Sign In to Follow Application
View All Documents & Correspondence

A Device To Detect Tampering With A Smart Lock Cable

Abstract: ABSTRACT A DEVICE TO DETECT TAMPERING WITH A SMART LOCK CABLE The present disclosure discloses a device to detect tampering with a smart lock cable. The device(100) comprises a device (100) to detect tampering with a smart lock cable, a lock(102) comprises a first lock section(102a) and a second lock section(102b); a cable(104) with a connector end(104a) and a terminal end(104b); a controller(106) to communicate with a remote server(108); analyze real-time changes in resistance data to detect tampering; a data collector module(106b) to record resistance data in real-time; a transmitter module(106c) to transmit resistance data and tampering alerts at predefined intervals or upon detecting an anomaly; a triggering module(106d) to analyze resistance data to determine conductivity across the cable(104); detect tampering events based on deviations; generate an alarm notification upon detecting a tamper event; communicate the alarm to an operating device(110); a quick response (QR) code(112) encoding lock data, metadata, and a unique security token to enable secure authentication and interaction.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 February 2024
Publication Number
11/2025
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

SEPIO PRODUCTS PRIVATE LIMITED
201, 2nd Floor, Plot No. 48, Service Road, Western Express Highway, Near Hanuman Temple, Vile Parle East, Mumbai- 400057, Maharashtra, India

Inventors

1. NORONHA, PAUL ABNER
301 Seville, 3rd Domnic Colony, Orlem, Malad West, Mumbai-400064, Maharashtra, India
2. GANDHI, DARSHAN DHRUMAN
105 Woodstock Building, JP Road, Seven Bungalows, Andheri West, Mumbai-400061, Maharashtra, India
3. KAMAT, DATTAPRASAD NARAYAN
102 Trimbak Sadan, 5th Ajmal Road, Vile Parle East, Mumbai-400057, Maharashtra, India
4. NATHANI, MURAD
Ashiana Bullock Road, Bandstand Bandra, Mumbai-400050, Maharashtra, India

Specification

DESC:FIELD
The present disclosure generally relates to the field of detection and alerting devices. More particularly, the present disclosure relates to a device to detect tampering with a smart lock cable.
BACKGROUND
The background information herein below relates to the present disclosure but is not necessarily prior art.
The current methodology for epilepsy detection heavily relies on observing frequently occurring changes in brain function, particularly among women and children. Such anomalies can distort the three-dimensional understanding of brain activity, leading to epilepsy a condition characterized by abnormal brain activity, resulting in seizures, unusual behaviour, sensations, and sometimes loss of consciousness. However, these systems often overlook additional parameters that could enhance Anti-epileptic Drug (AED) prediction, thereby potentially reducing episodes of loss of consciousness. Many epilepsy detection systems incorporate ECG signal features for analysis, aiming to identify epilepsy through patterns of brain abnormality.
A crucial aspect of diagnosing a patient who has experienced a loss of consciousness is determining whether the episode was due to a seizure or syncope. Fortunately, with current AED therapies, up to 80% of patients with new-onset epilepsy achieve complete seizure control, and about 60% remain seizure-free even after discontinuing AEDs. Nonetheless, the limitations of existing detection systems include reliance on ECG signals, the necessity of cloud-based data processing, a narrow scope of application, limited data on patient episodes, and the challenge of choosing an initial AED that not only fully controls seizures but is also well-tolerated, safe over the long term, and user-friendly.
There is, therefore felt a need for a device to detect tampering with a smart lock cable that alleviates the aforementioned drawbacks.
OBJECTS
Some of the objects of the present disclosure, which at least one embodiment herein satisfies, are as follows:
An object of the present disclosure is to provide a device to detect tampering with a smart lock cable.
Another object of the present disclosure is to provide a device with firmware that operates with the Internet or without the Internet.
Still another object of the present disclosure is to provide a device with a global positioning sensor for tracking live positioning and transmitting to the server.
Yet another object of the present disclosure is to provide a device with memory to store instructions, commands, and real-time data.
Still another object of the present disclosure is to provide a device for measuring the resistance value in real-time.
Yet another object of the present disclosure is to provide a device to prevent tampering attempts by shorting the cable.
Other objects and advantages of the present disclosure will be more apparent from the following description, which is not intended to limit the scope of the present disclosure.
