You are on page 1of 16

ABSTRACT

ARCHITECTURE
Smart Security

JUNE 11, 2021


INNOTECH
19, Falcon Street
Contents
1.0 Use Case Diagrams....................................................................................................................2
1.1. Site Owner UCD.....................................................................................................................2
1.2. Security Company UCD..........................................................................................................2
1.3. Security Supervisor UCD........................................................................................................3
1.4. Security Response Team UCD................................................................................................3
1.5. Guard UCD.............................................................................................................................4
1.6. Input Fingerprint UCD............................................................................................................4
2.0. Use Case Specifications...................................................................................................................5
Table 1: Use Case Specification for Register......................................................................................5
Table 2: Use Case Specification for Log In..........................................................................................6
Table 3: Use Case Specification for Manage Staff..............................................................................7
Table 4: Use Case Specification for Sign Out......................................................................................8
3.0. Class Diagram.................................................................................................................................9
4.0 Activity Diagram............................................................................................................................10
4.1 Site Owner.................................................................................................................................10
4.1.1 Site Owner (With Security Company).................................................................................10
4.1.2 Site Owner (With Private Guard)........................................................................................10
4.2 Security Admin...........................................................................................................................11
4.3 Security Supervisor....................................................................................................................12
4.4 Security Response Team............................................................................................................13
4.5 Guard.........................................................................................................................................13
5.0 Entity Relationship Diagram (ERD).................................................................................................14
1.0 Use Case Diagrams
1.1. Site Owner UCD
1.2. Security Company UCD

1.3. Security Supervisor UCD


1.4. Security Response Team UCD

1.5. Guard UCD


1.6. Input Fingerprint UCD
2.0. Use Case Specifications

Table 1: Use Case Specification for Register


Use Case Name Register

Summary Allow user to register to use the system

Actor(s) Site Owner, Security Admin

Preconditions Webpage must be loaded

Post Conditions User is redirected to Homepage

Attribute Priority Very High

Main Scenario Step Attribute

1 User clicks “Sign Up” and is


redirected to Sign Up page
2 User inputs valid details in
relevant fields
3 User clicks “Sign Up” Button

Alternative Flow In the case User inputs invalid information,


the input validators of the website will show
error messages based on the scenario.
Table 2: Use Case Specification for Log In
Use Case Name Login
Summary Allows all users to access the system
Actor(s) Site Owner, Security Admin, Security
Supervisor, Security Response Team, Guard
Preconditions Webpage must be loaded
Post Conditions
Attribute Priority Very High
Main Scenario Step Attribute
1 User clicks “Sign In” and is
redirected to Sign In page
2 User inputs valid details in
relevant fields
3 User clicks “Sign In” Button

Alternative Flow In the case the user inputs invalid


information, the input validators of the
website will show error messages based on
the scenario.
Table 3: Use Case Specification for Manage Staff
Use Case Name Manage Users
Summary The Security Admin can create, read, update
and delete Supervisor and Guard from the
system.
Actor(s) Security Admin
Preconditions Security Admin is Logged into the system
as well as on Dashboard.
Post Conditions New user is registered to system
Selected user details are modified
Selected user details are removed/deleted
Attribute Priority Medium
Main Scenario Step Attribute
1 Security Admin must go to settings
and click “Staff”
2 Security Admin clicks on user they
want to edit
3 Edit page for the user opens up
4 Security Admin performs required
task
Alternative Flows
Table 1: Use Case Specification for Sign Out
Use Case Name Sign Out
Summary User is able to terminate session
Actor(s) Site Owner, Security Admin, Security
Supervisor, Security Response Team, Guard
Preconditions User must be logged into system
Post Conditions
Attribute Priority Medium
Main Scenario Steps Attributes
1. Click “Log Out”
button
2. System will display
“Are you sure?”
3. Click “Sign Out”
button
Alternative Flow _
3.0. Class Diagram
4.0 Activity Diagram

4.1 Site Owner


4.1.1 Site Owner (With Security Company)

4.1.2 Site Owner (With Private Guard)


4.2 Security Admin

4.3 Security Supervisor


4.4 Security Response Team

4.5 Guard
5.0 Entity Relationship Diagram (ERD)

You might also like