BioLock (Biometric Home Entry System)

Slides:



Advertisements
Similar presentations
N.J. Office of Homeland Security & Preparedness Grant and Program Management Bureau Grants Tracking System.
Advertisements

John Bailey Feature Updates for IDaxxess. MS SQL & MS Access: ability to load database on Enterprise DBMS Notifications: service will send status.
BioSENSE I introduction
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
Technical Tips. Getting Started with emPower™ Learn-in your new Z-Wave-enabled Alarm.com module following the same process as before: – Perform a Module.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
PV Watchdog Web-Enabled Photovoltaic System Monitor Art Barnes Austin Fisher Ryan Mann Josh Stone.
Figure 1.1 Interaction between applications and the operating system.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Internet Information Server (IIS)
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
Structure Commander Technical Presentation. Copyright (C) MCS 2013, All rights reserved. 2 STRUCTURE COMMANDER Introduction Product Overview.
Android Core Logging Application Keith Schneider Introduction The Core Logging application is part of a software suite that is designed to enable geologic.
Ch 11 Managing System Reliability and Availability 1.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
DEC0905 Remote Control of Home Appliances ABSTRACT The objective of this project is to enable users to remotely control home appliances and systems over.
Presentation on Facilities / Assets Management by Satyam Computers Services Ltd.
InteLock Emmanuel Seguin, Kit Huynh, Joshua Coffin, Christos Tsiokos Faculty Advisor: Professor Aura Ganz Background Currently, there have been many keyless.
The Asset Inventory Management module assists with data collection and discovery management processes. Collected information is interpreted and automatically.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
TRƯỜNG ĐẠI HỌC CÔNG NGHỆ Bộ môn Mạng và Truyền Thông Máy Tính.
Components of Database Management System
Intelligent Access Control System Based On User behavior youtube.com/watch?v=W3rJVaBky9Y CIVABIS Matjaž Gams Boštjan Kaluža, Erik Dovgan Jožef Stefan.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Computer Emergency Notification System (CENS)
NIOS II Ethernet Communication Final Presentation
Enabling users to be productive, responsibly Finding the right balance Devices & Experiences Users Want Applications and data across devices, anywhere.
Module 8 : Configuration II Jong S. Bok
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
In and Out Time Systems Sean McReynolds Daniel Eaton Daniel Lofgren Seth Looysen.
Module 10: Implementing Administrative Templates and Audit Policy.
©Spectra Technovision (India) Pvt. Ltd.
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
ITMT 1371 – Window 7 Configuration 1 ITMT Windows 7 Configuration Chapter 8 – Managing and Monitoring Windows 7 Performance.
Home Control System by web and SMS Son Jin Ho. Contents Home network concept System features System flow diagram Database diagram Component diagram of.
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
GPS Receiver Client Location Based Attendance App Employee CMSS GIS SERVER GIS Database Geo-Tagging Geo-Tracking Location Based Attendance System.
JobScheduler Operations Center: JOC Cockpit
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
Architecture Review 10/11/2004
SmartCenter for Pointsec - MI
Securing Network Servers
Network Controllable MP3 Player
Key features of version 2.0 Personalised dashboard Wireless locks
Using Technology to provide an innovative sustainable model for delivery of Cashless Health Insurance                              r r r r r y y g s s.
Chapter One: Mastering the Basics of Security
Home Automation ECE 492 Tarek Kaddoura & Jigar Nahar.
Near Field Communication Smart Door
Control and Data Acquisition System for VEST at SNU
Outline Introduction Standards Project General Idea
JobScheduler Operations Center: JOC Cockpit
Database Systems: Design, Implementation, and Management Tenth Edition
Chapter 3: Windows7 Part 1.
Group 16 Tarek Kaddoura Jigar Nahar
Wavestore Integrates… Paxton Net2 Access Control
Biometric technology.
Networked Door Locking System
Security.
RFID Security System Problem Impact Approach Diagram
Operating System Concepts
Food Inventory Tracker
Designing IIS Security (IIS – Internet Information Service)
Network Monitoring System
Presentation transcript:

BioLock (Biometric Home Entry System) Mavis Chan, Brent Erickson, Sydney Bitner Group 9

Introduction Fingerprint enabled lock designed for home entry Homeowner can check access history remotely Alarm sounded upon unauthorized entry attempt Introduction

Easy access and setup for house guests Motivation Features Keys are a hassle & people misplace them. Fingers are very hard to misplace Utilization of fingerprint sensor Remote management Secure scheduled access Event logging Alarm system Easy access and setup for house guests Tracking of user entry times. Applications for businesses & rental properties

Hardware Design

Software Design API for serial communication with sensor module Web Server – REST API File system database Android application for device administration Software Design

Altera Cyclone II FPGA Board ZFM Fingerprint Sensor D5M Camera Hardware Components Software Components Altera Cyclone II FPGA Board ZFM Fingerprint Sensor D5M Camera Speakers Fingerprint sensor thread Web server thread Diagnostics thread (testing purposes) Additional classes to communicate with hardware components

Code Example Fingerprint Sensor Thread Poll for fingerprint Fingerprint detected, execute any pending management tasks Lookup fingerprint/user in database If user does not exist, notify failure If user exists, lookup if have scheduled access If user doesn't have access, notify failure If user has access, unlock door Code Example

Operation Access Flow

Operation Modification Flow

Ethernet Serial Communication D5M Camera Module Challenges

Fingerprint Sensor Predefined diagnostic sequence to verify proper communication and functionality. Includes enrolling and fingerprint verification. Rest API Verify all GET requests via web browser Decouple all components in the system and test them independently and as a whole. LCD display updates to reflect current system state Testing Additional ad-hoc and usability testing on the system as a whole

Project Extensions VOIP intercom 2-factor authentication Hardware based fingerprint recognition Battery powered system clock Project Extensions

Questions?