Abstract: SECURITY SYSTEM FOR BANK LOCKER ROOMS ABSTRACT A security system (100) for bank locker rooms is disclosed. The system (100) comprising a human interface device (102), installed distributedly; in a bank locker room, adapted to detect a human presence and a capturing unit (104), installed distributedly in the bank locker room, adapted to capture a facial video footage of a human. A microcontroller (106) configured to: receive the detected human presence in the bank locker room to activate the capturing unit (104); initiate a facial recognition engine (108) to extrapolate facial features from the captured facial video footage; compare the extrapolated facial features with prestored facial features in a database (110); raise an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and trigger an alert unit (112). The system (100) features enhanced security with dual authentication. Claims: 10, Figures: 2 Figure 1 is selected.
Description:BACKGROUND
Field of Invention
[001] Embodiments of the present invention generally relate to a security system and particularly to a security system for bank locker rooms.
Description of Related Art
[002] Bank lockers are commonly used to store valuable assets, including important documents, jewelry, and cash. Ensuring the security of these locker rooms has always been a priority for financial institutions, as unauthorized access can lead to theft, fraud, or loss of customer trust. Traditional security measures primarily rely on manual monitoring, key-based access, and biometric authentication. While these methods provide a certain level of security, they have inherent limitations, such as human errors, vulnerability to tampering, and the inability to respond immediately to potential threats.
[003] Over the years, security enhancements have been introduced, including surveillance cameras, access control systems, and motion sensors. However, these systems often operate in isolation and may not offer real-time threat detection and response capabilities. For example, motion sensors alone cannot differentiate between authorized personnel and unauthorized intruders, and security cameras require continuous monitoring by human operators, leading to delayed response times. Moreover, many existing security measures depend on post-event analysis rather than proactive deterrence.
[004] With the increasing sophistication of security breaches, financial institutions require more advanced security solutions that integrate multiple layers of authentication, motion detection, and automated alert mechanisms. A comprehensive and intelligent security system should be capable of real-time identity verification, immediate intrusion detection, and automated response actions without reliance on human intervention. Addressing these limitations can significantly enhance the safety and reliability of bank locker rooms, ensuring robust protection of valuable assets.
[005] There is thus a need for an improved and advanced security system for bank locker rooms that can administer the aforementioned limitations in a more efficient manner.
SUMMARY
[006] Embodiments in accordance with the present invention provide a security system for bank locker rooms. The system comprising a human interface device, installed distributedly in a bank locker room, adapted to detect a human presence. The system further comprising a capturing unit, installed distributedly in the bank locker room, adapted to capture a facial video footage of a human. The system further comprising a microcontroller communicatively connected to the human interface device and to the capturing unit. The microcontroller is configured to receive the detected human presence in the bank locker room from the human interface device; activate the capturing unit to capture the facial video footage of the human detected by the human interface device; initiate a facial recognition engine to extrapolate facial features from the captured facial video footage; compare the extrapolated facial features with prestored facial features in a database; raise an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and trigger an alert unit.
[007] Embodiments in accordance with the present invention further provide a method for integrating security in bank locker rooms. The method comprising steps of receiving a detected human presence in a bank locker room from a human interface device; activating a capturing unit to capture a facial video footage of the human detected by the human interface device; initiating a facial recognition engine to extrapolate facial features from the captured facial video footage; comparing the extrapolated facial features with prestored facial features; raising an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and triggering an alert unit.
[008] Embodiments of the present invention may provide a number of advantages depending on their particular configuration. First, embodiments of the present application may provide a security system for bank locker rooms.
[009] Next, embodiments of the present application may provide a security system that provides automated real-time threat detection.
[0010] Next, embodiments of the present application may provide a security system that features enhanced security with dual authentication.
[0011] Next, embodiments of the present application may provide a security system that orchestrates instant alerts and response mechanisms.
[0012] Next, embodiments of the present application may provide a security system that minimizes human dependence and error.
[0013] Next, embodiments of the present application may provide a security system that holds a comprehensive audit trail for investigation.