SUMMARY
The present disclosure envisages a device to detect tampering with a smart lock cable. The device comprises a lock, a cable, a controller, and quick response (QR) code.
The lock comprises a first lock section and a second lock section.
The cable with a connector end and a terminal end, wherein the connector end is operatively coupled to the first lock section and the terminal end is operatively coupled to the second lock section.
The controller is operatively connected to the lock and configured to communicate with a server via a communication interface, monitor resistance data across the cable, and analyze real-time changes in resistance data to detect tampering.
The controller includes a data repository, a data collector module, a transmitter module, and a triggering module.
The data repository within the controller is configured to store lock details, live positioning data, threshold resistance parameters, and historical resistance data.
The data collector module is configured to record resistance data in real-time, store resistance data in the data repository, and filter noise to ensure accuracy in tamper detection.
The transmitter module is configured to transmit resistance data and tampering alerts to the server at predefined intervals or upon detecting an anomaly.
The triggering module is configured to analyze resistance data to determine conductivity across the cable, detect tampering events based on deviations from predefined resistance thresholds, generate an alarm notification upon detecting a tamper event, and communicate the alarm to an operating device.
The quick response (QR) code positioned on the lock encoding lock data, metadata, and a unique security token to enable secure authentication and interaction with the server.
In an embodiment, the controller comprises an electrical circuit to measure resistance changes using a configuration technique, wherein any tampering attempt results in an unbalanced bridge state.
In an embodiment, the communication interface includes indicators for lock status, including live GPS location, network connectivity (GSM), and tamper event notifications.
In an embodiment, the QR code further includes an authentication key to secure communication between the lock, the server 108, and the operating device.
In an embodiment, the device further comprises a power supply unit integrated into the lock 102, wherein the unit includes a power-saving mode to conserve energy during periods of inactivity.
In an embodiment, the data repository stores pre-calibrated threshold resistance values for different cable materials to enhance detection accuracy.
In an embodiment, the triggering module activates a visual or audible alarm integrated into the lock upon detecting a tamper event.
In an embodiment, the operating device comprises a user interface configured to display:
• real-time tamper status;
• historical tamper logs; and
• live location and lock status.
In an embodiment, the cable is constructed with known resistance values for standard lengths to facilitate accurate tamper detection.
In an embodiment, the server additionally analyzes resistance data transmitted from the controller 106 to notify users of tamper events, including time, location, and specific lock details.
In an embodiment, the device further comprises support for wireless communication protocols, including short-range communication (Bluetooth), long-range communication (LoRa), and cellular networks, to enable data transmission to the server.
In an embodiment, the lock is configured to detect and prevent tampering attempts involving cable shorting by analyzing resistance changes indicative of abnormal conditions.
The present disclosure also envisages a method for epilepsy detection. The method comprises the following steps:
• encoding lock data into a quick response (QR) code and positioning the QR code on a visible surface of a lock;
• securing a cable to a lock, wherein a connector end is coupled to a first lock section and a terminal end is coupled to a second lock section;
• measuring resistance data, in real-time, across the cable by a controller;
• comparing resistance data to predefined threshold values stored in a data repository;
• analyzing resistance changes to detect tampering, including cable cutting or shorting attempts;
• generating an alarm notification upon detecting resistance anomalies indicative of tampering;
• transmitting the alarm notification and associated resistance data to a server; and
• notifying a user via an operating device, wherein the notification includes time, location, and lock status.
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWING
A device to detect tampering with a smart lock cable of the present disclosure will now be described with the help of the accompanying drawing, in which:
Figure 1 illustrates a block diagram of a device to detect tampering with a smart lock cable in accordance with an embodiment of the present disclosure;
Figure 2A and Figure 2B illustrate a flowchart describing the method to detect tampering with a smart lock cable in accordance with an embodiment of the present disclosure; and
Figure 3A and Figure 3B illustrate the architecture of the device to detect tampering with a smart lock cable in accordance with an embodiment of the present disclosure.
LIST OF REFERENCE NUMERALS
100 - Device
102 - Lock
102a - First Lock Section
102b - Second Lock Section
104 - Cable
104a - Connector End
104b - Terminal End
106 - Controller
106a - Data Repository
106b - Data Collector Module
106c - Transmitter Module
106d - Triggering Module
108 - Server
110 - Operating Device
112 - Quick Response (QR) Code
114 - Communication Interface
DETAILED DESCRIPTION
Embodiments, of the present disclosure, will now be described with reference to the accompanying drawing.
