Access Control system
Imagine using a key, key-card or a fob to access an organization or office. A bundle of keys in your pocket a lot of cards in your wallet and having many fobs, it?s also likely that you?re often frustrated by this process: fumbling around in your pockets, backpack, or wallet, forgetting them at home
2025-06-28 16:30:07 - Adil Khan
Access Control system
Project Area of Specialization Internet of ThingsProject SummaryImagine using a key, key-card or a fob to access an organization or office. A bundle of keys in your pocket a lot of cards in your wallet and having many fobs, it’s also likely that you’re often frustrated by this process: fumbling around in your pockets, backpack, or wallet, forgetting them at home or on your desk on the way to the bathroom, losing track of them entirely or having shared keys.
The purposed system will solve the problem of having the load & irritation of searching the correct key, key-card or a fob to unlock the door. A simple mobile Application lets you unlock the door by just a single touch. This will also solve the problem of Lost, misplaced or shared keys, key-cards, and fobs, a single credential to unlock any Authorized door.
The future-proof access control solution Unlock your doors in a modern & secure way. Be flexible with how different user groups can unlock the door. The purposed system gives you flexible & a secure option to access your facility, by the mean of Android phone using Bluetooth Low Energy (BLE).
Wireless locks represent an interesting innovation in the field of access control. They use wireless technologies like Bluetooth Low Energy (BLE) and Near Field Communication (NFC) to unlock the doors and access your space.
It’s important to note that switching to a smart lock will not make your door physically stronger because the hunk of metal securing it to the frame will likely remain the same; however, it will give you a greater measure of control. Easily granting and revoking access will allow you to monitor whose coming and going — ultimately making your space more secure.
Having shared keys, key-cards is a big problem among organizations because we can’t keep a track of who is accessing the facility.
ACS solves the above problems by having a mobile application protected by two-step verification & separate login for every user & a web application for admin site used to maintain the user log, add new users, removing user and also keep track of admin actions.
In case of any emergency, having a break-in into the organization will trigger alarms & completely locks the all the door until the manager or owner will not appear and unlock doors. If there is a fire in the organization flame detector detect fire, trigger an alarm and unlocks all the rooms except that are having any crucial information in it or a server room.
Project ObjectivesThe aim of the project is to restrict the area from external and internal threats.
Goals of the purposed project is to automate the process of accessing a facility and having a check on who is accessing that facility by having an Access control system that
- use your phone to unlock any door
- no more lost, misplaced or shared keys
- one single credential for any door, in your space
- generate a log for every specific door
- generates Alarm for break-in
- automatic unlocking(server Site)
- manage Log(Server Site)
- edit, add and remove accounts(Server Site)
- maintain Admin Log(Server Site)
- fire detection and Auto Unlock doors to safely exit the facility
- displayed the access granted/access denied message on LCD
- Methodology/ Technique/ Framework
- Development environment specifications
- Android Studio (XML, Java)
- Visual Code ( HTML, CSS, JavaScript)
- Raspbian (Python or java)
- Development environment specifications
The Five Phases of Access Control
- Two-step verification
Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.
- Authorization
Authorization is the phase that turns strangers into members. At this stage, the user opens the app and connects to the microcontroller.
- Authentication
In this phase, members present to a door reader provide a credential to get authorized. The reader will check whether the provided credentials are valid to determine whether or not it should unlock the lock.
- Access
Now that the credentials have been authenticated, the Microcontroller make sure everyone gets in the right door, at the right time, faster and easier if the user is not authorized than an alarm is generated.
- Manage
This phase helps the administrator meet several challenges, including adding new users, removing users, manage logs and troubleshooting problems.
Benefits of the ProjectDeveloped system will be used to secure the facility by using a secure access control mechanism that can only be unlocked by the authorized person using ACS mobile Application. It will be done by using Bluetooth Low Energy (BLE) that sends the Encrypted information to the microcontroller to unlock the facility after authentication & the manage logs at serve site, a web app to manage
The purposed system will solve the problem of having the load & irritation of searching the correct key, key-card, fob, or even shared keys to unlock the facility. A simple mobile Application lets you unlock the door by just a single touch in a more secure way.
Provide an intruder detection system and generate an alarm, it also provides a fire detection system and ensures to make an easy and safe exit from the organization.
Technical Details of Final Deliverable- Nature of End-Product
- End-product will include both Software and Hardware integrated system.
- Hardware includes a Raspberry-Pi microcontroller connected with electric lock, Passive Infrared Ray (PIR), Heat Sensor & a Firebase Backend-as-a-Service
- The software includes an Android Application for end-user to interact with the microcontroller to unlock a facility & a web Application for the server site to add new users, remove users, manage logs and troubleshooting problems.
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 39350 | |||
| • Raspberry Pi 3 B+ (Full Kit) | Equipment | 1 | 11000 | 11000 |
| • 32GB micro SD | Equipment | 1 | 1450 | 1450 |
| • Electric lock | Equipment | 2 | 4000 | 8000 |
| • Flame sensor | Equipment | 2 | 900 | 1800 |
| • PIR sensor | Equipment | 2 | 500 | 1000 |
| • 7inch HDMI LCD | Equipment | 1 | 9000 | 9000 |
| • 2 Channel 5v Relay Module | Equipment | 2 | 400 | 800 |
| • Wires/connectors | Equipment | 1 | 500 | 500 |
| • Courier Charges | Miscellaneous | 1 | 800 | 800 |
| • Overheads | Miscellaneous | 1 | 2000 | 2000 |
| • Stationery+printers pages | Miscellaneous | 1 | 1500 | 1500 |
| • prototype building | Miscellaneous | 1 | 1500 | 1500 |