Professional Documents
Culture Documents
Jayvee C. Logronio
March 2014
DOOR LOCK SECURITY SYSTEM 2
APPROVAL SHEET
This thesis here to entitled:
DARWIN C. VARGAS
Adviser
Approved by the Committee on Oral Examination with a grade of PASSED on March 15,
2014.
Accepted in partial fulfillment of the requirements for the degree Bachelor of Science in
Computer Science.
ACKNOWLEDGEMENT
We would like to express our deepest gratitude first and foremost to our creator, Lord
To our loved ones, Faustino and Logronio family for being patient and supportive enough
To our friends and classmates for helping us in identifying some problems regarding the
project and to our thesis adviser, Mr. Darwin C. Vargas for being more that just our mentor, he
ABSTRACT
The study developed a door lock device that can minimize security problems. It is a two-way
security door lock system which uses Radio Frequency Identification and Microcontroller. The
users can simply scan their I.D. on to the scanner then input the password on the RFID door lock
device. The process was made easier since the device included light signals and voice prompt
that inform the user what to do. Once the device has recognized the I.D. and the password
correctly, it will automatically unlock the room. The project was evaluated by 30 respondents
who answered the evaluation sheet. The evaluation criteria include functionality, aesthetics,
workability, durability, economy, safety and saleability.
DOOR LOCK SECURITY SYSTEM 5
Table of Contents
PRELIMINARIES PAGE
Title Page 1
Approval Sheet 2
Acknowledgment 3
Abstract 4
Table of Contents 5
List of Tables 7
List of Figures 8
Introduction 9
Related Studies 24
Evaluation System 33
Evaluation Procedure 33
DOOR LOCK SECURITY SYSTEM 6
Chapter 3 METHODOLOGY
Project Design 35
Operation Procedure 38
Project Development 38
Project Description 41
Project Structure 42
Project Evaluation 47
AND RECOMMENDATIONS
Summary of findings 55
Conclusions 56
Recommendations 57
REFFERENCES 58
APPENDIXES
Appendix A 60
Appendix B 61
Appendix C 62
Appendix D 63
CURRICULUM VITAE
DOOR LOCK SECURITY SYSTEM 7
LIST OF TABLES
TABLES PAGE
LIST OF FIGURES
FIGURE PAGE
1 RFID Scanner 15
2 PIC Microcontroller 15
3 Resonator 16
4 Internal Oscillator 17
5 Capacitor 18
6 Power Supply 20
7 Proteus VSM 21
11 Schematic Diagram 37
CHAPTER 1
This chapter discusses the introduction, background of the study, objectives of the study,
significance of the study, and scope and limitations of the study.
Introduction
As the 20th century enters and with the advancement of technology, everything seems to
be possible. The problem with this is that people can use the power of technology to harm others,
that’s why security is still one of the major problems people are facing right now. Keys and other
Kevin Coffey (2011) stated that, home security now poses great threat against burglars or
theft. The door lock is the primary security in every home. Burglars and thieves have their own
techniques in opening a certain door and even breaking in into one's house. This is the reason
why we need a certain technology which can fully secured houses- from the door lock up to the
As stated by Shradha Thale (2012) it can be wise and an important decision to look into
taking advantage of the protection that this kind of system can offer. The two most important and
valued items you own are your family and your life, and they need to be guarded. Using this kind
of system, it allows you to minimize the chance of burglars harming you and your family. Also,
There are several things in your home that probably hold value to you, be it sentimentally
or numerically. In using this system, those items and belongings are granted further protection.
DOOR LOCK SECURITY SYSTEM 10
Lastly, a benefit that comes from having security system installed is a lot less tangible, but still
very important. In using these devices, you are able to gain a peace of mind that you might not
otherwise have. Because of this, your stress level may decrease, and you may even sleep better
during the nights since you will not have to worry about anyone breaking in during the evenings.
A study done by Roy Want (2006), Radio Frequency Identification (RFID) enables
identification from a distance, and unlike earlier bar-code technology, it does so without
fields to transfer data, for the purposes of automatically identifying and tracking tags attached to
objects. The tags contain electronically stored information. RFID tags are ID system that uses
small radio frequency identification devices for identification and tracking purposes. An RFID
tagging system includes the tag itself, a read/write device, and a host system application for data
collection, processing, and transmission. An RFID tag (sometimes called an RFID transponder )
A study done by S.E. Sarma, S.A.Weis and D.W. Angels RFID systems are comprised of
three main components: The RFID tag, or transponder, which is located on the object to be
identified and is the data carrier in the RFID system, RFID reader, or transceiver, which may be
able to both read data from and write data to a transponder, and data processing subsystem which
utilizes the data obtained from the transceiver in some useful manner.