Embodiments are provided so as to thoroughly and fully convey the scope of the present disclosure to the person skilled in the art. Numerous details, are set forth, relating to specific components, and methods, to provide a complete understanding of embodiments of the present disclosure. It will be apparent to the person skilled in the art that the details provided in the embodiments should not be construed to limit the scope of the present disclosure. In some embodiments, well-known processes, well-known apparatus structures, and well-known techniques are not described in detail.
The terminology used, in the present disclosure, is only for the purpose of explaining a particular embodiment and such terminology shall not be considered to limit the scope of the present disclosure. As used in the present disclosure, the forms "a,” "an," and "the" may be intended to include the plural forms as well, unless the context clearly suggests otherwise. The terms “including,” and “having,” are open ended transitional phrases and therefore specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not forbid the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The particular order of steps disclosed in the method and process of the present disclosure is not to be construed as necessarily requiring their performance as described or illustrated. It is also to be understood that additional or alternative steps may be employed.
When an element is referred to as being “engaged to,” "connected to," or "coupled to" another element, it may be directly engaged, connected, or coupled to the other element. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed elements.
Smart locks equipped with GPS and GPRS functionalities have emerged as cutting-edge solutions in the realm of security and access control. These locks offer real-time location tracking and event notifications, providing users with an unprecedented level of control and awareness over their secured spaces. However, the efficacy of these smart locks heavily depends on the robustness of their tamper detection mechanisms, especially concerning cable or shackle cutting attempts. Some models rely primarily on conductivity checks across the cable, a design choice that, while effective in principle, introduces vulnerabilities that can be exploited by sophisticated intruders.
The prominent challenge in the current generation of smart locks lies in the simplicity of their tamper detection systems, often limited to monitoring conductivity. This creates an avenue for attackers to manipulate the system by shorting the cable without triggering an alert. Moreover, users may be unaware of this potential vulnerability, leading to a false sense of security. The challenge is to bolster the tamper detection capabilities to a level where they remain reliable under various scenarios and thwart potential intruders who may exploit these weaknesses.
To address the challenges posed by the current vulnerabilities, a multifaceted approach to tamper detection is necessary. Incorporating resistance monitoring alongside conductivity checks is a pivotal step. This addition allows the system to detect nuanced changes in the cable's resistance, offering a more comprehensive and reliable tamper detection mechanism. Furthermore, the integration of multiple sensors, including temperature and vibration sensors, creates a layered defense against tampering. Dynamic resistance thresholds, randomized monitoring patterns, and a secure enclosure design collectively contribute to a more robust and adaptive tamper detection system. Regular security audits and firmware updates are crucial elements in ensuring that smart locks evolve with emerging security challenges, maintaining the integrity of the overall security architecture.
To address the issues of the existing systems and methods, the present disclosure envisages a device (hereinafter referred to as “device 100”) to detect tampering with a smart lock cable and a method (hereinafter referred to as “method 200”) to detect tampering with a smart lock cable. The device 100 will now be described with reference to Figure 1 and the method 200 will be described with reference to Figures 2A-2B.
The present disclosure envisages a device 100 to detect tampering with a smart lock cable. The device 100 comprises a lock 102, a cable 104, a controller 106, and a quick response (QR) code 112.
The lock 102 comprises a first lock section 102a and a second lock section 102b.
In an embodiment, the lock 102 is configured to detect and prevent tampering attempts involving cable shorting by analyzing resistance changes indicative of abnormal conditions.
The cable 104 has a connector end 104a and a terminal end 104b, wherein the connector end 104a is operatively coupled to the first lock section 102a and the terminal end 104b is operatively coupled to the second lock section 102b.
In an embodiment, the connector end 104a is operatively coupled to the first lock section 102a or second lock section 102b.
In an embodiment, the terminal end 104b is operatively coupled to the first lock section 102a or second lock section 102b.
In an embodiment, the cable 104 is constructed with known resistance values for standard lengths to facilitate accurate tamper detection.
The controller 106 is operatively connected to the lock and configured to communicate with a server via a communication interface 114, monitor resistance data across the cable, and analyze real-time changes in resistance data to detect tampering.
