security identification system

41
 Security Identification System

Upload: nimy-alexander

Post on 07-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 1/41

 Security Identification System

Page 2: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 2/41

 P roject coordinators:

 Smt. Anju J 

 Smt Mala J B

 P roject Guide:

 Sri. Sumesh. M 

Page 3: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 3/41

Page 4: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 4/41

� The controller includes comparative software that determines a correlation between the first and second 

references to identify at least one discrepancy therebetween, if an intrusion is detected an alert is send to theadmin and also it records the intervened area.

� The software can be implemented by scheduling the

hours into restricted and working hours.

�  In the working hours, if any intrusion happens no alert is send as it is the non restricted hour, whereas inrestricted hours,if any intrusion happens an immediatealert is send to the admin via messages , that something intruded into the system.

Page 5: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 5/41

 Module Description

 ±  REGISTRATION AND BASE IMAGE 

 SETTING 

 ±  IMAGE COM  P  ARISON 

 ±   ALERT MESSAGE 

Page 6: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 6/41

 REGISTRATION AND BASE IMAGE 

 SETTING 

�  In this module, the admin can register into the system and thus he will get 

authenticated.

� The existing admin can register newadmin and employee details, and he can

update, delete, or can reset his owndetails and employee details.

� The admin also sets the base image

Page 7: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 7/41

 Inputs

� Username and password 

Page 8: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 8/41

Processing If (username= = uname && password = = psword)

 Message ³Admin is authenticated´ 

add_new()

search_detail().update_detail().

delete_details().

reset_detail() .

set_baseimg()

 Else

 Message ³Invalid user´ 

 End if 

Page 9: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 9/41

 

Read Admin username

and password 

 No If (username Yes

==uname &&

Password==psword)

  New Admin

Authenticated updated deleted resetted 

Set base image

updation New admin/ 

employee

deletion reset Set base

image

Start

stop

Flow chart

Page 10: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 10/41

Outputs

�  Authentication of admin.

� Updating, deletion or resetting of detailsof admin and employees

�  Setting of base image.

Page 11: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 11/41

 IMAGE COM  P  ARISON 

�  In this module, whenever the camera

captures an image, it is considered as anintrusion and compares it with the base

image which is already set.

Page 12: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 12/41

 Inputs

�  Image captured by the web camera.

Page 13: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 13/41

Processing

 If ( base_image != captured_image )

 Message ³intrusion detected´.Compare(base_image, captured_image)

 Stores intruded portion to the data base.

 Else

 No intrusion detected.

 End if 

Page 14: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 14/41

 

Captured image

  No If (base_image Yes!= captured_image ) 

 No intrus ionIntrusion stored 

stop

Start

Flow chart

Page 15: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 15/41

Outputs

�  Detect whether intrusion happens or 

not.

Page 16: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 16/41

 ALERT MESSAGE 

�  In this section, an alert message is send 

to the admin and employees in restricted 

hours, if any intrusion is found to be

happen while image comparison.

� The alert messages send to the mobiles

through GSM and to the systems which

will be open at that time through the

 RMI protocol.

Page 17: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 17/41

 Inputs

�  Recognition of interruption.

Page 18: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 18/41

 P rocessing  If (any intrusion happens)

 If (restricted hour)

 Intruded area is stored in the database An alert message is send to the admin and 

 Employees, via GSM to the mobiles and 

 RMI to the systems which are open

 Else

 Intruded area is stored in the database. End if±else

 End if 

Page 19: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 19/41

 

Detected 

Intrusion

  No Yes

If (restricted hour)

Alert Mess age Send 

stop

start

Flow chart

Page 20: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 20/41

Outputs

�  Alert message is send.

Page 21: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 21/41

Security Identification System

Security

Identification

System

USE CASES AND USECASE DIAGRAMS 

 MAIN USECASE DIAGRAM:

 Admin

Page 22: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 22/41

 

Admin Admin

 

Security Identification System

<< include >> 

<<

<< include >> 

RegisterAdminAndE

mployeeDetails

SearchAdminAndEmployee

 

DeleteAdminAndEmployeeDetails

UpdateAdminAndEmployeeDetails

ResetAdminAnd

EmployeeDetails

 ADMIN AND EM  P  LOY DETAILS USECASE DIAGRAM 

Page 23: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 23/41

Use case: Register  inAndEmployeeDetails

ID: 1

Br ief descr iption:

The admin enter s the details of new admin or a new employee

Pr imar y actor s:Admin

Secondar yactor s: None

Pr econditions:The admin has logged onto the system

Main f low:1.The admin selects ³r egister´2. The admin enter s the details of new admin or new employee.3. The system cr eates a new admin or a new employee

Postconditions:A new admin or employee has been r egister ed.

Alter native f lows:Admin or employee alr eady exists

Page 24: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 24/41

Page 25: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 25/41

Use case: UpdateAdminAndEmployeeDetailsID: 3

Brief description:

The admin updates his details or details of employees.

Primary actors:

Admin

Secondary actors:

 None

Preconditions:

The admin has logged onto the system

Main flow:

1. The admin first search details.

2. The admin then selects ³update´.

3. The admin updates his details or details of employees.

Postconditions:

Details have been updatedAlternative flows:

 None

Page 26: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 26/41

Use case :DeleteAdminAndEmployeeDetailsID: 4

Brief description:

Delete admin details or employee details.Primary actors:

Admin

Secondary actors:

 None

Preconditions:

The admin has logged onto the system

Main flow:

1. The admin first searches details.

2. The admin then selects ³delete´

3. The admin deletes his details or employee details.

Postconditions:

The admin or employee details have been deleted.