With the advancement of technology, it can greatly help in solving, if not, minimizing
this problem. Using the idea of Radio Frequency Identification or RFID and Microcontroller, it
can serves as a new security item with convenience, reliability and user friendly.
DOOR LOCK SECURITY SYSTEM 11
We all want to sleep peacefully at night, knowing that our place is secure and safe to live
with. We all want our investments and properties to be safe. Security is indeed one of the biggest
concerns nowadays.
Security tests by Consumer Reports Magazine in the 1990s found that many residential
doors fail or delaminate when force is applied to them. This only shows that we should never be
victim interviews, learned that in 87% of the break-ins that occurred when intruders defeated
locked doors with tools such as screwdrivers or crowbars, the burglars targeted the one door that
had no deadbolt lock, not one burglar attempted to break a double-pane window during the
In this study, the researchers attempted to solve or minimize the problems of security
system by developing a Door Lock security system using Radio Frequency Identification or
RFID and Microcontroller. The users can simply scan their I.D. on to the scanner then input the
password on the RFID door lock device. The process was made easier since the device will
include light signals and voice prompt that will inform the user what to do. Once the device
recognized the I.D. and the password correctly, it will automatically unlock the room.
DOOR LOCK SECURITY SYSTEM 12
The general objective of the study is to develop a RFID Door Lock device that will help
1.) Design a RFID Door Lock device with the following characteristics:
b. Let the user scan their I.D. and input password to access the room.
d. Includes signal lights and voice prompt that inform the user what to do and tell
e. Change of password.
3.) Test and improve the device in terms of functionality, aesthetics, workability, economy and
safety.
4.) Determine the level of acceptability of the prototype using the TUP evaluation instrument.
DOOR LOCK SECURITY SYSTEM 13
the study is to create a RFID Door Lock device using Radio Frequency Identification,
Microcontroller and other hardware. The user can easily access a room by just scanning his/her
I.D. and entering the password. The process of doing this is made easier by using light signals
and voice prompt that will inform the user what to do and whether the user can access the room
or not. Also, it includes release button inside the room for user to exit easily and it can be used as
On the other hand, the study has the following limitations. First, a maximum of 10
different RFID can be stored and recognize by the device having the same password. Also, the
Chapter 2
CONCEPTUAL FRAMEWORK
The chapter II contains the review of the related literature, related studies, conceptual
The following literatures are the ideas which help in the conceptualization of the study.
electromagnetic fields to transfer data, for the purposes of automatically identifying and tracking
tags attached to objects. The tags contain electronically stored information. Some tags are
powered by and read at short ranges (a few meters) via magnetic fields (electromagnetic
induction). Others use a local power source such as a battery, or else have no battery but collect
energy from the interrogating EM field, and then act as a passive transponder to emit microwaves
or UHF radio waves (i.e., electromagnetic radiation at high frequencies). Battery powered tags
may operate at hundreds of meters. Unlike a bar code, the tag does not necessarily need to be
within line of sight of the reader, and may be embedded in the tracked object.
DOOR LOCK SECURITY SYSTEM 15
A study done by Vivek R. (June 29, 1011), a PIC microcontroller, even though it may
have been programmed, is not of much use unless it is supported by a number of components,
such as the timing components and the reset circuitry. PIC microcontroller requires an external
clock circuit (some PIC microcontrollers have built-in clock circuits) to function accurately.
A PIC microcontroller starts executing the user program from address 0 of the program
memory when power is applied to the chip. The reset input (MCLR) of the microcontroller is
Resonators
Resonators are more often used in microcontroller clock circuits because of their low
Figure 3. Resonators
PIC Micros
PIC micros do not need much to operate, just a steady and stable voltage for Vdd and
MCLR, and an external oscillator if you are not using the internal oscillator on the PIC.
The diagram below explains how to hook up the basic requirements of the PICmicro, and
although an 18 Pin PIC has been used in this example, the same analogy applies to any
5 Volts too
MCLR
Internal Oscillator
Crystal oscillator if most PIC's have one built in because the internal oscillator is not
nearly as accurate when compared to crystal oscillators, and for timing crucial (within range)
applications this is important to know. Of course this is not required for 95% of
The capacitors
The 10uF electrolytic capacitor is required to maintain a steady input voltage to the
regulator, and should be used in all designs. If you are driving high current loads, then use a
bigger capacitor, but in most cases, 10uF will be suffice. Keep in mind that electrolytic
capacitors are polarity sensitive, and the negative lead is marked with a band on the side of the
case.