[0014] These and other advantages will be apparent from the present application of the embodiments described herein.
[0015] The preceding is a simplified summary to provide an understanding of some embodiments of the present invention. This summary is neither an extensive nor exhaustive overview of the present invention and its various embodiments. The summary presents selected concepts of the embodiments of the present invention in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other embodiments of the present invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0016] The above and still further features and advantages of embodiments of the present invention will become apparent upon consideration of the following detailed description of embodiments thereof, especially when taken in conjunction with the accompanying drawings, and wherein:
[0017] FIG. 1 illustrates a block diagram of a security system for bank locker rooms, according to an embodiment of the present invention; and
[0018] FIG. 2 depicts a flowchart of a method for integrating security in bank locker rooms, according to an embodiment of the present invention.
[0019] The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including but not limited to. To facilitate understanding, like reference numerals have been used, where possible, to designate like elements common to the figures. Optional portions of the figures may be illustrated using dashed or dotted lines, unless the context of usage indicates otherwise.
DETAILED DESCRIPTION
[0020] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the scope of the invention as defined in the claims.
[0021] In any embodiment described herein, the open-ended terms "comprising", "comprises”, and the like (which are synonymous with "including", "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of", “consists essentially of", and the like or the respective closed phrases "consisting of", "consists of”, the like.
[0022] As used herein, the singular forms “a”, “an”, and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.
[0023] FIG. 1 illustrates a block diagram of a security system 100 (hereinafter referred to as the system 100) for bank locker rooms, according to an embodiment of the present invention. The system 100 may be adapted to sense a human presence in a bank locker room. Further, the system 100 may be configured to confirm a visual identity of a human present in the bank locker room. The system 100 may further be configured to generate a local alert and/or a remote alert that may be transmitted to law enforcement agencies upon detecting a mismatch in the visual identity of the human present in the bank locker room from an authorized person.
[0024] The system 100 may include a human interface device 102, a capturing unit 104, a microcontroller 106, a facial recognition engine 108, a database 110, an alert unit 112, and a computing unit 114.
[0025] In an embodiment of the present invention, the human interface device 102 may be strategically embedded within the infrastructure of the bank locker room for inconspicuous detection of unauthorized access. The human interface device 102 may be configured as a mat-flooring sensor array integrated with a network of distributed Passive Infrared (PIR) sensors and thermal imaging sensors to accurately detect human presence, movement patterns, and body heat signatures. The integration of these sensors into the flooring and walls may enhance security by ensuring non-intrusive yet highly responsive monitoring of any individual entering the locker room. Furthermore, the human interface device 102 may employ machine learning algorithms to differentiate between authorized and unauthorized movements based on predefined behavioral parameters.
[0026] The behavioral parameters may be derived from historical movement patterns of authorized individuals, including walking speed, gait analysis, stance, and typical interaction patterns with the locker. The human interface device 102 of the system 100 may continuously train on the authorized user data and may detect anomalies such as inconsistent movements, hesitation, unauthorized access patterns, deviations from standard behaviors, and so forth.
[0027] In an embodiment of the present invention, the capturing unit 104 may be installed at multiple concealed vantage points within the bank locker room to ensure a comprehensive, multi-angle capture of facial features. The capturing unit 104 may include an array of ultra-wide-angle cameras, time-of-flight (ToF) depth sensors, and infrared cameras to capture high-precision facial video footage under varying lighting conditions. In a further embodiment, the capturing unit 104 may leverage biometric enhancements such as 3D facial mapping and thermal signature analysis to enhance recognition accuracy and mitigate spoofing attempts using photographs or masks. The captured video footage may be processed in real time using AI-driven facial recognition algorithms that dynamically adapt to slight variations in facial features over time, ensuring robustness against disguise attempts or unauthorized access through facial manipulation techniques. In a further embodiment, the capturing unit 104 may integrate AI-driven motion recognition that classifies actions such as forced entry attempts, unauthorized lingering, or suspicious movement sequences. Upon detecting such deviations, the system 100 may trigger an enhanced verification mode by prompting additional facial recognition scans or alerting security personnel in real time.
