Вы находитесь на странице: 1из 23

DEVELOPMENT OF AUTOMATED ROOM SECURITY LOCK

WITH FINGERPRINT IDENTIFICATION FOR SECURITY


IMPROVEMENT IN MAPÚA INSTITUTE
OF TECHNOLOGY

Presented by:
ALVAREZ JR., Angel N.
RAGUINDIN, Jardine Davis D.
RIGOR, Paul Kenneth V.
SANTOS, Mark Angelo
ZULUETA, Jeffery Johns

Section B3

Engr. Rafael G. Maramba


Professor

RES100 – METHODS OF RESEARCH


School of EE-ECE-CpE
Mapua Institute of Technology
June 2010

i
TABLE OF CONTENTS

Title Page………………………………………………………………………………...i
Table of Contents………………………………………………………………….…….ii
List of Tables…………………………………………………………………………....iii

Chapter

I. INTRODUCTION
Background of the Study………………………………………………. 1
Statement of the Problem………………………………………………. 2
Significance of the Study………………………………………………. 2
Objective of the Study…………………………………………..……... 3
Scope and Delimitations of the Study……………………..……………3

II. REVIEW OF RELATED LITERATURE AND STUDIES


Basic Concepts and Related Literature………………………………… 4
Related Studies………………………………………………………… 8
Conceptual Framework………………………………………………… 9
Hypothesis……………………………………………………............... 10
Definition of Terms……………………………………………………..10

III. METHODOLOGY
Research Design………………………………………………………...12
The Subjects…………………………………………………………..... 12
Data Gathering Instruments……………………………………………. 12
Data Gathering Procedure…………………………………………….... 13
Procedure………………………………………………………………. 15
System Design…………………………………………………………..16
System Flow…………………………………………………………… 17
Statistical Treatment…………………………………………………… 18

REFERENCES…………………………………………………………………….…...20

ii
LIST OF TABLES

Table No. Description Page

1 Comparison of Biometric Devices 6

2 Sample Table for the Occurrence of 13

Theft, Robbery and Similar Cases per

Week in Mapua Institute of Tehnology

iii
CHAPTER 1

INTRODUCTION

Background of the Study

Technologies nowadays are advanced and many countries have switched from

manual system to electronic machines. Different devices are invented for the betterment

of humanity and one of its benefits is security. Security has always been a major issue in

our society. Cases of vandalism, robbery and trespassing are now just common

scenarios in today’s generation. As a matter of fact, no system or institution can claim of

being entirely secured. Even the most high-tech security systems proved to be vulnerable

to malicious intents. That is why most business establishments invest highly on security.

And when it comes to security, most progressive countries use biometric locks, an

alternative to manual and card locks to secure homes and offices, as well as business

establishments. One of the most the most frustrating things to realize is when someone

has forgotten his keys, locked himself out of his house, had them lost or stolen, or that an

intruder has broken in.

For instance, when a room is restricted and only authorized personnel are allowed

to get in, monitoring such rooms is difficult considering that the room should be opened

for easy access to those persons. In some establishments like schools, they have routine

access to rooms that should be locked and opened at a certain hour or at the next hour.

This is done mostly by janitors, security guards or employees in which oftentimes they

1
forget to do because they have other tasks to do. This scenario is evident at Mapúa

Institute of Technology which will be the basis of the research.

From this, the group has come up with an idea of developing an automated

security room lock with fingerprint identification that will eliminate the aforementioned

problems. This system will be designed for the purpose of securing school classrooms

and facilities, wherein theft, vandalism, and trespassing are prevalent. Through the

technology of biometrics, embedded system circuit design and computers, this system

would be capable of preventing possible theft, vandalism, and trespass.

Statement of the Problem

The main problem of this study is to develop an automated room security lock

that will integrate fingerprint identification to improve the security in classrooms and

facilities in Mapúa Institute of Technology.

Specific Problem:

1. What is the effect on the security of employing fingerprint identification in

authorizing access to a room?

Significance of the Study

The study will be a significant endeavor in ensuring security of the school’s

facilities, especially those containing high-tech equipments which are very much subject

to theft and vandalism like audio visual rooms and laboratories. Security personnel’s

tasks will be reduced significantly since the proposed system requires very minimal

human intervention and is actually almost a substitute to guards and padlocks; thus they

2
could have more time in doing other essential tasks. Unauthorized use of facilities will

be prevented because only permitted person/s will be able to lock or unlock the right

room at the right time. Lastly, the study will be a helpful reference for researchers for

their related studies in the future.