The 0.1uF ceramic disc capacitor is used to remove transient noises on the output. These
are high frequency noises/spikes created from a range of sources and anomalies on your target
DOOR LOCK SECURITY SYSTEM 18
circuit, and although not required on non timing crucial applications, I still place one to ensure
the accurate timing operation of the PIC. Ceramic disc capacitors are not polarity sensitive.
The 5 volt regulator 7805can has a much higher input voltage then 12 volts, but heat
Voltage regulators are essential with digital electronics, as most devices require a very
steady and clean 5 volts to operate correctly. Some devices require 3.3 volts, but the concept is
The 7805 is a 3 pin package that is easily designed for regulating any voltage over 6.5
volts down to a constant and steady 5 volts. The reason why you need 6.5 volts or more is to
Figure 5. Capacitor
Based on Craig Peacock (25th Oct. 2010), almost all digital devices which we use require
either TTL or CMOS logic levels. Therefore the first step to connecting a device to the RS-232
port is to transform the RS-232 levels back into 0 and 5 Volts. As we have already covered, this
is done by RS-232 Level Converters. Another device is the MAX-232. It includes a charge
DOOR LOCK SECURITY SYSTEM 19
pump, which generates +10V and -10V from a single 5V supply. This I.C. also includes two
receivers and two transmitters in the same package. This is handy in many cases when you only
want to use the Transmit and Receive data lines. You don't need to use two chips, one for the
receive line and one for the transmit. However all this convenience comes at a price, but
compared with the price of designing a new power supply it is very cheap. There are also many
variations of these devices. The large values of capacitors are not only bulky, but also expensive.
Therefore other devices are available which use smaller capacitors and even some with inbuilt
capacitors. (Note: Some MAX-232's can use 0.1 micro farad capacitors). However the MAX-232
is the most common, and thus we will use this RS- 232 Level Converter in our circuit.
Power supply
A study done by Vivek R. (June 29, 1011), every electronic circuit requires a power supply
to operate. The required power can either be provided from a battery, or the mains voltage can be
used and then reduced to the required level before it is used in the circuit (e.g. a mains adapter).
In this section, we shall look at the design of a power supply circuit to power our
PICmicrocontroller circuits using a battery as the source of power. PIC microcontrollers can
operate from a power supply voltage in the range 2 to 6V. The standard power supply voltage in
digital electronic circuits is +5 V and this is the voltage with which the PIC microcontrollers are
mostly operated. Unfortunately, it is not possible to obtain 5 V using standard alkaline batteries
only. The nearest we can get is by using three batteries, which gives 4.5 V and this is not enough
to power standard logic circuits. In this section, we shall see how to convert a standard 9-V
battery (e.g. type PP3) voltage to 5 V so that it can be used in our PIC microcontroller-based
projects.
DOOR LOCK SECURITY SYSTEM 20
The simplest solution to drop the voltage from 9 to 5 V is by using a potential divider
circuit using two resistors. Although a potential divider circuit is simple, it has the major
disadvantage that the voltage at the output depends on the current drawn from the circuit. As a
result of this, the output voltage will change as we add or remove components from our circuit.
The Power supply is basic circuit of full wave rectifier driven from AC mains and using
resistive load and filter. The output winding of the power transformer is center tap. Hence the
Proteus VSM
combines mixed mode SPICE circuit simulation, animated components and microprocessor
models to facilitate co-simulation of complete microcontroller based designs. For the first time
ever, it is possible to develop and test such designs before a physical prototype is constructed.
DOOR LOCK SECURITY SYSTEM 21
This is possible because you can interact with the design using on screen indicators such
as LED and LCD displays and actuators such as switches and buttons. The simulation takes place
in real time (or near enough to it): a 300 MHz Pentium II can simulate a basic 8051 system
clocking at over 12MHz. Proteus VSM also provides extensive debugging facilities including
breakpoints, single stepping and variable display for both assembly code and high level language
source.
including end users. Whilst many types of animated model can be produced without resort to
coding, a documented interface has been provided for developers to write their own models
packaged as Windows DLLs. These models can implement purely electrical behaviour or
combine this with graphical behaviour so that almost any kind of application specific peripheral
can be simulated.
Proton Plus
A study made byMiercuri (09 Februarie 2011), the Proton Plus Compiler is probably the
easiest way to create programs for the ever–popular PICmicroTM microcontrollers. Proton Plus
Compiler generates files that can be programmed directly into a PICmicroTM, using any
Microchip compliant programmer. The PROTON Plus compiler offers flexibility, and
affordability that is unparalleled in the world of PICmicroTM programming. Proton Plus is now
considered by most to be the world leading PIC BASIC Compiler everything that can be
achieved with other PIC BASIC Compilers can be achieved with the PROTON Plus PIC BASIC
Compilers and the PROTON Plus BASIC Compilers do more, in less code space at a lower cost.