Alternative flows:

 None

Page 27: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 27/41

Use case: ResetAdminAndEmployeeDetails

ID: 5

Br ief descr iption:

Resetsadmin or employee details.

Pr imar y actor s:

Admin

Secondar yactor s:

 None

Pr econditions:

The admin has logged onto the system

Main f low:

1.The admin selects ´r eset´

2. The admin enter s details.

3.The details has been r eset

Postconditions:

The admin or employee details has been r eset

Alter native f lows:

 None

Page 28: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 28/41

 

Admin

 

Time

Security Identification System

SetBaseImage

CompareImages

 IMAGE COM  P  ARISON USECASE DIAGRAM 

Page 29: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 29/41

Use case: SetBaseImage

ID:6

Br ief descr iption:

The admin sets the base image.

Pr imar y actor s:

Admin

Secondar yactor s:

 None

Pr econditions:

1. The admin has logged on to the system.

Main f low:

1.The Admin selects ³set base image¶.

2.The web camer a captur es an image.

3.The base image has been set.

Postconditions:

A new base image has beenset.

Alter native f lows:

 None

Page 30: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 30/41

Use case: Compar eImages

ID:7

Br ief descr iption:

The newly captur ed image compar es with the base image that has alr eady set.

Pr imar y actor s:

Time

Secondar yactor s:

 None

Pr econditions:

Web camer a captur es an image.

Main f low:

1. The web camer a captur es an image .

2. The image compar ison algor ithm invokes.

3. The newly captur ed image compar es with base image.

3.1.If ( base_image != captur ed_image )

3.1.1.Intusion detected

3.1.2. Stor es intr uded por tion to the data base.

3.2. Else

3.2.1. No intr usion detected.

Postconditions:

Detected intr usionhappens or not.

Alter native f lows:

 None

Page 31: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 31/41

 

Time

InvokeGSMkit/RMIServer 

SendingMessage

Security Identification System

 ALERT MESSAGE USECASE DIAGRAM 

Page 32: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 32/41

Use case: InvokingGSMkit/RmiSer ver 

ID:8

Br ief  descr iption: The aler t messages send to the mobiles thr ough GSM and to the

systems which will be open at that time thr ough the RMI pr otocol.

Pr imar y actor s:Time

Secondar yactor s:None

Pr econditions: an intr usion is detected

Main f low:

1. If (any intr usion happens)

1.1 If (r estr icted hour )

1.1.1Intr uded ar ea is stor ed in the database

1.1.2.An aler t message is send to the admin and

1.1.3 Employees, via GSM to the mobiles and RMI to the systems which ar e open

1.2Else

1.2.1Intr uded ar ea is stor ed in the database.

Postconditions:aler t message send or not

Alter native f lows:

 None

Page 33: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 33/41

Use case: SendingMessage

ID:9

Br ief descr iption:

The aler t message sends to admin and employees.

Pr imar y actor s:

Time

Secondar yactor s:

 None

Pr econditions:

Detectionof intr usion.

Main f low:

1. The aler t message sends to the admin or employees.

Postconditions: None

Alter native f lows:

 None

Page 34: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 34/41

 

Username

Password

Administrator  SecurityIdentification

System

 DATA FLOW DIAGRAMS 

 DFD-LEVEL 0

Page 35: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 35/41

 

Username

PasswordAdministrator Admin PageLogin

 DFD-LEVEL 1

Page 36: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 36/41

 

Register table

Base table

Base table

Image table

Registration

process

Admin

Send alert

messa e

Searching by

date

Set base image

Image

comparison

Login

 DFD-LEVEL 2

Page 37: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 37/41

 

Admin Login registration

Image

comparison

Send message

 by GSM or RMI

Resetsearch

delete

addupdate

Search images

via date

Set base image

 DFD-LEVEL 3

Page 38: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 38/41

Login

+ uname:varchar

+psword:varchar

- Login()

Admin

+ Name:varchar

+Uname:varchar

+Psword:varchar

-Role:varchar

-DOB:date

-Age:number

-Address:varchar

+Phoneno:number

+Emailed:varchar

-Register()

-Search()

-Update()

-Delete()

-Reset()

Server

+id:integer

+imdate:date

-image: medium blob

-Setbase image()

-Compare()

Search

+Fromdate:date

+Todate:date

-View()

Message

+Mid:number

-Symid:varchar

+Mssgmob()

+Mssgsystem()

CLASS DIAGRAM 

Page 39: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 39/41

 Sd: AdminAndEmployeeRegistration

Admin

login(username, password)

authenticate (username, password)

register()

search()

update() delete() reset() 

setbaseimage(bid,imid) 

: Details: Login : Image

 SEQUENCE DIAGRAMS 

Page 40: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 40/41

 Sd: CompareImageAndSendAlertMessage 

Time

compare(bid,imid)

if (!equal)

: Server  Message: Alert

Message

Page 41: Security Identification System

8/4/2019 Security Identification System

http://slidepdf.com/reader/full/security-identification-system 41/41

Thank you

 P resented by

 Abdul shukkoor A

 NimmyRaju

 Nimy Alexander 

 Syama u