In an embodiment, the controller 106 comprises an electrical circuit to measure resistance changes using a configuration technique, wherein any tampering attempt results in an unbalanced bridge state.
In an embodiment, the configuration technique includes Wheatstone Bridge, Kelvin Bridge (Kelvin Double Bridge), Maxwell Bridge, Hay Bridge, Anderson Bridge, Owen Bridge, Schering bridge, Wien bridge and a combination thereof.
In an embodiment, the communication interface 114 includes indicators for lock status, including live GPS location, network connectivity (GSM), and tamper event notifications.
The controller 106 includes a data repository 106a, a data collector module106b, a transmitter module 106c, and a triggering module 106d.
The data repository 106a within the controller is configured to store lock details, live positioning data, threshold resistance parameters, and historical resistance data.
In an embodiment, the data repository 106a stores pre-calibrated threshold resistance values for different cable materials to enhance detection accuracy.
The data collector module 106b is configured to record resistance data in real-time, store resistance data in the data repository, and filter noise to ensure accuracy in tamper detection.
The transmitter module 106c is configured to transmit resistance data and tampering alerts to the server at predefined intervals or upon detecting an anomaly.
In an embodiment, the transmitter module 106c encrypts transmitted resistance data to ensure secure communication between the controller 106 and the server 108.
In an embodiment, the alarm notification is selected from the group of notifications including an audio, a visual, and a haptic notification.
The triggering module 106d is configured to analyze resistance data to determine conductivity across the cable, detect tampering events based on deviations from predefined resistance thresholds, generate an alarm notification upon detecting a tamper event, and communicate the alarm to an operating device.
In an embodiment, the triggering module 106d activates a visual or audible alarm integrated into the lock 102 upon detecting a tamper event.
In an embodiment, the server 108 additionally analyzes resistance data transmitted from the controller 106 to notify users of tamper events, including time, location, and specific lock details.
In an embodiment, the server 108 is selected from a group of servers consisting of a local server, remote server, cloud server, shared server, proxy server, and any server capable of performing the operation.
The quick response (QR) code 112 is positioned on the lock encoding lock data, metadata, and a unique security token to enable secure authentication and interaction with the server.
In an embodiment, the QR code 112 further includes an authentication key to secure communication between the lock 102, the server 108, and the operating device 110.
In an embodiment, the operating device 110 comprises a user interface configured to display:
• real-time tamper status;
• historical tamper logs; and
• live location and lock status.
In an embodiment, the device 100 comprises a power supply unit integrated into the lock 102, wherein the unit includes a power-saving mode to conserve energy during periods of inactivity.
In an embodiment, the device 100 supports wireless communication protocols, including short-range communication (Bluetooth), long-range communication (LoRa), and cellular networks, to enable data transmission to the server 108.
In an aspect, the microprocessor may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the microprocessor may fetch and execute computer-readable instructions stored in a memory. The functions of the microprocessor may be provided through the use of dedicated hardware as well as hardware capable of executing machine-readable instructions. In other examples, the microprocessor may be implemented by electronic circuitry or printed circuit board. The microprocessor may be configured to execute functions of various modules of the device such as the lock 102, the cable 104, the controller 106, and the quick response (QR) code 112.
Also, the device 100 or the microprocessor may include, or be coupled with, one or more transceivers to communicate with various devices coupled to the device 100 or the microprocessor.
The embodiments of the present invention relate to a tamper detection device 100 for smart lock systems. The device integrates a lock 102, a cable 104, a controller 106, and a server 108 to provide comprehensive tamper monitoring and security functionality.
In one embodiment, the physical configuration of the device 100 features a lock 102 comprising a first lock section 102a and a second lock section 102b, interconnected by a cable 104. The cable includes a connector end 104a coupled to the first lock section and a terminal end 104b attached to the second lock section. This configuration establishes a closed loop where the cable forms an integral part of the lock's security, allowing the system to monitor the cable for tampering.
In another embodiment, the controller 106 is operatively connected to the lock 102 and configured to monitor resistance data across the cable 104. The controller comprises multiple modules:
• a data repository 106a for storing lock details, historical resistance data, predefined resistance thresholds, and live positioning data.
• a data collector module 106b for recording and filtering real-time resistance data to ensure accuracy.