The PROTON Plus compiler offers the beginner a comfortable and familiar environment
to gently move into the world of PIC programming, and the Professional programmer will find
Proton+ offers a speedy route to market producing Tight Fast READABLE and EDITABLE
assembly, commented with PIC BASIC, with easy integration of existing assembly routines and
easy creation of Macro's and INCLUDE files to incorporate tried and tested routines.
Proton Development Suite combines the Proton Plus Compiler with a brand new IDE and Virtual
It is simple:
Then test your code with the Virtual Simulator, or upload the code to your PICmicro using the
IDE's
DOOR LOCK SECURITY SYSTEM 24
Related Studies
applications such as security, asset tracking, people tracking, inventory detection, access control
applications. The main objective of this paper is to design and implement a digital security
system which can deploy in secured zone where only authentic person can be entered. We
implemented a security system containing door locking system using passive type of RFID which
can activate, authenticate, and validate the user and unlock the door in real time for secure
access. The advantage of using passive RFID is that it functions without a battery and passive
tags are lighter and are less expensive than the active tags. A centralized system manages the
controlling, transaction and operation task. The door locking system functions in real time as the
door open quickly when user put their tag in contact of reader. The system also creates a log
containing check-in and check-out of each user along with basic information of user.
enables wireless data transmission. This technology has not been very often used in industry due
to lack of standardization among the manufacturing companies earlier. RFID technologies are
efficient and secure compare to other network . With RFID, wireless automatic identification
takes a very specific form: the object, location, or individual is marked with a unique identifier
code contained with an RFID tag, which is in some way attached to or embedded in the target.
RFID is not a single product but a comprehensive system, a typical RFID system include three
basic elements: RFID tag (transponder), reader (transceiver) and back-end application system (or
database), which demands the support of the computer network. The software is used for
DOOR LOCK SECURITY SYSTEM 25
management, controlling, transaction, operation and maintaining record of the various users. A
digital door locking system is also implemented and governed by RFID reader which
authenticate and validate the user and open the door automatically. It also keeps the record of
check-in and check-out of the user. It’s very important to authenticate the user before entering
into a secure space and RFID provide this solution. The system enables user to check-in and
check-out under fast, secure and convenient conditions. The system include door locking system
which open when the user put their tag in contact with reader and the user information matched
with the information already stored in database. The RFID controls the opening and closing of
the door. In this study we utilize RFID technology to provide solution for secure access of a
space while keeping record of the user. We used passive type of rfid here. The passive types of
rfid are battery-less and they obtain power to operate from reader. The major advantages of
passive rfid are its cost effective and small in size. Due to above advantages, it is widely use by
inventory tracking technology. Current antenna technology makes it possible to smaller in size.
A study made by Chris Huang, RFID Door Lock -- Many different updated forms of door
locks have been introduced to the market, even RFID door locks, but all of them really provide
any substantial convenience over the conventional key. This project will be the production in
prototype form of such a door lock, which will improve convenience above the existing types of
door locks on the market, at the same time still providing the security of a conventional door
lock. The produced door lock will require the user to simply have the key on the user, and with a
touch of the door lock, the door lock will verify the key's presence on the person by RFID, and
automatically unlock the door. Then the user simply opens the door.
A study made by Ononiwu G. Chiagozie and Okorafor G. Nwaji (March 2012), Radio-
frequency identification (RFID) is a technology that uses radio waves to transfer data from an
DOOR LOCK SECURITY SYSTEM 26
electronic tag, called RFID tag or label, attached to an object, through a reader for the purpose of
identifying and tracking the object. Radio frequency identification (RFID) is a matured
technology that incorporates the use of electromagnetic or electrostatic coupling in the radio
person. RFID chips contain a radio transmitter that emits a coded identification number when
queried by a reader device. Some RFID tags can be read from several meters away and beyond
the line of sight of the reader. The application of bulk reading enables an almost-parallel reading
of tags. This small type is incorporated in consumer products, and even implanted in pets, for
identification. The tag's information is stored electronically. The RFID tag includes a small RF
transmitter which transmits an encoded radio signal to interrogate the tag, and receiver which
receives the message and responds with its identification information. Some RFID tags do not
use a battery. Instead, the tag uses the radio energy transmitted by the reader as its energy source.