Objectives of the Study

The main objective of this study is to develop an automated room security lock

that will integrate fingerprint identification to improve the security in classrooms and

facilities in Mapúa Institute of Technology.

Specific Objective:

1. To determine the effect on the security of employing fingerprint identification in

authorizing access to a room.

Scope and Delimitation

The device is capable of automating room security locks through fingerprint

identification of the user requesting access to a certain room. The history of room users

and their room usage times are kept track through a computer interfaced to the device.

The number of actual occupants in a room is not counted; only the information of the

person in charge of the room is stored on the computer.

Authorization of room entry is possible only through the fingerprint of the user to

automate the locking or unlocking of the room. In case of power interruption, system

3
malfunction will occur. In this case, tampering of the device will be necessary if

emergency entry to a room is a must.

The study focuses mainly on eliminating unauthorized persons accessing a certain

room. Theft and vandalism are most probable when unauthorized room entry is allowed;

therefore prevention of unauthorized room access should be observed at all costs. These

cases are also possible for authorized entries, but these are easily resolved since room

users are kept track and are easily held liable when something undesirable happens to the

room.

4
CHAPTER 2

REVIEW OF RELATED LITERATURE

Review of Related Literature

The article entitled, “The State of the Biometric Industry: The Search for Security

and Convenience”, written by Peter Burgess, Technical Manager of RSA Security in

America (2001), discussed the prevalent industry of biometrics. The author said

“biometrics apply to a broad range of electronic techniques that use unique physical

characteristics of human beings as a means of authentication. Usually these are

considered the domain of James Bond films or ultra sensitive military installations.

However, the current range of its application is now rapidly increasing that is why more

organizations whether from the government, school, or business districts need it for

positive identification.”

The use of biometric devices falls into 2 main categories: law enforcement

(government) and building access. Authentication purposes, convenience and password-

replacements have been its strongest drivers.

One of the primary drivers for biometrics is its ability to provide a viable

alternative to the ubiquitous password. Passwords are now widely recognized as an

extremely weak form of authentication. In fact, up to 50% of costly help desk calls are

from the users who have forgotten or misplaced their passwords.

5
Authentication by biometric verification is becoming increasing common in

corporate and public security systems, consumer electronics and point of sale (POS)

applications. In addition to security, the driving force behind biometric verification has

been convenient.

Table 1. Comparison of Biometric Devices

Circumventio
Collectability

Acceptability
Performance
Permanence
Universality

Uniqueness
Biometrics

n
Face H L M H L H L

Fingerprint M H H M H M H

Hand veins M M M M M M H

Iris H H H L H L H

Retinal scan H H M L H L H

Signature L L L H L H L

Voice M L L M L H L

Table 1 shows a comparison of existing biometric devices. A.K. Jain ranks each

biometric device based on the categories as being low, medium or high. A low ranking

category indicates poor performance in the evaluation criterion, whereas high ranking

category indicates a very good performance. It is possible to understand if a human

characteristic can be used for biometrics in terms of parameters: universality, uniqueness,

permanence, collectability, performance, acceptability and circumvention.

1. Universality: each person should have the characteristic

6
2. Uniqueness: how well the biometric separates individually from another

3. Permanence: measures how well a biometric resists aging.

4. Collectability: ease of acquisition from measurement.

5. Performance: accuracy, speed, and robustness of technology used.

6. Acceptability: degree of approval of a technology.

7. Circumvention: ease of use of substitute.

Furthermore, a biometric device that uses fingerprints show more pleasing results

among the rest. Other than the parameters stated in the table the researchers shoes a

fingerprint over other biometrics because of its cost and portability. A finger print

scanner can be easily installed and integrated to a program based from its application. It

is cost efficient and acceptable by the industry. While all types of biometrics are likely to

grow as cost reduced, technology improves and demand increases, fingerprint scanning

will continue to hold the largest market share and offers the best trade-off between cost

and reliability/user-friendly.