• a transmitter module 106c for sending resistance data and tamper alerts to the server 108.
• a triggering module 106d for detecting tampering events based on deviations from resistance thresholds, generating alarms, and communicating alerts to an operating device 110.
This modular architecture enables precise tamper detection, real-time data processing, and secure communication.
In yet another embodiment, the device includes a quick response (QR) code 112 embedded in the lock 102. The QR code encodes metadata such as lock details and a unique security token. Users can scan the QR code for secure authentication and interaction with the server 108. This feature enhances usability and security by ensuring that only authorized personnel can access the lock's data and controls.
In still another embodiment, the system continuously monitors resistance data through the data collector module 106b. Any deviations beyond predefined thresholds trigger the triggering module 106d to classify the event as tampering. An alarm is generated, and the transmitter module 106c sends alerts to the server 108 and the operating device 110. This embodiment ensures prompt detection and response to tampering events.
In yet another embodiment, the device leverages historical resistance data stored in the data repository 106a to adaptively refine its tamper detection capabilities. By analyzing historical trends alongside real-time data, the system improves accuracy and reduces false positives over time, enhancing its reliability and performance.
In a further embodiment, the device 100 uses a secure communication interface 114 to connect the controller 106 with the server 108. The transmitter module 106c ensures that tamper alerts and resistance data are transmitted securely, allowing remote monitoring and management. This embodiment supports centralized control and enhances scalability for use in larger smart lock networks.
Figure 2A and Figure 2B illustrate a flowchart describing the method to detect tampering with a smart lock cable in accordance with an embodiment of the present disclosure. The order in which method 200 is described is not intended to be construed as a limitation, and any number of the described method steps may be combined in any order to implement method 200, or an alternative method. Furthermore, method 200 may be implemented by processing resource or computing device(s) through any suitable hardware, non-transitory machine-readable medium/instructions, or a combination thereof. The method 200 comprises the following steps:
At step 202, the method 200 includes encoding lock data into a quick response (QR) code 112 and positioning the QR code on a visible surface of a lock 102.
At step 204, the method 200 includes securing a cable 104 to a lock 102, wherein a connector end 104a is coupled to a first lock section 102a and a terminal end 104b is coupled to a second lock section 102b.
At step 206, the method 200 includes measuring resistance data, in real time, across the cable 104 by a controller 106.
At step 208, the method 200 includes comparing resistance data to predefined threshold values stored in a data repository 106a.
At step 210, the method 200 includes analyzing resistance changes to detect tampering, including cable cutting or shorting attempts.
At step 212, the method 200 includes generating an alarm notification upon detecting resistance anomalies indicative of tampering.
At step 214, the method 200 includes transmitting the alarm notification and associated resistance data to a server 108.
At step 216, the method 200 includes notifying a user via an operating device 110, wherein the notification includes time, location, and lock status.
Figure 3A and Figure 3B illustrate the architecture of the device to detect tampering with a smart lock cable in accordance with an embodiment of the present disclosure. Figure 3A shows the front view of the lock 102 and Figure 3B shows the back view of the lock 102. Figure 3A shows the indicators of operating device 110 for indicating the status of the lock 102. The indicators include GPS for providing live positioning of the lock 102, GSM (network) for communication and transmitting data, and the Status of the lock which shows whether the tamper event occurs or not. Figure 3B shows that lock 102 has a pair of lock sections (holes) 102a and 102b for locking cable 104. The lock 102 checks the change in the resistance value to prevent tampering attempts by shorting the cable. The cable 104 with a connector end 104a and a terminal end 104b, wherein the connector end 104a is operatively coupled to the first lock section 102a and the terminal end 104b is operatively coupled to the second lock section 102b. The resistance data is transmitted in time intervals or continuously or in the event of detection of a tamper attempt (change of resistance) to the server 108 for processing. The device 100 provides real-time alerts in case of any tamper event, such as cutting the cable/ shackles. The device 100 measures the resistance (using Ohm law or Wheatstone bridge or any other method of measuring resistance) of cable 104 instead of simply checking for the conductivity of cable 104. The solution is applicable for any locking device/ seal that checks for conductivity across a cable to detect a tamper attempt.