The RFID system design includes a method of discriminating several tags that might be within
the range of the RFID reader. RFID can be used in many applications. A tag can be affixed to
any object and used to track and manage inventory, assets, people, etc. For example, it can be
affixed to cars, computer equipment, books, mobile phones, etc. The Healthcare industry has
used RFID to reduce counting, looking for things and auditing items. Many financial institutions
use RFID to track key assets and automate compliance. Also with recent advances in social
media RFID is being used to tie the physical worldwith the virtual world. RFID in Social Media
RFID is a superior and more efficient way of identifying objects than manual system or
use of bar code systems that have been in use since the 1970s. Furthermore, passive RFID tags
(those without a battery) can be read if passed within close enough proximity to an RFID reader.
DOOR LOCK SECURITY SYSTEM 27
It is not necessary to"show" the tag to the reader device, as with a bar code. In other words it
does not require line of sight to "see" an RFID tag, the tag can be read inside a case, carton, box
or other container, and unlike barcodes RFID tags can be read hundreds at a time. Bar codes can
Radio frequency identification (RFID) is a matured technology that incorporates the use
spectrum to uniquely identify an object, animal, or person. They are grouped under the automatic
identification (Auto-ID) technologies. RFID tags are not an "improved bar code" as the
proponents of the technology would like you to believe. An RFID system consists of three
components which include: an antenna, a transceiver and a transponder (the tag). The antenna
and the transceiver are often incorporated into one reader. The antenna uses radio frequency
waves to transmit a signal that activates the transponder. When activated, the tag transmits data
back to the antenna. The RFID can read the tag using Radio Frequency, meaning that the RFID
reader can be read from a distance, right through your clothes, wallet, bags etc. An RFID tag
consists of unique ID for each tag. The RFID technology has been in existence since the early
1920s. This technology has been used in libraries, museums, race timing, toll collection and
The RFID attendance system is an automatic embedded system used in taking attendance
organization, the efficiency and convenience associated with RFID technology at a low cost. This
method is fast as well as simple. Each employee uses an RFID card and the reader records the
data when the employee enters or exits. RFID devices and software must be supported by a
sophisticated software architecture that enables the collection and distribution of location based
DOOR LOCK SECURITY SYSTEM 28
information in near real time. A complete picture of theRFID attendance system combines the
RFID Tags and readers with access to global standardized database, ensuring real time access to
up-to-date information on the card. The card contains a unique identification number called an
Nowadays, there are lots of companies around the world and some of them consist of
especially to get the attendance of the workers. The manual process means that whenever a
worker comes to work, he goes to sign at the time officer’s table. This manual process has some
flaws because in a case where a worker bribes the time officer or is familiar with him, the time
officer may tamper with the attendance records. This would be a big problem in the company and
The suitable solution for this problem is by designing a system that will record attendance
automatically. In this project, RFID system is used to record the numbers of employees’
attendance automatically. The ID cards of the employees is embedded with RFID tag which is
read by a reader. This RFID system is interfaced to a database through a computer. This method
is more effective to prevent problem encountered when getting attendance manually. Below is
A study made by Leon Theremin (1945),where he invented an espionage tool (for spy
activities) for the Soviet Union which retransmitted incident radio waves with audio frequency
information. Sound waves vibrated a diaphragm which slightly altered the shape of the resonator,
which modulated the reflected radio frequency even though this device was covert listening
identification (RFID) technology because it was likewise passive, being energized and activated
by waves from an outside source. Similar technologies such as the IFF (identification friend and
foe) transponder developed in the United Kingdom, was are still used by most powered aircrafts
to this day.
A study made by Mario .W. Cardullo (1973), was the first to have received the United
States patent for an active RFID tag withre-writable memory on January 23, 1973 [4]. In that
same year, Charles Walton, a California entrepreneur, received a patent for a passive transponder
used to unlock a door without a key. A card with an embedded transponder communicates a
reader near a door, when the reader detects a valid identification number stored within the tag,
the reader unlocks the door. Walton licensed the technology to Schalge Lock of San Francisco, a
On the basis of the foregoing concepts, theories and findings or related literature, studies
presented and insights taken from them, a conceptual model was developed as shown in the next
page:
DOOR LOCK SECURITY SYSTEM 30
Hardware Requirements:
RFID Reader
Numeric Keypad
Voice Module
Evaluation
Door Latch/ Latch
Driver
The conceptual model of the study as shown in figure 9 shows and explains the
components essential for the system. The components include input, process and output.
INPUT
The input contains knowledge, software and hardware requirements. The knowledge
requirements are composed of the following basic programming, assembly language and MCU.
Protel for Windows(PCB Layout) and PicKit2( Pic burner) are the software requirements which
will be needed to construct the proposed study. The hardware requirements are the RFID Reader,
PROCESS
The process in the Conceptual Study is composed of three parts: project design
OUTPUT
After integrating the knowledge, software and hardware requirements, the output of the
PDS orPartitioned Data Setare probably the most frequently manipulated type of data sets
on many OS/390 systems. We store JCL, source code, and system parameters in PDS.
