Sign In to Follow Application
View All Documents & Correspondence

Security System And Method For Homes

Abstract: SECURITY SYSTEM AND METHOD FOR HOMES ABSTRACT A security system (100) for homes is disclosed. The system (100) comprising a human interface device (102), installed distributedly; in a home, adapted to detect a human presence, and a capturing unit (104), installed distributedly in the home to capture a facial video footage of a human. A microcontroller (106) configured to: receive the detected human presence in the home to activate the capturing unit (104); initiate a facial recognition engine (108) to extrapolate facial features from the captured facial video footage; compare the extrapolated facial features with prestored facial features in a database (110); raise an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and trigger an alert unit (112). The system (100) features enhanced security with dual authentication. Claims: 10, Figures: 2 Figure 1 is selected.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
17 March 2025
Publication Number
13/2025
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

SR University
SR University, Ananthasagar, Warangal Telangana India 506371 patent@sru.edu.in 08702818333

Inventors

1. Mr. Radhakrishnan P
SR University, Ananthasagar, Hasanparthy (PO), Warangal, Telangana, India-506371.
2. Mr. Rentala Nanda Kishore
SR University, Ananthasagar, Hasanparthy (PO), Warangal, Telangana, India-506371.
3. Ms. Gaddam Sri Vidya
SR University, Ananthasagar, Hasanparthy (PO), Warangal, Telangana, India-506371.