In an operative configuration, the device 100 is a sophisticated tamper detection system engineered to enhance the security of smart lock cables. It integrates a lock 102, a cable 104, and a controller 106 that communicates with a server 108. The lock 102 consists of two sections: a first lock section 102a and a second lock section 102b, interconnected by a cable 104. The cable features a connector end 104a affixed to the first lock section and a terminal end 104b attached to the second lock section, forming the physical foundation for monitoring and detecting tampering attempts.
The controller 106 is the central component of the device, responsible for real-time monitoring and tamper detection. It employs a communication interface 114 to interact with the server 108 and monitors resistance data across the cable 104 to identify deviations that may indicate tampering. The controller's modular design includes a data repository 106a that stores lock-specific details, live positioning data, predefined resistance thresholds, and historical resistance records. This repository enables the controller to analyze real-time resistance data in comparison to historical and threshold values to detect anomalies accurately.
The data collector module 106b operates as the system’s real-time monitoring unit, recording resistance data and filtering out noise to ensure precision. The collected data is stored in the repository for further analysis. The transmitter module 106c facilitates communication by transmitting resistance data and tampering alerts to the server at predefined intervals or immediately when anomalies are detected. Meanwhile, the triggering module 106d evaluates the cable's electrical conductivity and identifies tampering events by analyzing deviations from the predefined resistance thresholds. When tampering is detected, it generates an alarm notification and communicates the alert to an operating device 110 for immediate action.
An additional layer of security is provided by a quick response (QR) code 112 embedded in the lock 102. This code encodes metadata, including lock details and a unique security token, enabling secure authentication and interaction with the server. Authorized users can scan the QR code to access detailed lock information and perform secure operations, thereby ensuring robust protection against unauthorized access or tampering.
The device operates seamlessly by continuously monitoring resistance data through the data collector module 106b and comparing real-time measurements with historical and threshold data stored in the repository. When significant deviations are detected, the triggering module 106d identifies the event as tampering, generates an alarm, and transmits the alert to the server and operating device via the transmitter module 106c. This device ensures prompt detection, alerting, and storage of tampering details for further analysis.
The device 100 represents a highly advanced and secure solution for tamper detection in smart lock systems. Its real-time monitoring, precise resistance analysis, modular architecture, and secure QR-based authentication provide robust protection against unauthorized access. With seamless communication to a server and comprehensive detection capabilities, the device ensures enhanced security for modern smart locks.
Advantageously, the device 100 offers significant advantages in ensuring the security and reliability of smart lock systems. By integrating real-time resistance monitoring with advanced analytics, it provides precise and immediate detection of tampering attempts, minimizing the risk of unauthorized access. Its modular architecture, comprising dedicated data collection, analysis, and communication modules, ensures efficient and accurate performance. The inclusion of a quick response (QR) code enhances usability by enabling secure authentication and interaction with the server, adding additional layer of protection. Furthermore, the system’s ability to store historical resistance data and predefined thresholds allows for adaptive learning, improving detection accuracy over time. Its real-time alerting and seamless communication with servers and operating devices ensure prompt responses to security breaches. Overall, the device’s combination of robust functionality, reliability, and secure interaction makes it an indispensable solution for safeguarding modern smart lock applications.
The functions described herein may be implemented in hardware, software executed by a processor, firmware, or any combination thereof. If implemented in software executed by a processor, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Other examples and implementations are within the scope and spirit of the disclosure and appended claims. For example, due to the nature of software, functions described above can be implemented using software executed by a processor, hardware, firmware, hardwiring, or combinations of any of these. Features implementing functions may also be physically located at various positions, including being distributed such that portions of functions are implemented at different physical locations.
The foregoing description of the embodiments has been provided for purposes of illustration and is not intended to limit the scope of the present disclosure. Individual components of a particular embodiment are generally not limited to that particular embodiment but are interchangeable. Such variations are not to be regarded as a departure from the present disclosure, and all such modifications are considered to be within the scope of the present disclosure.
TECHNICAL ADVANCEMENTS
The present disclosure described herein above has several technical advantages including, but not limited to, the realization of a device to detect tampering with a smart lock cable that:
• is scalable;
• minimizes response time and enhances overall security;
• ensuring accurate resistance measurements;
• provide high precision in identifying genuine tamper events while reducing false positives;
• easy troubleshooting, and scalability;
• supports centralized monitoring and management in distributed smart lock systems;
• detect resistance value and change in resistance value in real-time;
• generates alarms upon detecting tampering events and promptly communicates;
• scalable architecture makes it suitable for deployment in single installations or across large networks of smart locks;
• provides centralized control and real-time monitoring of multiple devices, enhancing operational efficiency in managing large-scale deployments;
• triggering the alarm in real-time; and
• detect tamper detection.
