Today, mobile-based authentication to verify a person’s identity is common. Online service providers often use it for access to services, approval of transactions, or to change a user’s credentials. Imagine using a similar mobile-based authentication to enter your home, office, or any private space. It’s possible. In this project, we’ll design a mobile-based access system…