Specification

Description:BACKGROUND
Field of Invention
[001] Embodiments of the present invention generally relate to a security system and particularly to a security system for homes.
Description of Related Art
[002] Home security has been a critical concern for homeowners worldwide, with an increasing demand for solutions that ensure safety and protection against unauthorized access. Traditional home security methods have primarily relied on manual surveillance, mechanical locks, and basic alarm systems. While these approaches provide a level of security, they are often reactive rather than proactive, requiring human intervention to assess threats. Additionally, conventional security systems may not provide real-time monitoring, making them less effective in preventing break-ins or unauthorized access.
[003] With advancements in technology, modern security solutions have incorporated electronic surveillance, biometric authentication, and smart automation to enhance home protection. CCTV cameras, motion sensors, and remote-controlled alarm systems are widely used to monitor and secure residential properties. Despite these improvements, existing solutions still present challenges such as delayed response times, false alarms, and limitations in identifying authorized individuals versus potential intruders. Furthermore, many security systems lack intelligent processing capabilities to differentiate between routine household activities and genuine security threats.
[004] The need for a more advanced, intelligent home security system has grown significantly. A solution that integrates real-time monitoring, automated threat detection, and instant alerts to homeowners and law enforcement would greatly enhance security measures. The integration of artificial intelligence (AI), sensor-based detection, and secure communication channels can improve response efficiency, reducing reliance on human intervention and increasing the overall effectiveness of home security systems.
[005]
[006] There is thus a need for an improved and advanced security system for homes that can administer the aforementioned limitations in a more efficient manner.
SUMMARY
[007] Embodiments in accordance with the present invention provide a security system for homes. The system comprising a human interface device, installed distributedly in a home, adapted to detect a human presence. The system further comprising a capturing unit, installed distributedly in the home, adapted to capture a facial video footage of a human. The system further comprising a microcontroller communicatively connected to the human interface device and to the capturing unit. The microcontroller is configured to receive the detected human presence in the home from the human interface device; activate the capturing unit to capture the facial video footage of the human detected by the human interface device; initiate a facial recognition engine to extrapolate facial features from the captured facial video footage; compare the extrapolated facial features with prestored facial features in a database; raise an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and trigger an alert unit.
[008] Embodiments in accordance with the present invention further provide a method for integrating security in homes. The method comprising steps of receiving a detected human presence in a home from a human interface device; activating a capturing unit to capture a facial video footage of the human detected by the human interface device; initiating a facial recognition engine to extrapolate facial features from the captured facial video footage; comparing the extrapolated facial features with prestored facial features; raising an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and triggering an alert unit.
[009] Embodiments of the present invention may provide a number of advantages depending on their particular configuration. First, embodiments of the present application may provide a security system for homes.
[0010] Next, embodiments of the present application may provide a security system that provides automated real-time threat detection.
[0011] Next, embodiments of the present application may provide a security system that features enhanced security with dual authentication.
[0012] Next, embodiments of the present application may provide a security system that orchestrates instant alerts and response mechanism.
[0013] Next, embodiments of the present application may provide a security system that minimizes human dependence and error.
[0014] Next, embodiments of the present application may provide a security system that holds comprehensive audit trail for investigation.
[0015] These and other advantages will be apparent from the present application of the embodiments described herein.
[0016] The preceding is a simplified summary to provide an understanding of some embodiments of the present invention. This summary is neither an extensive nor exhaustive overview of the present invention and its various embodiments. The summary presents selected concepts of the embodiments of the present invention in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other embodiments of the present invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] The above and still further features and advantages of embodiments of the present invention will become apparent upon consideration of the following detailed description of embodiments thereof, especially when taken in conjunction with the accompanying drawings, and wherein:
[0018] FIG. 1 illustrates a block diagram of a security system for homes, according to an embodiment of the present invention; and
[0019] FIG. 2 depicts a flowchart of a method for integrating security in homes, according to an embodiment of the present invention.
[0020] The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including but not limited to. To facilitate understanding, like reference numerals have been used, where possible, to designate like elements common to the figures. Optional portions of the figures may be illustrated using dashed or dotted lines, unless the context of usage indicates otherwise.
DETAILED DESCRIPTION
[0021] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the scope of the invention as defined in the claims.
[0022] In any embodiment described herein, the open-ended terms "comprising", "comprises”, and the like (which are synonymous with "including", "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of", “consists essentially of", and the like or the respective closed phrases "consisting of", "consists of”, the like.
[0023] As used herein, the singular forms “a”, “an”, and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.
[0024] FIG. 1 illustrates a block diagram of a security system 100 (hereinafter referred to as the system 100) for homes, according to an embodiment of the present invention. The system 100 may be adapted to sense a human presence in a home. Further, the system 100 may confirm a visual identity of a human present in the home. A mismatch in the visual identity may enable the system 100 to generate a local alert along with a remote alert that may be transmitted to law enforcement agencies.
[0025] According to the embodiments of the present invention, the system 100 may incorporate non-limiting hardware components to enhance the processing speed and efficiency such as the system 100 may comprise a human interface device 102, a capturing unit 104, a microcontroller 106, a facial recognition engine 108, a database 110, an alert unit 112, and a computing unit 114. In an embodiment of the present invention, the hardware components of the system 100 may be integrated with computer-executable instructions for overcoming the challenges and the limitations of the existing systems.
[0026] In an embodiment of the present invention, the human interface device 102 may be distributedly installed in the home. The human interface device 102 may be adapted to detect a human presence in the home. The human interface device 102 may comprise a Passive Infrared (PIR) sensor and a temperature sensor.
[0027] In an embodiment of the present invention, the capturing unit 104 may be distributedly installed in the home. The capturing unit 104 may be adapted to capture a facial video footage of the human present in the home. The capturing unit 104 may comprise a camera.
[0028] In an embodiment of the present invention, the microcontroller 106 may be connected to the human interface device 102 and to the capturing unit 104. The microcontroller 106 may be configured to receive the detected human presence in the home from the human interface device 102. The microcontroller 106 may be configured to activate the capturing unit 104 to capture the facial video footage of the human detected by the human interface device 102. The microcontroller 106 may be configured to initiate the facial recognition engine 108 to extrapolate facial features from the captured facial video footage. The facial recognition engine 108 may be, but not limited to, a computer vision, a neural network, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the facial recognition engine 108, including known, related art, and/or later developed technologies. The facial features extrapolated may be, but not limited to, a face shape, an eye orientation, or a combination thereof. Embodiments of the present invention are intended to include or otherwise cover any type of the facial features, including known, related art, and/or later developed technologies.
[0029] Further, the microcontroller 106 may be configured to compare the extrapolated facial features with prestored facial features in the database 110. Upon comparison if the extrapolated facial features do not match with the prestored facial features, then the microcontroller 106 may be configured to raise an unauthorized access flag and trigger the alert unit 112. However, if the extrapolated facial features match with the prestored facial features, then the microcontroller 106 may be configured to raise an authorized access flag.