[0028] The captured video footage may also undergo biometric enhancement using 3D facial mapping and thermal signature analysis to ensure high accuracy in identity verification. The AI-driven facial recognition algorithm may dynamically adapt to slight variations in facial features over time, preventing unauthorized access attempts through disguise or manipulation.
[0029] In an embodiment of the present invention, the microcontroller 106 may be connected to the human interface device 102 and to the capturing unit 104. The microcontroller 106 may be configured to receive the detected human presence in the bank locker room from the human interface device 102. The microcontroller 106 may be configured to activate the capturing unit 104 to capture the facial video footage of the human detected by the human interface device 102. The microcontroller 106 may be configured to initiate the facial recognition engine 108 to extrapolate facial features from the captured facial video footage. The facial recognition engine 108 may be, but not limited to, a computer vision, a neural network, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the facial recognition engine 108, including known, related art, and/or later developed technologies. The facial features extrapolated may be, but not limited to, a face shape, an eye orientation, or a combination thereof. Embodiments of the present invention are intended to include or otherwise cover any type of the facial features, including known, related art, and/or later developed technologies.
[0030] Further, the microcontroller 106 may be configured to compare the extrapolated facial features with prestored facial features in the database 110. Upon comparison if the extrapolated facial features do not match with the prestored facial features, then the microcontroller 106 may be configured to raise an unauthorized access flag and trigger the alert unit 112. However, if the extrapolated facial features match with the prestored facial features, then the microcontroller 106 may be configured to raise an authorized access flag. In an embodiment of the present invention, the microcontroller 106 may be configured to detect role-based access by verifying the access level assigned to an individual. The database 110 may be configured to store role-specific access permissions, such as locker owners, bank staff, and security personnel, each with predefined access rights. The microcontroller 106 may be configured to retrieve and analyze these permissions upon facial recognition, ensuring that individuals may be granted access only to areas and functions corresponding to their roles.
[0031] For example, the microcontroller 106 may be configured to permit locker owners to access only their assigned locker compartments, while bank staff may be configured to have entry only during specified hours for maintenance or assistance. Security personnel may be configured to have broader access but may be subject to real-time authentication monitoring. The microcontroller 106 may be configured to further employ contextual verification by cross-referencing access attempts with scheduled appointments, access logs, or secondary authentication factors such as PIN codes or biometric scans to enhance security. In the event of an access attempt that may not align with the predefined role-based permissions—such as a bank staff member trying to access a restricted locker—the microcontroller 106 may be configured to trigger a restricted access flag, prompting additional authentication or alerting the security system for further verification.
[0032] The microcontroller 106 may further be configured to maintain and store event logs, timestamps, the facial video footage, and so forth, for future security audits and analysis. The microcontroller 106 may be configured to include, but not be limited to, a Programmable Logic Control (PLC) unit, a microprocessor, a development board, an Application-Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), a System-on-Chip (SoC), or any combination thereof. The microcontroller 106 may be configured to operate using a real-time operating system (RTOS) or a bare-metal firmware to ensure high-speed processing and low-latency security responses.
[0033] Furthermore, the microcontroller 106 may be configured to integrate AI-powered edge computing capabilities, enabling on-device processing for facial recognition, behavioral pattern analysis, and anomaly detection without relying solely on external computing resources. The microcontroller 106 may be configured to support encrypted communication protocols, such as Transport Layer Security (TLS) or Advanced Encryption Standard (AES)-based encryption, to ensure secure data transmission between system components.
[0034] Embodiments of the present invention may be configured to include or otherwise cover any type of the microcontroller 106, including known, related art, and/or later developed technologies, to evolve security frameworks and computational advancements.
