1- Introduction
of Designing a securable city house Access Control System through ID Card:
With the rising of human population. The number of
houses and cities has increased significantly. It is, however, important to
note that houses have limited entrances. At present, with
cities having been expanded and developed, the aspect of entrance into houses
has become quite important. This study provides a detailed description of how
the system of access to an entrance by ID card can be designed [1].
Identify
every people of the facility above 18 years by their (ID card) to entrance from
the main gate. If they are by car or by walking the put ID card to card reader
then database will match the data obtained from the person who wants entrance
to the city with his/her ID card and if the data matches, the device will allow
entrance. After that, the time will be recorded in the database. This card will
be capable of being used for a year [2].
This
project is aimed to enable entrance to a city or house with the use of ID card from
people. Therefore, in order to secure a facility or house, only authorized
people or residents can gain an access to it while unauthorized people cannot
gain entrance to it.
This paper also focuses on designing a system in the
form of Web-Application with the use of PHP and MySQLi for entrance to house
from registered locations. Every person of house has a username and password to
the login database.
If a relative or a friend wants to
visit someone, he has to open his account and add name, car number, date, and
time to the list of visitors through control point to know where is he going, which
house he goes to, what is the number of the house, and who he is visiting. Then,
the control point will give him permission. It will ensure residents about
their security and protection [3]. This project helps every house in various
ways. It helps a lot in creating and renewing the ID card, and gathering
service payment at the desired timings.
Entrance by ID Card System describes a technique used
to control entrance from main gate into a house. The area has a limited entrance. For
maintaining access control to a plurality of high-security zones by at least
one controlled door, RFID card can be used to access control system through ID
card
to entrance from main gate by authorized users. It helps in finding easily any
events in this area because information is recorded about any person who wants
to be checked in. So, for the quick completion of their entrance without
standing in long queues and waiting for checking control officer, this method
can be utilized.
In
my country because there is an increase of foreign peoples and mixed peoples in
the cities, I have created a database to control all people at entrance to this
area and record information detail about any person and match data. To avoid and decrease any unwanted accident
like a crime or burglary and finding them out easily to decrease and less events
such as killing and accidents, we need to support more safety for people in
this area and make the people of this area feel safer.
Everyone
can enter the city and that is not good for their security. Hence, if anything
has happened, it is not possible to find the person responsible for it. When
the database was not being utilized, it took a significant amount of time in
warning the people. Therefore, collecting the money for the service was quite
difficult. In addition to it, notification was difficult as well. Anyone could
enter the city and gain access to a specific house and control unit wouldn’t
even know about it.
The
System is very flexible when it is implemented and it manipulates data about (Members,
Houses or Accomodation , Persons, Payments, Entrance, Send Notification (Send
SMS to Mobile), Visitors, Settings, find person by ID Card or House Number,
renew ID card, create new ID card, view report, view due date of ID card, Find
by ID card. house number, car number , every house how many ID Card using to
entrance and Insert, edit, delete , view).
1.1 Existing
System of Designing a securable city house Access Control System through ID
Card
Manual
processes are utilized in the existing system as manual records are used for
receiving data and information from individuals. Records are filled manually as
well and there are separate workers that maintain the databases. In the manual system, searching for some
specific information is the time-consuming exercise. A number of registers are
being maintained.
A
detailed study of the existing system function, current system structure, and
user requirements are determined by studying the system.
Today,
we have different access control systems available in which RFID technology is
one of the systems being used worldwide. Radio
frequency identification (RFID) technology is a smart tracking system.
Previously, ID card were used for access control system. But
there were some drawbacks in the methods mentioned above. For instance, keys,
tokens, and cards can be forgotten, misplaced, and even duplicated.
But
I am using ID card, house number, and image of the persons. Any person that has
been checked-in either by ID card, house number will be matched data by
security gates with City House Access Control System through Identity card. So,
I am using SMS API to send SMS to mobile for notifying people.
I write by
myself of Designing a securable city house Access
Control System through ID Card
If
a person has lost his ID card, a notification will be sent to the administrator
who will be deactivate the ID card from the database. If the ID card is broken or damaged, the card
will not be able to function properly. Thus, a new ID card will be created by
the admin. If the person is wanted by police then he will not be capable of
entering the city.
If
the ID card is expired or it is due date, the person cannot gain entrance from
main gate to the city.