The promise of biometrics combines both security and convenience because the

user does not have to carry any additional device or remember a static pin. Examples

from specific vertical markets have shown significant demand for biometrics to date that

provide perfect illustrations. On financial services, it is faster and simpler for traders on a

hectic trading floor to log into the network with a fingerprint scanner than having to

remember or enter a 6-digit password. For healthcare, the primary object is to enable

clinicians to quickly access electronic patient records in campus-type environments. The

7
quicker they are in and out of the network, the sooner they can care for patients. Both of

these examples also show how organization can justify an investment in biometric

solutions if users can execute more transactions per day or visit with more patients per

day.

Peter Burgess stated in 2001 that biometrics promise both security and

convenience. The use of such device proposes a viable solution to an efficient means on

building access while providing positive authentication. Implementing biometric system

offers convenience and efficiency in terms of time and productivity.

According to this article, fingerprint scanner is the most accepted biometric

device that the researchers can start to work with. It offers a better trade-off between cost

and reliability. Based form the studies and articles that the researchers have gathered, a

system basically a finger print scanner interfaced with a computer software to control a

door (locking or unlocking) can be a good design which can be an innovation on old

fashioned doors.

Related Studies

The PIC-based door lock system designed by A. Bitoon, et.al., (September 2003),

stated that, “PIC-based door lock system provides a means of replacing old fashioned

locks using keys by means of sensors and readers. With this door lock system homes and

establishments can avail of better safety and security. It uses components such as a

8
keypad for password input and Programmable Integrated Circuit microcontroller as to

control the functions of the system.”

Another study was done by S. Viscusi (2006) which is the Sequiam Biometric

Door Lock. The Biometric Deadbolt lock aside from being a standalone lock replaces the

use of keys to enter a room. This provides an authorized entry to prevent intruders to

break in homes. A swipe of an authorized finger through a scanner grants access. It

uniquely solves the problems of homeowners in securing their homes while having

easiest way to enter their houses.

Based on this study, the writers learned that microcontroller can also be used as a

device for locking and unlocking doors. This concept gave the researchers the idea to

create a device that will enable automatic locking and unlocking of door that can be used

in homes and establishments that can avail of better safety and security.

Conceptual Framework

fingerprint
identification power interruption room security
system

independent variable intervening variable dependent variable

9
Hypothesis

There will be a significant improvement in the security when fingerprint

identification is employed in authorizing access to a room.

Definition of Terms

Automated Security Room Lock is a security device that has an ability to manage the

registered users directly on the lock and will allow you to see who came in and what

time.

Automated Lock System is a technique that uses biometric lock on doors to systematize

security devices electronically.

Biometrics is the use of measurable, biological characteristics such as fingerprints or iris

patterns to identify a person to an electronic system (Microsoft Encarta, 2009)

Biometric Lock is a security device which uses biometrics as replacement to keys.

Biometric Deadbolt Lock is a security device that uses a bolt that is operated directly by a

biometric and not by a spring mechanism. (Microsoft Encarta, 2009)

Consumer Electronics include electronic equipment intended for everyday use.

Embedded System Circuit Design is a computer system designed to perform one or a few

dedicated functions often with real-time computing constraints.

Key Lock System is the technique that uses keys as instrument to unlock and lock doors.

Microcontroller is a microprocessor that controls some or all of the functions of an

electronic device (as a home appliance) or system. (Merriam Webster Dictionary, 1971)

Password is a secret word or phrase that somebody must use to gain entry to a place.

(Microsoft Encarta, 2009)

10
Programmable Integrated Circuit (PIC) contains circuits whose logical function and

connectivity can be programmed by the user, rather than being fixed by the integrated

circuit manufacturer.

Point of Sale (POS) or checkout is the location where a transaction occurs.

Power Interruption is a short-or long-term loss of the electric power to an area.

Security Systems is a technique of assuring the rooms to be free from unauthorized

entries that may result to theft, vandalism and the like.

11
CHAPTER 3

METHODOLOGY

Research Design

The research design that the researchers will use will be experimental design,

specifically two-group design. This design will be the most appropriate because two

comparable groups are employed as experimental and control group.

In this study, the traditional key-locked doors will serve as the control group since

it has been used or existed for quite a long time. On the other hand, the automated room

security lock with fingerprint identification will serve as the experimental group since it

will be the new system that would be implemented.