PICBASIC Compiler (or PBP) is our next-generation programming language that makes
it even quicker and easier for you to program Microchip Technology=s powerful
PICmicro microcontrollers. The English-like BASIC language is much easier to read and
Protel Advanced PCB is one of the software that use to draw and design schematic and
PICkit is a low-cost development tool with an easy to use interface for programming and
halts and single steps the program while the PIC microcontroller is embedded in the
application. When halted at a breakpoint, the file registers can be examined and modified.
Parity bit is a sort of check to ensure the data sent and received are same. If parity is to
be implementedboth systems, sender and receiver must implement it. Parity bit is either
Evaluation System
Evaluation system was used to test if the researchers met the criteria in developing the
system. The aim of the evaluation is to identify if the developed system is acceptable in the set
standards of the respondents. It consists of respondents’ profile and the evaluation instrument.
Evaluation Procedure
For the evaluator accomplished a form will be given where he/she can write a grade in
every criterion for the system. The evaluator must be knowledgeable about website.
2. The researchers discuss the project and the users would test and evaluate its performance.
3. The results will be tabulate and the mean ratings will be compute to determine if the
project is acceptable.
The following are the criteria for the evaluation of the hardware.
Functionality is measured according to its ease of operation, provision for comfort and
appropriateness of size.
CHAPTER 3
METHODOLOGY
This chapter comprises the Project Design, Data Flow Diagram, Entity Relationship
Diagram, System Flowchart, Project Development Flow, System Operation and Testing
Procedure, and Evaluation Procedure.
Project Design
Figure 10 illustrates the project design of the RFID Door Lock. It is a device that will let the
user simply scan his/her I.D. and enter the password to access a room. The figure concentrates on
how the project will be executed in a procedural manner and the projects general flow. The
project will be equipped with Radio Frequency Identification reader, Microcontroller, Door
Latch and Voice Module. The device can only store and recognize a maximum of 10 RFID tags.
DOOR LOCK SECURITY SYSTEM 36
The microcontroller unit will serve as the central processor that is responsible for all the
activities of the device such as storing and recognizing RFIDs. The microcontroller that used was
PIC16F877. The microcontroller works to control the hardware and to interface with the RFID
Once the user scans his/her I.D. on to the scanner, the data will be sent to the MCU that will
recognize the RFID and command the voice module to let the user enter the password on to the
keypad. If all the data entered are recognize correctly by the device, and then the MCU will
release the Door Latch to let the user access the room.
Operation Procedures:
Project Development
shown in Figure 12 illustrates the process of conducting the research in the development of the
Hardware Components
Software Components
1. Coded the behavior in every motion signal using PIC Basic Programming.
5. Ran and executed the program to test the performance of the prototype.
DOOR LOCK SECURITY SYSTEM 40
Chapter 4
This chapter presents the results and details discussion of the final evaluation. It includes the
project description, project structure, project capabilities and limitations.
Project Description
The developed Door Lock is a device that can minimize security problems. It is a two-
way security door lock system which used Radio Frequency Identification and Microcontroller.
The users simply scan their I.D. on to the scanner then input the password on the RFID Door
lock device. The process made easier since the device includes light signals and voice prompt
that inform the users what to do. Once the device has recognized the I.D. and the password
Figure 13 shows the outer part of the device consisting of the RFID Scanner, numeric
Project Structure
The images of the hardware are all discussed in this section. Shown in the image is the
Figure 14 shows the actual scanning of I.D. onto the device and as it recognized the I.D.
correctly, lights turned into yellow and green and voice prompts “card recognized, please enter
your password”.
DOOR LOCK SECURITY SYSTEM 43
Figure 15 shows the user tapping his/her I.D. onto the scanner and light remains red and
voice prompts, “card recognized” if it is not recorded on the device.
Figure 16 shows the user entering her password. The light turns light green and voice
Figure 17 shows that the door automatically unlocks once the user enters the correct I.D.
password.
Figure 18 shows that the light turns back red and voice prompts, “ access denied” once
Figure 19 shows that the user uses key and doorknob once electricity is absent.
The developed Door Lock is a device that can minimize security problems through the
The project’s capabilities were scanning I.D. and inputs password to access the room. Also, it
includes light signals, voice prompt that informs the users what to do, and changing password. It
can be used as a normal door that uses door knob and keys in case of brownouts.
Although the project presents functions for security purposes, it also contains certain
limitations over which the user has no control.The limitation of the project is that users will be
Project Evaluation
durability, economy, safety and saleability, the results are shown in Appendix D.