In
this project, I add a list of visitors, you can add a person to the list of visitors
online before visiting the admin.
You
can use more than one ID card for a house and bring payment of services.
An
important role will be played by this system in decreasing the time needed for
retrieving, processing, and storing in a much quicker and more efficient manner.
1.2
Proposed System of Designing a securable city house Access
Control System through ID Card
The
manual system will be replaced by the computerized system utilized in the
entrance running. The time required in processing and storing will be decreased
by this system. So, identifying every people of the city will become easier.
The main objective of the existing system is concerned
with providing a convenient and quick access to authorized people while
restricting access to people who are not authorized with the use of ID card and
for improving the purchase speed with the use of ID
card. The system, which is proposed, now computerizes all the details that
are maintained manually. It is cost saving and offers increased efficiency,
updated data, minimizes losses, no data manipulation, and flexible fee
structure.
1.3 The Aim of Access Control System through Identity
card
For
facilitating people to complete the entry process through ID card and bring
payment of services, send SMS directly from the database to someone who doesn’t
renew their cards and tell them that they need to renew their cards, setting
(change main labels, city name, mobile number, email, address, and text of SMS),
generate report, invoices. Database security, we are using some ways to secure
database from attacks and hacks. Implement
strong electronic visitor registration with list database checks.
1.4 Advantage of Designing a securable city house Access
Control System through ID Card
1
ID card help us to identify each
person in every house and ease the entry and exit process for people of this
place.
2
Creating new ID card for every person
in house and for house with the use of a unique number to entrance in the gate.
3
Gathering payment service cycle and renewing
ID card yearly. When renewing an ID card of a house, renew all ID cards of a
house.
4
If a person his ID card invalid, and
will be show all persons the ID card is invalid and send SMS to his/her mobile
to renew his/her ID card.
5
Keep and saving all records on the
database are maintained safely, and encrypted data safe where attackers can’t get
access to it
6
Generate invoice and view reports for
every house how many ID card using to entrance? and how many times entrance to
city house every day
7
Easy attendance recording and send
notification when the ID card is invalid.
8
Very easy to modify to substitute
your logo’s, main labels, city name, mobile number, email, address and text of
SMS and settings
9
Is incredibly quick and easy to use
and no fear of losing the data.
10
Lets you use photos and provides one
button to export all of the data to Excel [4]
3- RFID card as an
entrance card
RDIF or Radio-frequency
identification is actually a technology which utilizes radio waves for
transferring data through a reader for the objective of tracking and
identifying the objected from an electronic tag.
·
Contactless RFID cards are mostly utilized
in entrance systems. In comparison with an RFID card,
·
There are many users and they are changing
at a significant pace.
·
The importance of security is high: quite
different from the RFID cards. It is not possible to copy the ID cards.
·
In comparison with a manual system, RFID
is more efficient and superior.
·
With the use of RFID readers, RFID tags
can be read and interrogated quickly [5].
This database comprises
of three parts Admin and User.
1- Admin Login of Designing a securable city house Access
Control System through ID Card
Is responsible for security and
integrity of data and allows creating users, assigning passwords. The main
admin can login to database and can access to insert , Edit , delete , view for
table (city, Project name, zones ,
Accommodation type , Tower Name, Floor , Accommodation Number , Add Person for
Accommodation , status ID card) and (view entrance from main gate for every user per house or per apartment ,
view reports , send notification or send
SMS, change Setting and import and
export data to Excel Files , find by ID card and house number, create invoice
to payment services, how many houses are now is empty? )
2- User Login of Designing a securable city house
Access Control System through ID Card
Can access anywhere anytime login to self-account, can
easily add record to database want to visit him and write to taxi service to
come and enter city by ID card.
When you create new account from admin and create user
name and password, you receive email from the database and you must confirm to
Active the account.
When you login to your account you can,
-
Send notification
when you lost or damage ID card.
-
view notification
from admin
-
view payment
service
-
add visitor name
and date and time
-
add notification
when move (change) your house or accommodation
3- Control Point (Entrance from (Main Gate )
Manage
unlimited gate (door) and share or revoke access.
Make
sure that people with authorization gain access to different facility areas. In
this manner, security can be ensured and it can be monitored who is accessing
which part of the facility. It is widely used in specific area or zones,
Airports etc. Access control systems were typically administered in a central
location.
