authority will be notify through SMS when three wrong combinations have been
entered.
12 | P a g e
MARCH 2007
This study used PCs to centralized the unlocking and locking the doors of
the school, it also has a database that have the records of the class schedule in all
rooms. If the system have malfunctioned there is an alternative way to open the
door by the use of an emergency button. They used Visual Basic programming
language for their software. The main goal of the system is to enhance and ensure
the security in all rooms of the school, so it can avoid incidents of vandalisms,
loitering and stealing of the properties inside the room. The room will only open
if there is a scheduled class that save in the database regarding to that room.
13 | P a g e
While the main consideration is the security, the DICTM RFID System
will complement in enhancing the accounting of DICTM personnel pursuant to
Daily PNP Personnel Accounting Report rules and regulations. This will further
provide a mechanism as a security access control and attendance monitoring
facility of this Directorate.
The primary objective in the deployment of the DICTM RFID System is
to provide security to personnel, logistics and data files of this Directorate.
Likewise, the system aims to provide effective monitoring and management of
personnel and visitors/guests. This will be complemented by RFID desk officer
who will be responsible for monitoring the system.
Radio Frequency Identification (RFID) Door Access System is the
wireless reading of physical tags attached/carried by authorized personnel that
14 | P a g e
When the visitor pushes the doorbell button, it will initialize by the
computer that is connected to the telephone. It will automatically call the pre-
15 | P a g e
programmed number of the GSM phone in the system. If the house owner
recognizes the visitors voice and wants to open the door for the visitor, the home
owner will now enter the 4 digit code. When the DTMF signal is received by the
DTMF decoder, it leaves the signal into a 4-bit code and sends it to the computer.
Once computer receives a 4-bit code from the GSM phone it then compares it to
the software setting. The computer will send an instruction to unlock the door
immediately when it detects the correct DTMF signal.
Based on the researches that we have conducted, these foreign and local
studies and literatures have helped us to further understand the concept of our
proposed system. Those information gave us important details related to our study
like different processes that we may apply to the system, advantages and
disadvantages of using those kind of electronic access control OUTPUT
devices.
INPUT
PROCESS
Knowledge
Software
2.2 RESEARCH PARADIGM
/ CONCEPTUAL FRAMEWORK
Requirements
Development
Computer
Requirements
Technology
Analysis
PC BASED DOOR
Electronics &
Create Database
InputDesign
Process Output Diagram LOCK SYSTEM
Electrical
USING
Programming
Coding
Languages
Testing
BARCODE
Databasing
Acceptance
SCANNER FOR
Hardware
COMPUTER
Software
Development
LABORATORIES
Requirements
Prototyping
VB.net, MySQL 5.5
Designing
OF BALIWAG
16 | PWindows
age
OS
Wiring
POLYTECHNIC
Troubleshooting
COLLEGE
Hardware
Evaluating
Requirements
Combination
Barcode Scanner
Emergency Button
Computer
Solenoid
Power Supply
Testing
Evaluating
Documentation
Figure 1 shows all the requirements needed for the development of the
system, in order to accomplish the study and achieve the desired output.
A. Operational
17 | P a g e
Door Lock System The system that will hold the control of each door lock in
computer laboratories.
impulses
into
electrical
ones.
(http://en.wikipedia.org/wiki/Barcode_reader)
B. Conceptual
Access Card A plastic card with a magnetic strip containing encoded data that
is read by passing the card through or over an electronic device, used especially to
make electronic transactions and to provide access to restricted or secure areas.
(http://www/thefreedictionary.com/access+card)
18 | P a g e
Solenoid a coil wound into a tightly packed helix. The term was invented by
French
physicist
Andr-Marie
Ampre
to
designate
helical
coil.
(http://en.wikipedia.org/wiki/Solenoid)
Relay an electrical device such that current flowing through it in one circuit can
switch
on
and
off
current
in
second
circuit.
(www.thefreedictionary.com/Circuit,+Electric)
19 | P a g e
Internet is a big help to us. Most of the information and ideas we have
researched came from the internet. Other resource like thesis, books and articles
from different libraries also contribute to our study.
20 | P a g e
Flow Chart
START
YES
If the user is
allowed to enter
NO
Send the signal to relay the switch
END
21 | P a g e
Figure 2 shows the flow of processes of the door lock system. First, class
schedules and some personal information of a person shall be inputted first to the
database. It will serve as the central depository of all the data. Professor scan their
I.D. to the Barcode Scanner then it will send input to the PC and check if database
matches to the input. If it match, the database will now record the time it was
inputted and directly sends signal to the relay switch to open the door lock. Else
the door will still remain close if did not match to the database, unless the
NINMO staff will allow to use the professor to use the room by clicking allow
button. The professor will scan again in order to time out and lock again the door.
Block Diagram
POWER
SUPPY
OPEN
LOCK
ID
BARCODE
SCANNER
PC
CONTROL
PANEL
CLOSE
LOCK
22 | P a g e
Figure 3 shows the block representation of the system. Barcode of the I.D.
will be use as the input of the system, and it will be read by a Barcode Scanner.
The input will now go to the PC to check the database. Signal will be sent to the
Control Panel to unlock the door lock. It has the same process when closing the
door. Power Supply will be connected to the Barcode Scanner and PC to run the
system.
The proposed system will be using barcode scanner as the main access to
the computer laboratories. There will be an information form needed to be filled
up by those who will be having an access to the system like faculty members,
NINMO staffs, Program Directors, and etc. The gathered information will be
inputted to the system and should be saved to the database, it will serve as the
central depository of all the data. Each person that authorized to access will have
their own unique barcode on their I.D.
23 | P a g e
still be open or close when the rooms are still in use by using the main lock of
door.
3.3 PROJECT DEVELOPMENT
The concept of this system is divided into three stages. First is the input
necessary for the development of the door lock system. It was also divided into
three categories namely: knowledge requirements, software requirements, and
hardware requirements. In order to accomplish the study, ones should know
enough knowledge and skills regarding electronics and electrical application,
different programming languages available, computer technology and databasing.
The different software requirements should also be completed like the required
operating system, VB.net, MySQL 5.5. The Hardware parts should also present
like the computer, barcode scanner, relay, power supply, UPS and Solenoid. All
the aforementioned terms will be discussed on the latter part of the study.
Second stage is where the actual development of the system happens. The
process by which the software is to be developed consists of defined procedures
such as requirements, analysis, design, coding, testing, and acceptance. Software
development consists of the program that will be encoded and will be debug. If
there is no error, the program will be executed. The hardware development is
much crucial than the software. It consists of designing, wiring, soldering,
troubleshooting, evaluating and revision of all the components. The combination
24 | P a g e
is about on how the software and hardware will work after they combined. This is
how they will interact the flow of the program to the device.
And the last stage is the output of the system. It refers to the proposed PC
Based Door Lock System Using Barcode Scanner for Computer Laboratories of
Baliwag Polytechnic College.
25 | P a g e