During the actual testing of the device, many students tested it by scanning the I.D.s and
entering its password. Also, the place where it was tested is in a crowded area.
Table 1 shows the respondents’ mean rating for the functionality of the project. The highest
mean rating was obtained by the indicator ease of operation ( x=4.7), while comfort and
convenience and user friendliness were both rates the insert (x=4.6) of the device. Functionality
Table 2 shows the respondents’ mean rating for the aesthetics of the project. The highest
mean was obtained by the apprecaiteness of its design ( x=4.1), while color appeal obtained the
insert rate (x=3.8) of the device. Aesthetics obtained an overall mean rating of 4.0 which is
interpreted as “Excellent”.
DOOR LOCK SECURITY SYSTEM 49
Table 3 shows the respondents’ mean rating for the workability of the project. The highest
mean rating were both obtained by the indicators technical expertise and tools and machines
(x=4.4) while materials get a mean rating of 3.3 obtained an overall mean rating of 4.4 which is
Table 4 shows the respondent’s mean ratings for the durability. The highest mean rating
durability was obtained by quality of workmanship (x=4.3), while quality of material obtained
the insert (x=3.2). Durability obtained an overall ratings of 4.1 which is interpreted as “ Very
Good”.
DOOR LOCK SECURITY SYSTEM 51
Table 5 shows the respondent’s mean ratings for the economy. The highest mean rating
economy was obtained by both indicators time spent and machines required (x=4.3) while
materials needed got the insert (x=4.2). Economy obtained an overall rating of 4.3 which is
Table 6 shows the respondent’s mean ratings for the safety. The highest rating safety was
obtained by indicators provision for protection and absence of toxic materials and absence of
sharp edges obtained the insert (x=4.4) an overall of 4.5 which is interpreted as “Very Good”.
DOOR LOCK SECURITY SYSTEM 53
Table 7 shows the respondent’s mean ratings for the saleability. The highest mean rating
saleability was obtained by accessability (x=4.4) while market demand got the invert (x=4.2).
Table 8 shows the overall mean rating of the evaluators who rated the project. The
functionality got the mean rating (x=4.6) while aesthetics got the lowest mean rating (x=4.0). The
overall rating is 4.3 which falls within the range of the scale value “Very Good”. This establishes
Chapter 5
This chapter contains the summary, conclusions and recommendation for the project. It
responds to the closure of the idea of remote control in the future. Then, it also states suggested
development opportunities for the project that many will try their best to make it work.
Summary of Findings
The developed project was all about a two-way Door Lock security system using Radio
user can access a room. The process were made easier with the help of light signals and voice
prompt which tells the user what to do. It can also be used as a normal door with door knob and
The device was evaluated using the TUP Evaluation Sheet (Refer to Appendix D). The
Conclusions
b. Let the user scan his/her I.D. and input password to access the room.
d. Includes signal lights and voice prompt that informs the user what to do and tell
e. Changing of password.
3. The device was tested and evaluated in terms of its security features.
Recommendations
1. The device can be improved by adding LCD screen for registration and changing of
password.
REFERENCES
Retrieved from
file:///G:/Radio%20Frequency%20Identification%20%20%20Debatewise%20Where%20great%
20minds%20differ.htm
APPENDIXES
DOOR LOCK SECURITY SYSTEM 60
DOOR LOCK SECURITY SYSTEM 61
Appendix B
TOTAL COST OF PRODUCTION
Resistor 1k 1 2.50
2k 2 20.00 (10.00 each)
Capacitor 22p 2 10.00 (5.00 each)
2200 uf 1 27.00
1000 uf 1 226.00
Integrated Circuit PIC16F887 1 350.00
7805 1 34.50
Transistors IRF540 1 45.00
Diodes IN4007 2 6.00 (3.00 each)
IN4001 1 4.50
Connector- SIL2 5 75.00 (15.00 each)
Solenoid Latch 1 157.50
Crystal Speaker 1 150.00
40 Pin IC 1 28.00
16 Pin IC 1 9.00
Alexan Plastic Box 1 250.00
Connecting Wires 20 200.00 (10.00 each)
3x4 Numeric Keypad 1 267.00
Power Cord 1 98.00
Metal Door Latch 1 2,500.00
Door Prototype 1 1,500.00
750 MA Transformer 1 503.50
4 MHz Crystal 1 4.50
Door Knob 1 150.00
Software Requirements
Labor Cost
APPENDIX C
TECHNOLOGICAL UNIVERSITY OF THE PHILIPPINES
COLLEGE OF SCIENCE
EVALUATION SHEET
Name (optional): _____________________________
Instruction: Please evaluate the project by using the given scale and placing a checkmark (✓) under the
corresponding numerical rating.