-
Every people or user entrance to the zone or city house by his ID card,
So every people or user live in the
city or accommodation can entrance (check in ) by using his ID Card , when check in to the city , records information about (full name , accommodation number , date and time and
gate number)
-
With an access control system in place, you are able to control who is allowed
to enter designated areas and closing that off to only a few people also limits
the ability to get into any unwanted accidents.
-
display image of username and view
notification and view how many time send SMS to this person
1- City Name of Designing a securable city house Access Control
System through ID Card:
Generally,
a city refers to human settlement in a specific boundary. In other words, it is
a densely and permanently settled place with defined boundaries who people and
members work on non-agricultural basis on a primarily basis. Usually, cities
have detailed and extensive systems of communication, land use, utilities,
sanitation, transportation, and housing.
2- Project Name of
Designing a securable city house Access Control System through ID Card
It
can be said that a project name is an identification form for scratch projects.
People are able to understand it easily. Then, associated with that number is
the project name. A project's number is used for identification. Project Name
such as (Italy City, Korean Village, English Village, Warin City ..........)
3- Zone
Is
an area, region or section or stretch of land which is used or restricted for a
specified purpose? Usage a space between two areas. Zone is used to mean any
area that is separated from another. An example of a zone is an area where the
typical accommodation and towers to grow well there where construction is
happening. Zone such as (Zone A, Zone B, Zone C, Zone D ……….)
As
adjectives the difference between zonal and regional
is
that zonal is divided into zones while regional is of, or pertaining to, a
specific region or district.
4- Types of accommodation
It
wouldn’t be wrong to say that making a room refers to accommodation. In other
words, it refers to a place or room where a person will stay or share it with
someone. Always remember that accommodation is an accommodating word. There are
many different types of accommodation with each providing various and
facilities and different experience such as (House, Villa, Apartments, Hotel,
and Hostel).
Private
Home
In
general, a private home is not dedicated for the occupation of different people
such as guests. However, it is available temporarily for being rented out by
tourists. Basically you stay in someone else’s house.
5-
Tower Name of Designing a securable city house Access
Control System through ID Card
Meanwhile,
a tower refers to a tall structure. Its length is more than its width and its
masts distinguishes it which has a lack of guy-wires. Therefore, they are
self-supporting structures other than being tall buildings. Tower Name such
as (Tower A, Tower B, Tower C …..)
6-
Floor of Designing a securable city house Access Control System through ID Card
Every
tower includes some floors. Generally, a floor refers to a room’s bottom
surface. Floors also refers to building levels. The ground floor refers to the
floor at the level of surrounding ground or level in BrE. The
highest level of a building: The penthouse apartment is on the top floor
7-
Apartments of Designing a securable city
house Access Control System through ID Card
In general, an apartment house or apartment block
contains more than an individual dwelling unit. The majority of them are
created for domestic use. And it can be applied generally to any residential
unit present within a building. A house can be a building as well.
Self-Made Figure
This project we can use for accommodation in zones or specific area in
the city of society
Designing a
database is very easy and relationship between six drop dawn
combox box,
First time choose city name in combox box like (Erbil, Duhok,
Elazig,Trbzon, ……………)
When you select any city view relatives project names of this
city in second combox box like (Nobel City, Italian City, English Village………..)
When you select any project name view relatives zones of this
project name in third combox box like (A, B, C,…….)
When you select any zones view relatives type accommodation of this
zones in fourth combox box like (House,
Apartment ,
Villa )
When you select any type accommodation view relatives tower name of this
type accommodation in fifth combox
box like (A1, B1, C1, ………… )
When you select any tower name view relatives floor number of this tower
name in six combox box like (1, 2, 3, 4, …………)
------------------------------------------------------------------------
State of the Industry of Designing a securable city house Access
Control System through ID Card
Generally, it is
considered very important control access within and to the manufacturing plant
while securing the automation systems and information from external breaches
whether they are logical or physical. The development of automation systems
serves to stabilize the lighting and climate of a facility while processes and
machines are controlled by equipment automation systems.
When it comes to the management of access, every single person is a stakeholder
from security managers and facility to personnel in corporate suite, IT,
training, purchasing, inventory, engineering, maintenance, and operations.