[0035] In an embodiment of the present invention, the database 110 may be adapted to store the facial features. The facial features stored in the database 110 may be utilized for getting a match with the extrapolated facial features. The database 110 may be for example, but not limited to, a distributed database, a personal database, an end-user database, a commercial database, a Structured Query Language (SQL) database, a non-SQL database, an operational database, a relational database, an object-oriented database, a graph database, and so forth. In a preferred embodiment of the present invention, the database 110 may be a cloud database. Embodiments of the present invention are intended to include or otherwise cover any type of the database 110 including known, related art, and/or later developed technologies.
[0036] Further, the database 110 may be stored in a cloud server, in an embodiment of the present invention. In an embodiment of the present invention, the cloud server may be remotely located. In an exemplary embodiment of the present invention, the cloud server may be a public cloud server. In another exemplary embodiment of the present invention, the cloud server may be a private cloud server. In yet another embodiment of the present invention, the cloud server may be a dedicated cloud server. According to embodiments of the present invention, the cloud server may be, but not limited to, a Microsoft Azure cloud server, an Amazon AWS cloud server, a Google Compute Engine (GCE) cloud server, an Amazon Elastic Compute Cloud (EC2) cloud server, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the cloud server including known, related art, and/or later developed technologies.
[0037] In an embodiment of the present invention, the alert unit 112 may be configured to be triggered by the microcontroller 106 upon the raise of the unauthorized access flag. The alert unit 112 may be configured to alert bank employees and security personnel about an unauthorized access attempt in the bank locker room.
[0038] The alert unit 112 may be configured to include, but not be limited to, a buzzer, a siren, an alarm, a hooter, a strobe light, or a combination thereof. Additionally, the alert unit 112 may be configured to generate a silent alert, such as the controlled release of a gas (e.g., an odorless or mildly irritating gas to signal a breach), a fragrance alert (e.g., dispersing a distinct scent detectable only by authorized personnel), or a vibration-based alert through designated surfaces or wearable security devices. Furthermore, the alert unit 112 may be configured to send encrypted notifications via SMS, email, or push notifications to authorized personnel, law enforcement agencies, or connected security systems. In certain embodiments, the alert unit 112 may be configured to integrate with emergency response systems, such as automatically locking down specific sections of the bank or activating surveillance feeds for real-time monitoring. Embodiments of the present invention may be configured to include or otherwise cover any type of the alert unit 112, including known, related art, and/or later developed technologies, ensuring adaptability to evolving security requirements.
[0039] In an embodiment of the present invention, the computing unit 114 may be an electronic device used by the law enforcement agencies. The computing unit 114 may enable the law enforcement agencies to receive the alert about the unauthorized access flag. The computing unit 114 may enable the law enforcement agencies to view the facial video footage captured by the capturing unit 104. The computing device may be, but not limited to, a personal computer, a desktop, a server, a laptop, a tablet, a mobile phone, a notebook, a netbook, a smartphone, a wearable device, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the computing device, including known, related art, and/or later developed technologies.
[0040] FIG. 2 depicts a flowchart of a method 200 for integrating security in the bank locker rooms, according to an embodiment of the present invention.
[0041] At step 202, the system 100 may receive the detected human presence in the bank locker room from the human interface device 102.
[0042] At step 204, the system 100 may activate the capturing unit 104 to capture the facial video footage of the human detected by the human interface device 102.
[0043] At step 206, the system 100 may initiate the facial recognition engine 108 to extrapolate the facial features from the captured facial video footage.
[0044] At step 208, the system 100 may compare the extrapolated facial features with the prestored facial features in the database 110. Upon comparison, if the facial features do not match the prestored facial features, then the method 200 may proceed to a step 210. Else, the method 200 may proceed to a step 214.
[0045] At step 210, the system 100 may raise the unauthorized access flag.
[0046] At step 212, the system 100 may trigger the alert unit 112.
[0047] At step 214, the system 100 may raise the authorized access flag.
[0048] While the invention has been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims.