Numerical Rating Descriptive Rating
5 Excellent
4 Very Good
3 Good
2 Fair
1 Poor
5 4 3 2 1
A. Functionality
1. Ease of operation
2. Provision for comfort and convenience
3. User-friendliness
B. Aesthetics
1. Color appeal
2. Attractiveness of design
3. Appropriateness of size
C. Workability
1. Availability of materials
2. Availability of technical expertise
3. Availability of tools and machines
D. Durability
1. Quality of materials
2. Quality of workmanship
3. Quality of design
E. Economy
1. Economy in terms of materials needed
2. Economy in terms of time/labor spent
3. Economy in terms of machine/s required
F. Safety
1. Absence of toxic/hazardous materials
2. Absence of sharp edges
3. Provision for protection devices
G. Saleability
1. Presence of market demand
2. Accessibility to finished product
3. Competitiveness of price
Comments:
_____________________________________________________________________________________
Signature of Respondent
DOOR LOCK SECURITY SYSTEM 63
APPENDIX D
Summary of Evaluation Sheet
No. of
Respo
ndents FUNCTIONALITY AESTHETICS WORKABILITY DURABILITY ECONOMY SAFETY SALEABILIT
Y
1 5 5 5 4 4 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
2 5 5 5 4 5 4 5 5 4 5 5 5 4 5 4 5 4 4 5 5 5
3 5 4 4 4 4 3 4 4 4 3 3 3 3 3 3 4 4 4 3 3 3
4 5 4 3 3 3 4 4 4 4 3 3 3 4 4 4 5 5 4 3 4 3
5 5 5 5 5 5 4 4 4 4 5 5 5 4 4 4 5 4 5 4 4 4
6 4 4 4 3 3 3 3 4 4 4 4 4 3 3 3 4 4 4 4 4 4
7 5 5 5 4 4 3 5 5 5 5 5 4 5 5 5 5 4 5 5 5 5
8 4 4 4 3 3 3 4 4 4 3 4 4 4 5 4 4 4 4 4 4 4
9 5 5 5 4 4 4 4 5 4 4 4 4 4 4 5 5 5 5 4 5 4
10 4 4 4 2 3 2 4 3 4 4 4 4 3 3 3 5 5 5 4 3 2
11 4 5 5 4 4 4 4 5 4 4 4 4 3 3 3 5 4 5 4 4 4
12 5 5 4 4 5 4 5 5 5 5 4 5 5 4 5 5 4 4 4 4 4
13 4 4 4 3 4 4 4 4 4 3 4 3 4 4 4 3 3 4 4 3 4
14 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5 5
15 5 5 5 3 4 4 5 4 5 4 5 4 4 4 4 4 4 5 5 5 5
16 5 5 4 3 4 5 5 5 5 4 5 4 5 5 5 5 4 4 4 5 5
17 4 5 5 4 4 4 4 4 5 4 4 5 5 5 5 5 5 5 4 5 4
18 5 5 5 4 4 5 4 5 4 4 5 4 5 4 5 5 5 4 4 5 4
19 5 5 5 4 3 3 4 4 5 3 4 3 5 4 4 5 3 5 3 4 4
20 5 5 4 4 5 5 5 5 5 5 5 5 5 5 5 4 4 4 4 5 4
21 5 5 5 5 5 5 4 5 5 4 4 4 5 5 5 5 5 5 5 5 5
22 5 5 5 5 5 5 4 5 5 4 4 4 5 5 5 5 5 5 5 5 5
23 4 3 3 2 2 4 3 3 3 3 4 3 3 3 4 4 4 4 3 4 3
24 4 4 5 4 4 5 5 5 5 4 5 4 3 4 4 4 4 5 3 4 3
25 5 4 4 5 5 4 4 4 4 5 3 2 3 3 3 5 5 4 4 4 5
26 5 5 5 3 4 5 5 4 4 5 4 3 5 5 4 5 5 5 4 4 5
27 5 5 5 5 4 5 5 5 5 5 3 5 4 5 5 5 5 5 5 5 5
28 5 5 5 3 3 3 5 5 5 5 5 3 4 4 4 4 4 4 4 5 4
29 5 5 5 5 5 5 4 4 5 5 5 5 5 5 5 5 5 5 4 5 5
30 4 4 5 4 4 4 4 4 4 5 5 5 5 5 5 4 4 5 5 5 5
MEAN 4.7 4.6 4.6 3.8 4 4.1 4.3 4.4 4.4 4.2 4.3 4 4.2 4.3 4.3 4.6 4.4 4.6 4.2 4.4 4.3
APPENDIX A
Project Gantt Chart