Part 1,
In general, new developments and innovations in Industrial Access
Identification and Control involves arguments and discussions of new trends in
the control of access which are changing the role of authority played within a
firm. The ways are also highlighted by it in which access control processes are
being streamlined by employee badge solutions along with improvements in risk
management.
Part 2,
When it comes to choosing the right solution for Industrial
Access Control, key considerations offer a practical guide for the evaluation
of four important methodologies of access control which are being utilized at
present including discussions about drawbacks and benefits of each methodology.
With an introduction to readers and badges associated with RFID access control,
this paper is concluded.
What
is the ID number?
Some
e-services will ask you to enter a personal code or a national identification
number when you want to log in using Smart-ID. The identity number is printed
on all of your national identification documents, such as your ID-card,
passport, and residents permit etc. It is usually either next to or below your
name or your birth date. Its objective was concerned with identifying people
for social security purposes. However, it is utilized for tracking people with
the purpose of taxation.
ID
cards of Designing a securable city house Access Control System through ID Card
Id
card is the unique identity of that particular person which a person holds. A
card identifying data about a person and ID cards typically include an name,
photograph, date of birth, job title, address. It has made it easier to
identify employees and visitors while enhancing the security and integrity of
an organization. for use as identification at a place of employment, access
control system to provide entrance to a location , students in school and
colleges, etc. to making quick personal identification a snap.
Benefits
of ID card
Identification
cards is a great benefit. ID card systems can help you create personalized
badges and cards for employees, students, attendees, visitors, and anyone else
you can think of. The ability to create on-the-spot ID cards allows your
organization to have a greater sense of security, accountability, and
efficiency. Customer services and
response can be improved by an ID card if it is utilized in organizing and
accessing customer information. When customers and business have familiarized
with each other, the trust level allows transactions to be completed in a
smooth and quick manner.
Following
are some benefits which can be experienced by a person if ID card system is set
at the location’s entrance.
1.
Increased
Security
2.
Ease of Use
3.
No Guesswork
4.
Easy to Replace Cards
5.
Great Option for Rewards Programs
What
is the full form of ID?
ID
stands for Identity document, any document used to verify a person's identity.
Identifier, a symbol which uniquely identifies an object or record.
Identity
documents in the United States are typically the regional state-issued driver's
license or identity card, while also the Social Security card and the United
States Passport Card may serve as national identification.
Why
do we need ID cards?
The
most common use of an ID card is to verify that the person holding it is indeed
who he claims to be. You can then use it to match any additional information he
gives you such as the address on an application form. These cards typically
identify the issuing body and include a picture of the holder, so you can
visually match his face.
1.
Some corporate ID card solutions use ID cards that
work as smart cards are also used to control access to certain buildings.
2.
Some of the most important government ID card
solutions include driver’s licenses, national IDs, Military badges, community
center ID’s.
3.
Education ID card solutions in universities
usually consist of using student and staff ID’s as smart cards for cash-free transactions.
4.
Though most public transportation options
allow customers to pay with cash, many of them have introduced transit ID cards
that can have cash loaded onto them.
5.
Healthcare ID card solutions can include ID
cards and smart cards that have a wide range of purposes including: speeding up
the patient registration process, tracking patient billing, and accurate record
keeping.
How to protect of hack
database
The
utilization of VPN is recommended as it implements another security layer.
When
a VPN is used for sharing a database, a network is made among the connection of
computers. A virtual network is made by them when computer connect through the
internet and with security of that connection, a VPN is established. It can be
said that VPN is similar to a LAN in several ways.
The
utilization of an offshore VPN is capable of helping the user in hiding his
real identity. You will see the VPN server’s IP instead of your own IP address
whenever you visit a website. And in most of the VPN services, there is sharing
among users which makes it quite difficult for your identity to be disclosed.
1-
install an anti-virus,
anti-malware, and firewall
2- you should make sure port 3306 is blocked in your firewall,
3-
Change database root password and
edit that file accordingly.
4-
I encrypt password of user
5-
Backup data in MySQL database automatically every
day. Backups will save you from any of the
problems mentioned above
If your site stores its sensitive data
in a MySQL database, you will most definitely want to backup that information
so that it can be restored in case of any disaster. There are many tools that
you can use to sync backups to a network location.
-----------------------------------------------------------------
If the database is hacked we Recovery
Backups as soon as possible