[0030] The microcontroller 106 may further be configured to maintain and store event logs, timestamps, the facial video footage, and so forth, for future security audits and analysis. the microcontroller 106 may be, but not limited to, a Programmable Logic Control (PLC) unit, a microprocessor, a development board, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the microcontroller 106 including known, related art, and/or later developed technologies.
[0031] In an embodiment of the present invention, the database 110 may be adapted to store the facial features. The facial features stored in the database 110 may be utilized for getting a match with the extrapolated facial features. The database 110 may be for example, but not limited to, a distributed database, a personal database, an end-user database, a commercial database, a Structured Query Language (SQL) database, a non-SQL database, an operational database, a relational database, an object-oriented database, a graph database, and so forth. In a preferred embodiment of the present invention, the database 110 may be a cloud database. Embodiments of the present invention are intended to include or otherwise cover any type of the database 110 including known, related art, and/or later developed technologies.
[0032] Further, the database 110 may be stored in a cloud server, in an embodiment of the present invention. In an embodiment of the present invention, the cloud server may be remotely located. In an exemplary embodiment of the present invention, the cloud server may be a public cloud server. In another exemplary embodiment of the present invention, the cloud server may be a private cloud server. In yet another embodiment of the present invention, the cloud server may be a dedicated cloud server. According to embodiments of the present invention, the cloud server may be, but not limited to, a Microsoft Azure cloud server, an Amazon AWS cloud server, a Google Compute Engine (GCE) cloud server, an Amazon Elastic Compute Cloud (EC2) cloud server, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the cloud server including known, related art, and/or later developed technologies.
[0033] In an embodiment of the present invention, the alert unit 112 may be triggered by the microcontroller 106 upon raise of the unauthorized access flag. The alert unit 112 may be adapted to alert law enforcement agencies and a security front about an unauthorized access in the home. The alert unit 112 may be, but not limited to, a buzzer, a siren, an alarm, a hooter, a strobe light, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the alert unit 112, including known, related art, and/or later developed technologies.
[0034] In an embodiment of the present invention, the computing unit 114 may be an electronic device used by the law enforcement agencies. The computing unit 114 may enable the law enforcement agencies to receive the alert about the unauthorized access flag. The computing unit 114 may enable the law enforcement agencies to view the facial video footage captured by the capturing unit 104. The computing device may be, but not limited to, a personal computer, a desktop, a server, a laptop, a tablet, a mobile phone, a notebook, a netbook, a smartphone, a wearable device, and so forth. Embodiments of the present invention are intended to include or otherwise cover any type of the computing device, including known, related art, and/or later developed technologies.
[0035] In an exemplary embodiment of the present invention, the system 100 may further incorporate an artificial intelligence (AI)-based learning module to enhance the accuracy of facial recognition over time. The AI-based learning module may be configured to analyze multiple instances of captured facial video footage to account for variations in lighting, facial expressions, and occlusions. The AI-based learning module may update the database 110 dynamically by refining the stored facial features based on real-time feedback. Further, in an exemplary embodiment, the system 100 may incorporate an access control mechanism. Upon successful facial recognition, the microcontroller 106 may be configured to interact with an electronic door lock mechanism to grant access to the individual. The access control mechanism may be implemented using technologies such as Radio-Frequency Identification (RFID), biometric authentication, or smart home automation protocols.
[0036] Moreover, the system 100 may be designed to operate in multiple security modes, such as "Home Mode," "Away Mode," and "Restricted Mode." In "Home Mode," the system may recognize authorized users and log entry events without triggering alerts. In "Away Mode," any detected human presence may prompt an immediate security alert. In "Restricted Mode," the system may deny access to certain individuals based on pre-configured user preferences.
[0037] In an exemplary embodiment, the system 100 may include a cloud-based storage option to securely store captured facial video footage, event logs, and access records. The cloud storage may be protected using end-to-end encryption to prevent unauthorized access to sensitive data.
[0038] The embodiments described herein are exemplary and intended to cover any variations, modifications, and improvements that fall within the scope of the present invention.
[0039] FIG. 2 depicts a flowchart of a method 200 for integrating security in the homes, according to an embodiment of the present invention.
[0040] At step 202, the system 100 may receive the detected human presence in the home from the human interface device 102.
[0041] At step 204, the system 100 may activate the capturing unit 104 to capture the facial video footage of the human detected by the human interface device 102.
[0042] At step 206, the system 100 may initiate the facial recognition engine 108 to extrapolate the facial features from the captured facial video footage.
[0043] At step 208, the system 100 may compare the extrapolated facial features with the prestored facial features in the database 110. Upon comparison, if the facial features do not match the prestored facial features, then the method 200 may proceed to a step 210. Else, the method 200 may proceed to a step 214.
[0044] At step 210, the system 100 may raise the unauthorized access flag.
[0045] At step 212, the system 100 may trigger the alert unit 112.
[0046] At step 214, the system 100 may raise the authorized access flag.
[0047] While the invention has been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims.
[0048] This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope of the invention is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements within substantial differences from the literal languages of the claims. , Claims:CLAIMS
I/We Claim:
1. A security system (100) for homes, the system (100) comprising:
a human interface device (102), installed distributedly in a home, adapted to detect a human presence;
a capturing unit (104), installed distributedly in the home, adapted to capture a facial video footage of a human;
a microcontroller (106) communicatively connected to the human interface device (102) and to the capturing unit (104), characterized in that the microcontroller (106) is configured to:
receive the detected human presence in the home from the human interface device (102);
activate the capturing unit (104) to capture the facial video footage of the human detected by the human interface device (102);
initiate a facial recognition engine (108) to extrapolate facial features from the captured facial video footage;
compare the extrapolated facial features with prestored facial features in a database (110);
raise an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and
trigger an alert unit (112).
2. The system (100) as claimed in claim 1, wherein the microcontroller (106) is configured to raise an authorized access flag when the extrapolated facial features match with the prestored facial features.
3. The system (100) as claimed in claim 1, wherein the microcontroller (106) is configured to maintain and store event logs, timestamps, the facial video footage, or a combination thereof, for future security audits and analysis.
4. The system (100) as claimed in claim 1, comprising a computing unit (114) adapted to receive an alert indicating the unauthorized access flag.
5. The system (100) as claimed in claim 1, wherein the human interface device (102) comprises a Passive Infrared (PIR) sensor and a temperature sensor.
6. A method (200) for integrating security in homes, the method (200) is characterized by steps of:
receiving a detected human presence in a home from a human interface device (102);
activating a capturing unit (104) to capture a facial video footage of the human detected by the human interface device (102);
initiating a facial recognition engine (108) to extrapolate facial features from the captured facial video footage;
comparing the extrapolated facial features with prestored facial features;
raising an unauthorized access flag, when the extrapolated facial features do not match with the prestored facial features; and
triggering an alert unit (112).
7. The method (200) as claimed in claim 6, wherein the human interface device (102) comprise a Passive Infrared (PIR) sensor and a temperature sensor.
8. The method (200) as claimed in claim 6, wherein the alert unit (112) is selected from a buzzer, a siren, an alarm, a hooter, a strobe light, or a combination thereof
9. The method (200) as claimed in claim 6, comprising a step of raising an authorized access flag when the extrapolated facial features match with the prestored facial features
10. The method (200) as claimed in claim 6, wherein the prestored facial features are stored in a database (110).
Date: March 13, 2025
Place: Noida