The embodiments herein and the various features and advantageous details thereof are explained with reference to the non-limiting embodiments in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
The foregoing description of the specific embodiments so fully reveals the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.
The use of the expression “at least” or “at least one” suggests the use of one or more elements or ingredients or quantities, as the use may be in the embodiment of the disclosure to achieve one or more of the desired objects or results.
While considerable emphasis has been placed herein on the components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation. ,CLAIMS:WE CLAIM:
1. A device (100) to detect tampering with a smart lock cable, said device (100) comprises:
• a lock (102) comprises a first lock section (102a) and a second lock section(102b);
• a cable (104) with a connector end (104a) and a terminal end (104b), wherein said connector end is operatively coupled to the first lock section (102a) and said terminal end is operatively coupled to the second lock section (102b);
• a controller (106) operatively connected to the lock (102) and configured to:
? communicate with a server (108) via a communication interface (114);
? monitor resistance data across the cable (104); and
? analyze real-time changes in resistance data to detect tampering;
wherein said controller (106) comprises:
? a data repository (106a) within the controller (106), configured to store lock details, live positioning data, threshold resistance parameters, and historical resistance data;
? a data collector module (106b) configured to record resistance data in real-time, store resistance data in the data repository (106a), and filter noise to ensure accuracy in tamper detection;
? a transmitter module (106c) configured to transmit resistance data and tampering alerts to the server (108) at predefined intervals or upon detecting an anomaly;
? a triggering module (106d) configured to:
• analyze resistance data to determine conductivity across the cable (104);
• detect tampering events based on deviations from predefined resistance thresholds;
• generate an alarm notification upon detecting a tamper event; and
• communicate the alarm to an operating device (110); and
• a quick response (QR) code (112) positioned on the lock (102), encoding lock data, metadata, and a unique security token to enable secure authentication and interaction with the server (108).
2. The device (100) as claimed in claim 1, wherein said controller (106) comprises an electrical circuit to measure resistance changes using a configuration technique, wherein any tampering attempt results in an unbalanced bridge state.
3. The device (100) as claimed in claim 1, wherein the communication interface includes indicators for lock status, including live GPS location, network connectivity (GSM), and tamper event notifications.
4. The device (100) as claimed in claim 1, wherein said QR code (112) further includes an authentication key to secure communication between the lock (102), the server (108), and the operating device (110).
5. The device (100) as claimed in claim 1, further comprises a power supply unit integrated into the lock (102), wherein the unit includes a power-saving mode to conserve energy during periods of inactivity.
6. The device (100) as claimed in claim 1, wherein the data repository (106a) stores pre-calibrated threshold resistance values for different cable materials to enhance detection accuracy.
7. The device (100) as claimed in claim 1, wherein the triggering module (106d) activates a visual or audible alarm integrated into the lock (102) upon detecting a tamper event.
8. The device (100) as claimed in claim 1, wherein the operating device (110) comprises a user interface configured to display:
• real-time tamper status;
• historical tamper logs; and
• live location and lock status.
9. The device (100) as claimed in claim 1, wherein said cable (104) is constructed with known resistance values for standard lengths to facilitate accurate tamper detection.
10. The device (100) as claimed in claim 1, wherein the server (108) additionally analyzes resistance data transmitted from the controller (106) to notify users of tamper events, including time, location, and specific lock details.
11. The device (100) as claimed in claim 1, further comprises support for wireless communication protocols, including short-range communication (Bluetooth), long-range communication (LoRa), and cellular networks, to enable data transmission to the remote server (108).
12. The device (100) as claimed in claim 1, wherein the lock (102) is configured to detect and prevent tampering attempts involving cable shorting by analyzing resistance changes indicative of abnormal conditions.
13. The device (100) as claimed in claim 1, wherein the alarm notification is selected from the group of notifications includes an audio, a visual, and a haptic notification.