[0049] This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements within substantial differences from the literal languages of the claims. , Claims:CLAIMS
I/We Claim:
1. A security system (100) for bank locker rooms, the system (100) comprising:
a human interface device (102), installed distributedly in a bank locker room, adapted to detect a human presence;
a capturing unit (104), installed distributedly in the bank locker room, adapted to capture a facial video footage of a human; and
a microcontroller (106) communicatively connected to the human interface device (102) and to the capturing unit (104), characterized in that the microcontroller (106) is configured to:
receive the detected human presence in the bank locker room from the human interface device (102);
activate the capturing unit (104) to capture the facial video footage of the human detected by the human interface device (102);
initiate a facial recognition engine (108) to extrapolate facial features from the captured facial video footage;
compare the extrapolated facial features with prestored facial features in a database (110);
raise an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and
trigger an alert unit (112).
2. The system (100) as claimed in claim 1, wherein the microcontroller (106) is configured to raise an authorized access flag when the extrapolated facial features match with the prestored facial features.
3. The system (100) as claimed in claim 1, wherein the microcontroller (106) is configured to maintain and store event logs, timestamps, the facial video footage, or a combination thereof, for future security audits and analysis.
4. The system (100) as claimed in claim 1, comprising a computing unit (114) adapted to receive an alert indicating the unauthorized access flag.
5. The system (100) as claimed in claim 1, wherein the human interface device (102) comprise a Passive Infrared (PIR) sensor and a temperature sensor.
6. A method (200) for integrating security in bank locker rooms, the method (200) is characterized by steps of:
receiving a detected human presence in a bank locker room from a human interface device (102);
activating a capturing unit (104) to capture a facial video footage of the human detected by the human interface device (102);
initiating a facial recognition engine (108) to extrapolate facial features from the captured facial video footage;
comparing the extrapolated facial features with prestored facial features;
raising an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and
triggering an alert unit (112).
7. The method (200) as claimed in claim 6, wherein the human interface device (102) comprise a Passive Infrared (PIR) sensor and a temperature sensor.
8. The method (200) as claimed in claim 6, wherein the alert unit (112) is selected from a buzzer, a siren, an alarm, a hooter, a strobe light, or a combination thereof
9. The method (200) as claimed in claim 6, comprising a step of raising an authorized access flag when the extrapolated facial features match with the prestored facial features
10. The method (200) as claimed in claim 6, wherein the prestored facial features are stored in a database (110).
Date: March 07, 2025
Place: Noida
Nainsi Rastogi
Patent Agent (IN/PA-2372)
Agent for the Applicant
| # | Name | Date |
|---|---|---|
| 1 | 202541021029-STATEMENT OF UNDERTAKING (FORM 3) [08-03-2025(online)].pdf | 2025-03-08 |
| 2 | 202541021029-REQUEST FOR EARLY PUBLICATION(FORM-9) [08-03-2025(online)].pdf | 2025-03-08 |
| 3 | 202541021029-POWER OF AUTHORITY [08-03-2025(online)].pdf | 2025-03-08 |
| 4 | 202541021029-OTHERS [08-03-2025(online)].pdf | 2025-03-08 |
| 5 | 202541021029-FORM-9 [08-03-2025(online)].pdf | 2025-03-08 |
| 6 | 202541021029-FORM FOR SMALL ENTITY(FORM-28) [08-03-2025(online)].pdf | 2025-03-08 |
| 7 | 202541021029-FORM 1 [08-03-2025(online)].pdf | 2025-03-08 |
| 8 | 202541021029-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [08-03-2025(online)].pdf | 2025-03-08 |
| 9 | 202541021029-EDUCATIONAL INSTITUTION(S) [08-03-2025(online)].pdf | 2025-03-08 |
| 10 | 202541021029-DRAWINGS [08-03-2025(online)].pdf | 2025-03-08 |
| 11 | 202541021029-DECLARATION OF INVENTORSHIP (FORM 5) [08-03-2025(online)].pdf | 2025-03-08 |
| 12 | 202541021029-COMPLETE SPECIFICATION [08-03-2025(online)].pdf | 2025-03-08 |
| 13 | 202541021029-Proof of Right [21-05-2025(online)].pdf | 2025-05-21 |