Preview

Bluetooth Door Lock

Good Essays
Open Document
Open Document
2263 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bluetooth Door Lock
Table of Contents:
1. Purpose/Introduction...................
2. Top Level Design and Testing.....
3. Subsystem Design and Testing...
4. Troubleshooting...........................
5. Conclusions..................................

Purpose
It has been known for some time now that mechanical locks are becoming outdated. Mechanical locks are notoriously easy to lock pick, the quantity of keys limits their use, and they are not convenient to use. The goal of Team Open Sesame is to create a door that is safer and more convenient to use than the conventional mechanical door. Team Open Sesame’s design gives people limited access to a door through their android smartphone’s Bluetooth in the form of a digital key code. The use of a digital key provides more safety than the traditional locking mechanism, as it takes more experience to hack into a password encrypted system than to pick a lock. This design also provides the security of always being locked, until given a quick command to unlock. The goal of almost any piece of technology is to improve on what has been done before. Team Open Sesame’s door is easier to use, is more secure, and has infinite keys. Team Open Sesame’s door is applicable to any door. There are uses for an automatic door by private individuals as well as companies and businesses. Any door that requires increased security would benefit from this design. Also, companies that utilize this technology will no longer need to print many duplicates of the same keys to give access to their employees. Another benefit of having digital keys is the ability to change the passwords periodically to eliminate the risk of security breaches. Private individuals might want to install this door in the front of their house. Not only is it a flashy object that impresses neighbors but this door will make it easy to walk into your home with an armload of groceries without the need to fumble for your keys at your front door.

You May Also Find These Documents Helpful

  • Good Essays

    Rapha provides exterior lockable doors and windows, in addition to the effective automated devise or system that alerts staff…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Cjs/250 Appendix D

    • 574 Words
    • 3 Pages

    The office building exterior has three outer doors and one window. The first door is marked with an Employees Only sign and requires a badge for access. The second door is the main entrance for visitors and is manned by a guard, who requires a visitor’s pass for admittance. The third door is an emergency exit only and is clearly marked. Any attempt to gain access through the first door without a badge, the second door without a pass, or the third door at all, results in alarm activation and guard response. The window is locked from within; any attempt to gain access through the window also activates the alarm and alerts the guard.…

    • 574 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Any special requirement would have also been discussed at the initial assessment ie entry by the front or back door, keysafe number, security door number, whether they would like the doorbell rung before entering etc.…

    • 832 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    All internal doors can only be opened by staff with an access badge and in some places also a key.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4222-226

    • 448 Words
    • 2 Pages

    This include key boxes on door ways with code number provided for emergency use .Keys provided to support workers / housing warden /medical professionals but these as key holders should be the only person…

    • 448 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Various authentication methods are used and range from the simple to complex. The security level provided will vary depending on the utilized technique and deployment method. The most dominant method involves authentication with a password and username. However, this is also one of the most insecure methods. We can describe these devices and systems depending on the three factors:…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Students use mobile devices, ranging from smartphones to tablets to laptops, to access class schedules, grades, email, and social network sites. Many devices have the capability to store user ID’s and passwords but personal security measures on these devices are not stringent, making it easy for an unauthorized person to intercept this information. Even though a college computer network may have numerous levels of protection, the system cannot easily track student authentication when mobile devices are used. This lack of authentication provides easy access for even a semi-skilled hacker to the user ID/password combination. Once the hacker has this information, he or she can take over…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Better Essays

    With this system in place throughout your building, it will allow your techs to be able to monitor the air condition units, the water flow throughout the building, the fire alarm system, the lighting throughout the building and your employees will be able to have keycards that will allow them to enter into the elevators, different floors and departments and to be able to come in and out of the parking garage, and it will give them access to enter the building as well. This programming will allow you to place a time when the doors and elevator will lock down, and they will have to use their keycard to enter and operate the elevators. The system will also lock down the parking garage, and they will only need their keycard to enter the garage but to exit the garage their vehicle will send a single to the sensor and allow the doors to open up. These sensors will be able to notice body movement when someone is close to the door leaving out of the building. With this system in place, anyone that works in the building will be assigned a keycard with an identification number on it along with their picture. These keycards will allow them access in and out of the building and on the floor of the departments within the building. Clients that you may have coming into the building for meetings will need to sign for a loaner card to be able to get access to the floors of the building. The advantages of having this system within your building is that everything is wireless and that it stores a limited amount of energy that there is no hassle with cable cords, and it can work efficiently under harsh conditions, and the development is up to a large scale. The radio transmission technology optimized for harsh industrial environment and monitoring the software that is designed to match your needs and blend into your IT infrastructure and it also allows your real time monitoring…

    • 1360 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Implement a tool for user authentication, encryption and decryption; use pins and passwords for barriers.…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    All the external doors can be opened from inside the building to allow persons to exit at any time, however the doors are alarmed. This alerts staff by the use of a paging device, carried by all support staff. This enables safety and security of all persons within the building.…

    • 602 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Password Protection

    • 4064 Words
    • 17 Pages

    Today, everyone is having online banking account and e-mail account . Safety is an important aspect. If some intruder steal our password, then we have to pay high price for it. So protecting password is a significant factor for each and every one in this e-world. This speech provides mechanism to protect our online password.…

    • 4064 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    The development of CrypTool was started back in 1998, by a group of German companies and universities, but now is an open source project. More than sixty people worldwide contribute regularly to the project. The goal of the CrypTool is to help ensure users are aware of how cryptography can help against network security threats and also explains the underlying concepts of cryptology. The software is available in English, German, Polish, Spanish, and Serbian (Wikia.com, 2013).…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Keyboard Hacking

    • 287 Words
    • 2 Pages

    The system of encrypting the data before transferring it through the port and later decrypting it solves this threat. So in this paper as a part we will look in detail about the keyboard capture devices & its threats to security. In the remaining half comes our ideas of securing the keyboard. If this is a success, then probably we could produce the first fully secured wired keyboard.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    [2] D. V. Klein, “Foiling the cracker: A survey of, and improvement to passwords security,…

    • 3600 Words
    • 15 Pages
    Best Essays