14. The device (100) as claimed in claim 1, wherein the server (108) is selected from a group of servers consisting of a local server, remote server, cloud server, shared server, proxy server, and any server capable of performing the operation.
15. A method (200) for detection of tampering with a smart lock cable, said method (200) comprises the following steps:
• encoding lock data into a quick response (QR) code (112) and positioning the QR code on a visible surface of a lock (102);
• securing a cable (104) to a lock (102), wherein a connector end (104a) is coupled to a first lock section (102a) and a terminal end (104b) is coupled to a second lock section (102b);
• measuring resistance data, in real-time, across the cable (104) by a controller (106);
• comparing resistance data to predefined threshold values stored in a data repository (106a);
• analyzing resistance changes to detect tampering, including cable cutting or shorting attempts;
• generating an alarm notification upon detecting resistance anomalies indicative of tampering;
• transmitting the alarm notification and associated resistance data to a remote server (108); and
• notifying a user via an operating device (110), wherein the notification includes time, location, and lock status.

Dated this 01st Day of February 2025

_______________________________
MOHAN RAJKUMAR DEWAN, IN/PA – 25
OF R. K. DEWAN & CO.
AUTHORIZED AGENT OF APPLICANT

TO,
THE CONTROLLER OF PATENTS
THE PATENT OFFICE, AT MUMBAI

Documents

Application Documents

# Name Date
1 202421007747-STATEMENT OF UNDERTAKING (FORM 3) [05-02-2024(online)].pdf 2024-02-05
2 202421007747-PROVISIONAL SPECIFICATION [05-02-2024(online)].pdf 2024-02-05
3 202421007747-PROOF OF RIGHT [05-02-2024(online)].pdf 2024-02-05
4 202421007747-FORM FOR STARTUP [05-02-2024(online)].pdf 2024-02-05
5 202421007747-FORM FOR SMALL ENTITY(FORM-28) [05-02-2024(online)].pdf 2024-02-05
6 202421007747-FORM 1 [05-02-2024(online)].pdf 2024-02-05
7 202421007747-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [05-02-2024(online)].pdf 2024-02-05
8 202421007747-EVIDENCE FOR REGISTRATION UNDER SSI [05-02-2024(online)].pdf 2024-02-05
9 202421007747-DRAWINGS [05-02-2024(online)].pdf 2024-02-05
10 202421007747-DECLARATION OF INVENTORSHIP (FORM 5) [05-02-2024(online)].pdf 2024-02-05
11 202421007747-FORM-26 [23-04-2024(online)].pdf 2024-04-23
12 202421007747-FORM-5 [01-02-2025(online)].pdf 2025-02-01
13 202421007747-ENDORSEMENT BY INVENTORS [01-02-2025(online)].pdf 2025-02-01
14 202421007747-DRAWING [01-02-2025(online)].pdf 2025-02-01
15 202421007747-COMPLETE SPECIFICATION [01-02-2025(online)].pdf 2025-02-01
16 202421007747-RELEVANT DOCUMENTS [04-02-2025(online)].pdf 2025-02-04
17 202421007747-MARKED COPIES OF AMENDEMENTS [04-02-2025(online)].pdf 2025-02-04
18 202421007747-MARKED COPIES OF AMENDEMENTS [04-02-2025(online)]-1.pdf 2025-02-04
19 202421007747-FORM 13 [04-02-2025(online)].pdf 2025-02-04
20 202421007747-FORM 13 [04-02-2025(online)]-1.pdf 2025-02-04
21 202421007747-AMMENDED DOCUMENTS [04-02-2025(online)].pdf 2025-02-04
22 202421007747-AMENDED DOCUMENTS [04-02-2025(online)].pdf 2025-02-04
23 Abstract.jpg 2025-03-04
24 202421007747-FORM-9 [06-03-2025(online)].pdf 2025-03-06
25 202421007747-Request Letter-Correspondence [08-03-2025(online)].pdf 2025-03-08
26 202421007747-Power of Attorney [08-03-2025(online)].pdf 2025-03-08
27 202421007747-Covering Letter [08-03-2025(online)].pdf 2025-03-08
28 202421007747-STARTUP [19-03-2025(online)].pdf 2025-03-19
29 202421007747-FORM28 [19-03-2025(online)].pdf 2025-03-19
30 202421007747-FORM 18A [19-03-2025(online)].pdf 2025-03-19