Preview

Door Lock Security Using Rfid and Face Recognition

Better Essays
Open Document
Open Document
2033 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Door Lock Security Using Rfid and Face Recognition
International Journal of Electronics and Computer Science Engineering
Available Online at www.ijecse.org

492

ISSN: 2277-1956

3 Factor Securities based on RFID, GSM and face
Recognition for Visitor Identification
1,2

Minakshi Gupta 1, Ketki Deshmukh 2
Electronics & Telecommunication Department, Mukesh Patel School of Technology and Management
NMIMS University Bhakti Vedant Swami Marg, JVPD Scheme, Vile Parle (west)
MUMBAI (Maharashtra)
Email- 1minakshiagarwal14@gmail.com,2Ketki.deshmukh@yahoo.com

Abstract- Now a day’s everything is moving from Manual to automatic so it is necessary to developed automatic security system involving more than one electronic device to make it more reliable. In the coming future ubiquitous society, RFID tags will be affixed to every person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify people and will automatically take advantage of contextual information. On the other hand, a problem is arising where the excellent tracking ability of RFID is abused and personal privacy is being violated. Due to this reason I have decided to build a system involving more security factor, which has fewer disadvantages and involve very less human resources. Existing security system has only one or two electronic Device which can be easily manipulated by anyone. so the system is not reliable and not highly secured so I have implement and add one more Electronic device in the existing system which will provide more security.This paper clarifies the active tag privacy problem and proposes a method for protecting personal privacy regarding the active
RFID tags.
Keywords— RFID active tag, GSM, Microcontroller 89c51, PC, camera, RS232, Keypad
1. Introduction
The system for visitor identification consists of the following: RFID Tag, GSM Modem and a security camera monitors the front door of a building. RFID user insert the tag into the RFID Reader, which is

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Physical entry controls will consist of guard’s at all perimeter doors, and into all secure areas. Also a security system on all outer doors that is monitored 24 hours a day by a security company. There will also be motion sensors at all available accessible areas. There will be barbed wire around all access to first and second floor areas around perimeter fence. There will also be badges for person ale according to security level as well as guest. Also security cameras in all accessible areas with 360 degree rotation as well as nightvision.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The security analyst of the accounting firm suggested that it's a good practice to have a dedicated room for server’s equipment to avoid any damages. This could be quite costly for the small company, however it would make a good investment in order to secure the company's network. The servers would be positioned on a server rack in the designated room with network devices such as modems, switches, routers, firewalls, and the Intrusion Detection System. This room should have restricted access and only authorized personnel must have access to it, by using sophisticated keycard systems and even having additional security procedures such as biometrical readers etc. It was also proposed to get rid of Motorola SB3100 and Net Gear MR814 to increase…

    • 940 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Final project it255

    • 1631 Words
    • 5 Pages

    System security has been very important ever since the beginning of the computer age. Security is setup for a number of reason whether it be to protect data from those who are not supposed to see it or hide it from those who are supposed to security at any point is important. Security can be physical, virtual or a mixture of the two, but in this day and age it is definitely needed. In the following I will give my opinion on how to increase or the steps I would use to implement security to a certain situation.…

    • 1631 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    An access control system is fundamental in reducing security issues as well as controlling the personnel allowed to access a given place. Its main objective is to ensure limited persons are granted the rights of access. This access can be granted by checking on criteria such as workplace, home or any other specified locations. The access control system may consist of diverse components that collaborate to ensure the main objective is achieved. An effective control system would ensure privileges for the different users vary according to their access rights or levels; the system under research can monitor and record all activities of access, lock and unlock the doors, cancel privileges when a pass card is lost as well as detect usage of canceled cards (Benantar, 2006).…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Therefore after adding more security to authentication, the effect is witnessed through reduction in the acceptance rate of users while increasing the usability. Consequently, it is very challenging to find the most secure system of authentication that the users can accept. Users are always seeking new features and applications whose interfaces will be easy to use. At the same time, these users express worries that the dangers continues to increase. In addition, the legislations continue to punch companies and manufacturers towards protection of their clients’…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Dexit Analysis

    • 1112 Words
    • 5 Pages

    Fast 3 second transactions via RFID would create simple convenient transactions that could be tracked easily by consumers.…

    • 1112 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Term paper

    • 1329 Words
    • 6 Pages

    A physical model and steps of building the security system will be discussed as well as its set up and mode of operation. System testing showed a quick and efficient operation of the system, where in case of smoke or fire detection, light and siren are triggered and fire department is called, and in case of break-in police is called as well as siren is triggered.…

    • 1329 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Miss

    • 2737 Words
    • 11 Pages

    Security and theft- You can improve the physical security of your organisation or service by installing electronic security systems such as cctv, intruder alarms and security lights. Improving perimeter security installing barriers, screens, using security personnel and contractors will also minimise risks of security breaches and theft.…

    • 2737 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Rfid Tagging Paper

    • 761 Words
    • 4 Pages

    The FDA already requires medical device companies to be able to identify each of the units it produces and distributes by a serial number. These medical device companies need better control of the implants on a consignment basis with hospitals, since returns can occur more than 50 percent of the time. With the new RFID technology that improvement in visibility into returns could possibly enable personnel to quickly and more efficiently locate a crucial piece of equipment and immediately determine its capabilities for use. In the event that a catastrophic error should arise, they would be completely traceable from the manufacturer to the consumer, and the preventative maintenance on equipment could be more accurately tracked. With the RFID tags with read/write capabilities can be used to detect seal integrity for the containers and individual packages. The tag would be able to record the time and duration of the seal loss, allowing even problems that occur in mid-shipment to be detected. For example, since Hospitals currently have to track the radioactive isotopes throughout the facility from storage to transport and from the administration to disposal. These RFID tags and readers would be able to automate these tasks. (Reiner & Sullivan,…

    • 761 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Chapter 2 Review

    • 762 Words
    • 4 Pages

    It transmits data by a mobile device, called a tag, which is read by an RFID reader and processed according to the need of an information system program.…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Security today has been on the top of many companies and businesses list of priorities. Where in the past a single security guard proved sufficient, today alarmed sensors, metal detectors and security guards are required to conduct the same security. The need for some type of security implementation is necessary in every business. There are a few options when considering the hiring of security. A company’s first need is to decide how much money it wants to spend on security along with the type of security needed. According to Contract Security Agencies (2009),…

    • 762 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Sensitive Items

    • 798 Words
    • 4 Pages

    It is very important to secure all your sensitive equipment and items, and maintain accountability. The reason simply is to keep very important high cost…

    • 798 Words
    • 4 Pages
    Good Essays

Related Topics