Abstract

<p><em>Companies or estate have problems stealing employees of items or records by using common keys because the usual key is less reliable. This paper seeks to control intelligent doors by means of a RFID card. In addition, a security system was created for employee entrances and exits with a system-specific server and may allow staff to open a particular door and specify a time for RFID card operation. The design and implementation of a robust and intelligent system were thus designed to control an employee's or a person's entry and exit through the use of an intelligent key and smart doors.</em><em> </em><em>This paper proposes the safety improvement plan based on the Smart Door Lock System for the security problem caused by the physical key in unmanned automation machines, like ATMs, KIOSKs and sales machines. The use of hardware and software inventions to construct this program was an effective factor.</em></p>

Highlights

  • The Internet of Things (IoT) is the application of physical devices and everyday objects of Internet connectivity

  • One of the IoT implementations is the smart door A smart door is an electromechanical lock designed to lock and unlock operations on the door when it is directed by an approved computer to perform the permit process by using a wireless protocol and a cryptographic key

  • A smart lock is an electromechanical lock that enables locking and unlocking of doors from an approved computer with a wireless protocol and a coding key to operate the authorization process. We need these things in order to build a security system for smart doors: [1][2][18] [19]

Read more

Summary

Introduction

The Internet of Things (IoT) is the application of physical devices and everyday objects of Internet connectivity. One of the IoT implementations is the smart door A smart door is an electromechanical lock designed to lock and unlock operations on the door when it is directed by an approved computer to perform the permit process by using a wireless protocol and a cryptographic key. It tracks exposure and provides updates to the various events these controls and other important activities related to the device's status. The system needs functional and non-functional requirements; the Use-Case Model is used for this paper. [1][20][21][22]

Objectives
Methods
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.