The Subjects

The major subject of our research will be the whole population of Mapua Institute

of Technology, specifically the professors and students. Since the research focuses on

improving the security of equipments and other facilities of the institution, students and

professors who mainly use the different facilities will be of much benefit. In addition, the

security personnel of the institution will perform more efficiently as they will be helped

by the implementation of the research.

Data Gathering Instruments

The researchers will use observation scheduled in a certain span of time for

gathering the data. This method will prove whether the installation of the automated room

12
security lock with fingerprint identification will really improve the security of different

facilities and equipments inside a classroom with automated lock system.

Data Gathering Procedure

Having the equipment installed, the researcher will secure a written permit from

the administration to allow them to conduct the study in Mapua Institute of Technology.

After the approval of the permit, in cooperation with the security staff of the institution,

all unauthorized room accesses as well as theft and vandalism (if there’s any) will be

recorded from rooms with the traditional key-lock system and with the automated room

security lock with fingerprint identification system. The frequency for all violations

occurred in each classroom in a span of three months or one whole term will be recorded

and totaled.

After the retrieval of enough data, the researchers will tabulate and process the

data manually. The data gathered will be analyzed and interpreted.

Table 2: Sample Table for the Occurrence of Theft, Robbery and Similar

Cases per Week in Mapua Institute of Tehnology

Week X1 ( Keylock System) X2 ( Automated System)

1 x1 x1 - x1 (x1 - x1 )2 x2 x2 - x2 (x2- x2 )2

13
5

10

11

Total

The previous table will be used for the tabulation of all the data that would be

acquired during the course of the research.

14
Procedure

START

Monitor rooms with traditional key-lock


system and with automated room security
lock with fingerprint identification system

Yes Does unauthorized room No


access or any other
violations occurred?

Mark whether the violation


occurred in the traditional or the
proposed system

Has 3 months time allotted


for the conducting the
No
study passed?

Yes

Analyze and interpret the data

END

15
System Design

16
System Flow

START

Detect fingerprint on fingerprint scanner

Transmit fingerprint data to the computer

Analyze fingerprint data on the computer

Is the fingerprint
Yes
authorized to access
the room at that time?

Is the user trying to


log-out log-in
enter(log-in) or exit
(log-out)?

Remove user to that room; Assign user to that room; record


record user’s log-out time user’s name and log-in time

Transmit a “lock room” Transmit an “unlock room”


signal to the device signal to the device

Respond to the transmitted signal from the


computer; trigger locking/unlocking of room

No Is there a power
interruption?

Yes

END

17
Statistical Treatment

The statistical technique used in analyzing and interpreting the data and testing

the hypotheses of the study will be t-test.

For this technique, the weighted arithmetic mean of the experimental and control

group will be determined in order to discern the frequency of theft, robbery, vandalism

and the like,. The formula to be used is as follows: (Calmorin and Calmorin, 2010)

+ +⋯…… ∑
= =
+ +⋯…… ∑

where, x stands for the weighted arithmetic mean, ∑ fx , sum of the products f times x

where f, frequency of each option and x, weight of each option; and ∑ f, sum of the

frequencies of the subjects tested.

Also, the researchers will solve for the variance of the each variable through the

formula:

∑( − )
=

where, SD2 stands for the variance, N as the total number of operations for the variable.

T-test was used to determine the significant difference between on the occurrence

of robbery, theft, vandalism of different equipments inside a classroom with a key lock

security system and the automated lock security system . The t-value will be computed by

using the formula:


=
+

18
where, x1 stands for the mean of the first variable (key-lock system), x2 , mean of the

second variable (automated lock system); SD12, variance of x1 , SD22, variance of x2 ; N1,

total; number of operations of the first variable and N2, total number of operations of the

second variable.

In this connection, the researchers will use 5 percent level of probability with 95

percent reliability to determine the degree of significance of the findings.

19
REFERENCES

Araneta, A., et. Al. PIC-based Doorlock System. September 2003.

Burgess, Peter. The State of Biometric Industry: The Search for Security and

Convenience. July 2001.

Calmorin, Laurentina P. and Calmorin, Melchor A. 2010.Methods of Research and Thesis

Writing. Rex Book Store. Manila.390 pp.

Viscusi, S., Sequiam Biometric Door Lock, 2006.

20

Вам также может понравиться