Access Control system

Imagine using a key, key-card or a fob to access an organization or office. A bundle of keys in your pocket a lot of cards in your wallet and having many fobs, it?s also likely that you?re often frustrated by this process: fumbling around in your pockets, backpack, or wallet, forgetting them at home

2025-06-28 16:30:07 - Adil Khan

Project Title

Access Control system

Project Area of Specialization Internet of ThingsProject Summary

Imagine using a key, key-card or a fob to access an organization or office. A bundle of keys in your pocket a lot of cards in your wallet and having many fobs, it’s also likely that you’re often frustrated by this process: fumbling around in your pockets, backpack, or wallet, forgetting them at home or on your desk on the way to the bathroom, losing track of them entirely or having shared keys.

The purposed system will solve the problem of having the load & irritation of searching the correct key, key-card or a fob to unlock the door. A simple mobile Application lets you unlock the door by just a single touch. This will also solve the problem of Lost, misplaced or shared keys, key-cards, and fobs, a single credential to unlock any Authorized door.

The future-proof access control solution Unlock your doors in a modern & secure way. Be flexible with how different user groups can unlock the door. The purposed system gives you flexible & a secure option to access your facility, by the mean of Android phone using Bluetooth Low Energy (BLE).

Wireless locks represent an interesting innovation in the field of access control. They use wireless technologies like Bluetooth Low Energy (BLE) and Near Field Communication (NFC) to unlock the doors and access your space.

It’s important to note that switching to a smart lock will not make your door physically stronger because the hunk of metal securing it to the frame will likely remain the same; however, it will give you a greater measure of control. Easily granting and revoking access will allow you to monitor whose coming and going — ultimately making your space more secure. 

Having shared keys, key-cards is a big problem among organizations because we can’t keep a track of who is accessing the facility.

ACS solves the above problems by having a mobile application protected by two-step verification & separate login for every user & a web application for admin site used to maintain the user log, add new users, removing user and also keep track of admin actions.

In case of any emergency, having a break-in into the organization will trigger alarms & completely locks the all the door until the manager or owner will not appear and unlock doors. If there is a fire in the organization flame detector detect fire, trigger an alarm and unlocks all the rooms except that are having any crucial information in it or a server room. 

Project Objectives

The aim of the project is to restrict the area from external and internal threats.

Goals of the purposed project is to automate the process of accessing a facility and having a check on who is accessing that facility by having an Access control system that

Project Implementation Method

The Five Phases of Access Control

Two-step verification is a process that involves two authentication methods performed one after the other to verify that someone or something requesting access is who or what they are declared to be.

Authorization is the phase that turns strangers into members. At this stage, the user opens the app and connects to the microcontroller.

In this phase, members present to a door reader provide a credential to get authorized. The reader will check whether the provided credentials are valid to determine whether or not it should unlock the lock.

Now that the credentials have been authenticated, the Microcontroller make sure everyone gets in the right door, at the right time, faster and easier if the user is not authorized than an alarm is generated.

This phase helps the administrator meet several challenges, including adding new users, removing users, manage logs and troubleshooting problems.

Benefits of the Project

Developed system will be used to secure the facility by using a secure access control mechanism that can only be unlocked by the authorized person using ACS mobile  Application. It will be done by using Bluetooth Low Energy (BLE) that sends the Encrypted information to the microcontroller to unlock the facility after authentication & the manage logs at serve site, a web app to manage

The purposed system will solve the problem of having the load & irritation of searching the correct key, key-card, fob, or even shared keys to unlock the facility. A simple mobile Application lets you unlock the door by just a single touch in a more secure way.

Provide an intruder detection system and generate an alarm, it also provides a fire detection system and ensures to make an easy and safe exit from the organization.

Technical Details of Final Deliverable Final Deliverable of the Project HW/SW integrated systemCore Industry ITOther Industries Security Core Technology Internet of Things (IoT)Other TechnologiesSustainable Development Goals Industry, Innovation and InfrastructureRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 39350
• Raspberry Pi 3 B+ (Full Kit) Equipment11100011000
• 32GB micro SD Equipment114501450
• Electric lock Equipment240008000
• Flame sensor Equipment29001800
• PIR sensor Equipment25001000
• 7inch HDMI LCD Equipment190009000
• 2 Channel 5v Relay Module Equipment2400800
• Wires/connectors Equipment1500500
• Courier Charges Miscellaneous 1800800
• Overheads Miscellaneous 120002000
• Stationery+printers pages Miscellaneous 115001500
• prototype building Miscellaneous 115001500

More Posts