Preview

Bluetooth Door Lock

Good Essays
Open Document
Open Document
2263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bluetooth Door Lock
Table of Contents:
1. Purpose/Introduction...................
2. Top Level Design and Testing.....
3. Subsystem Design and Testing...
4. Troubleshooting...........................
5. Conclusions..................................

Purpose
It has been known for some time now that mechanical locks are becoming outdated. Mechanical locks are notoriously easy to lock pick, the quantity of keys limits their use, and they are not convenient to use. The goal of Team Open Sesame is to create a door that is safer and more convenient to use than the conventional mechanical door. Team Open Sesame’s design gives people limited access to a door through their android smartphone’s Bluetooth in the form of a digital key code. The use of a digital key provides more safety than the traditional locking mechanism, as it takes more experience to hack into a password encrypted system than to pick a lock. This design also provides the security of always being locked, until given a quick command to unlock. The goal of almost any piece of technology is to improve on what has been done before. Team Open Sesame’s door is easier to use, is more secure, and has infinite keys. Team Open Sesame’s door is applicable to any door. There are uses for an automatic door by private individuals as well as companies and businesses. Any door that requires increased security would benefit from this design. Also, companies that utilize this technology will no longer need to print many duplicates of the same keys to give access to their employees. Another benefit of having digital keys is the ability to change the passwords periodically to eliminate the risk of security breaches. Private individuals might want to install this door in the front of their house. Not only is it a flashy object that impresses neighbors but this door will make it easy to walk into your home with an armload of groceries without the need to fumble for your keys at your front door.

You May Also Find These Documents Helpful

  • Good Essays

    Rapha provides exterior lockable doors and windows, in addition to the effective automated devise or system that alerts staff…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt to gain access through the window also activates the alarm and alerts the guard.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Any special requirement would have also been discussed at the initial assessment ie entry by the front or back door, keysafe number, security door number, whether they would like the doorbell rung before entering etc.…

    • 832 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    All internal doors can only be opened by staff with an access badge and in some places also a key.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4222-226

    • 448 Words
    • 2 Pages

    This include key boxes on door ways with code number provided for emergency use .Keys provided to support workers / housing warden /medical professionals but these as key holders should be the only person…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Implement a tool for user authentication, encryption and decryption; use pins and passwords for barriers.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    All the external doors can be opened from inside the building to allow persons to exit at any time, however the doors are alarmed. This alerts staff by the use of a paging device, carried by all support staff. This enables safety and security of all persons within the building.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Automated Locks: ¿Forgot to lock your door? No problem. Just by touching an icon on your smartphone’s screen, you can make sure all your doors are properly locked… and you can do it from anywhere in the world. Moreover, crooks won’t be able to open your door by using a credit card.…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Password Protection

    • 4064 Words
    • 17 Pages

    Today, everyone is having online banking account and e-mail account . Safety is an important aspect. If some intruder steal our password, then we have to pay high price for it. So protecting password is a significant factor for each and every one in this e-world. This speech provides mechanism to protect our online password.…

    • 4064 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    The development of CrypTool was started back in 1998, by a group of German companies and universities, but now is an open source project. More than sixty people worldwide contribute regularly to the project. The goal of the CrypTool is to help ensure users are aware of how cryptography can help against network security threats and also explains the underlying concepts of cryptology. The software is available in English, German, Polish, Spanish, and Serbian (Wikia.com, 2013).…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Keyboard Hacking

    • 287 Words
    • 2 Pages

    The system of encrypting the data before transferring it through the port and later decrypting it solves this threat. So in this paper as a part we will look in detail about the keyboard capture devices & its threats to security. In the remaining half comes our ideas of securing the keyboard. If this is a success, then probably we could produce the first fully secured wired keyboard.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    [2] D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security,…

    • 3600 Words
    • 15 Pages
    Best Essays