Nainsi Rastogi
Patent Agent (IN/PA-2372)
Agent for the Applicant

Documents

Application Documents

# Name Date
1 202541023379-STATEMENT OF UNDERTAKING (FORM 3) [17-03-2025(online)].pdf 2025-03-17
2 202541023379-REQUEST FOR EARLY PUBLICATION(FORM-9) [17-03-2025(online)].pdf 2025-03-17
3 202541023379-POWER OF AUTHORITY [17-03-2025(online)].pdf 2025-03-17
4 202541023379-OTHERS [17-03-2025(online)].pdf 2025-03-17
5 202541023379-FORM-9 [17-03-2025(online)].pdf 2025-03-17
6 202541023379-FORM FOR SMALL ENTITY(FORM-28) [17-03-2025(online)].pdf 2025-03-17
7 202541023379-FORM 1 [17-03-2025(online)].pdf 2025-03-17
8 202541023379-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [17-03-2025(online)].pdf 2025-03-17
9 202541023379-EDUCATIONAL INSTITUTION(S) [17-03-2025(online)].pdf 2025-03-17
10 202541023379-DRAWINGS [17-03-2025(online)].pdf 2025-03-17
11 202541023379-DECLARATION OF INVENTORSHIP (FORM 5) [17-03-2025(online)].pdf 2025-03-17
12 202541023379-COMPLETE SPECIFICATION [17-03-2025(online)].pdf 2025-03-17