Sign In to Follow Application
View All Documents & Correspondence

“A Security System And A Method For Facilitating Security In A Premise”

Abstract: A security system and a method for facilitating security in a premise are described. The security system registers a plurality of residents associated with the premise. The registration is performed by inputting credentials of the plurality of residents. The security system enables a communication device, associated with a security personnel, to receive visitor data. The visitor data comprises at least one of a mobile number, name, and house number in which the visitor wishes to enter. Further, the security system generates an approval request message seeking resident’s approval for the entry of the visitor. Further, the security system generates an OTP on visitor device when the resident approves the entry of the visitor. Further, the security system enables the communication device to receive the OTP. The security system processing the OTP input by the visitor in order to authenticate the visitor. [FIG. 1]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
16 September 2016
Publication Number
12/2018
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
ipo@knspartners.com
Parent Application

Applicants

V19 SOFTECH PVT LTD
Plot No.14, Sector-44, Gurgaon, Haryana, India

Inventors

1. Vishal Swara
C-14\6, DLF Phase -1, Gurgaon -122002, India
2. Ruchi Swara
C-14\6, DLF Phase -1, Gurgaon -122002, India

Specification

TECHNICAL FIELD
The present invention relates to a security management system for various premises.
BACKGROUND
The information in this section merely provide background information related to the present disclosure and may not constitute prior art(s).
Security is defined as degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, item, nation, or organization.
From a global perspective, there exists a growing awareness and need to prepare and react to security threats, which is directly attributed to continuously increasing demand for high quality security services. There exists variety of security problems/threats for any given premises, for example, theft, intruding, trespassing etc... in our society. Premises may include but not limited thereto, govt. buildings, educational institutions, research organizations, residential societies, hospitals, houses of worship, libraries, museums and archives. People get extremely concerned in protecting their premises from all kinds of security threats and try to find ways to protect them, for example, electrifying the fencing, employing security guards…etc. However, in spite having deploying all the techniques, still the premises are not completely safe and are security are prone to be broken. Therefore, security is critical for maintaining and protecting our way of life within a premise. Many research and inventions are happening in the field of security. Still, we find there exists lot of gaps in the system, due to which premises gets exposed to lot of the thefts and crimes.
Various security devices and methods have been employed in the premises that include tools of access control (eg. barcode reader, face recognition system, hand geometry system, finger print recognition system, HID card readers, iris recognition system, webcams, RFID control systems), propriety and contract security guards,
3
alarm system and electronic video surveillance. Such devices and methods aim at providing authorized entry of any person entering the premises. Depending upon the criticality of security, either one or a plurality of these security devices may be employed in the premises. Each of these security devices (or devices simply) as discussed above have a dedicated monitoring/controlling device that work independently of each other keeping track of controlled entry of visitors in the premises. However, there exists long standing issue of monitoring individual devices. This is due to the reason that each security device requires to be monitored constantly by a person to check each visitor while entering the premise. Also, the person has to monitor to check if a visitor stays more than expected period. Since, each security system has a dedicated monitoring/controlling unit, collating individual records of all the devices becomes extremely difficult and tiresome. Also, each device may generate reports any various formats and it gets problematic in analyzing various reports in various formats. Thus, based on the individual reports of such security systems, it may be very difficult to judge that what actions needs to be taken to prevent and investigate property and premises crimes. Also, as report analysis may take time, it is possible that the security may have already been breached.
Due to the lack of a unified security system, the security assured by these diverse security devices fails to provide robust security to the people and the premises. Ultimately, the security is at stake again.
Therefore, it is the need of the art to provide a robust unified security management system.
SUMMARY
Disclosed herein is security system for facilitating security in a premise. The security system comprises a processor and a memory communicatively coupled to the processor. The memory stores processor-executable instructions, which, on execution, causes the processor to register a plurality of residents associated with
4
the premise. The registration is performed by inputting credentials of the plurality of residents. The processor further enables a communication device, associated with a security personnel, to receive visitor data when the visitor tries to enter the premise. The visitor data comprises at least one of a mobile number, name, and house number which the visitor wishes to enter. Further, the processor generates an approval request message seeking resident’s approval for the entry of the visitor. The approval request message is sent to resident device. The processor further generates a one-time password (OTP) on visitor device when the resident approves the entry of the visitor. Further, the processor enables the communication device to receive the OTP. The OTP is input by the visitor. Further, the processor processes the OTP input by the visitor in order to authenticate the visitor.
Further, the present disclosure relates to method facilitating security in a premise. The method comprises registering, by a security system, a plurality of residents associated with the premise. The registration is performed by inputting credentials of the plurality of residents. The method further comprises enabling a communication device, associated with a security personnel, to receive visitor data when the visitor tries to enter the premise. The visitor data comprises at least one of a mobile number, name, and house number which the visitor wishes to enter. The method further comprises generating an approval request message seeking resident’s approval for the entry of the visitor. The approval request message is sent to resident device. Further, the method comprises generating a one-time password (OTP) on visitor device when the resident approves the entry of the visitor. The method further comprises enabling the communication device to receive the OTP. The OTP is input by the visitor. The method further comprises processing the OTP input by the visitor in order to authenticate the visitor.
The foregoing summary is illustrative only and is not intended to be in any way limiting. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to the drawings and the following detailed description.
5
BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS
The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, explain the disclosed principles. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the figures to reference like features and components. Some embodiments of system and/or methods in accordance with embodiments of the present subject matter are now described, by way of example only, and regarding the accompanying figures, in which:
FIG. 1 shows an exemplary environment for facilitating security in a premise in accordance with some embodiments of the present disclosure;
FIG. 2 a detailed block diagram illustrating the security system for facilitating security in the premise in accordance with some embodiments of the present disclosure; and
FIG. 3 shows a flowchart illustrating a method of facilitating security in the premise in accordance with some embodiments of the present disclosure.
It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative systems embodying the principles of the present subject matter. Similarly, it will be appreciated that any flow charts, flow diagrams, state transition diagrams, pseudo code, and the like represent various processes which may be substantially represented in computer readable medium and executed by a computer or processor, whether such computer or processor is explicitly shown.
DETAILED DESCRIPTION
In the present document, the word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or implementation of the
6
present subject matter described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however that it is not intended to limit the disclosure to the specific forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternative falling within the spirit and the scope of the disclosure.
FIG. 1 shows an exemplary environment for facilitating security in a premise in accordance with some embodiments of the present disclosure.
The environment 100 includes a security system 102, communication network 104, a communication device 106 associated with the guard or security personal, a visitor device 108 associated with a visitor, resident device 110 associated with a resident of the premise, and security devices 112. It must be understood to a person skilled in art that there may be n number of security devices 112 in the premise. The communication device 106, the visitor device 108 and the resident device 110 may include mobile phone, smart-phone, laptop, tablet, or any other computing device. Further, the communication network 104 may be a wireless network, a wired network or a combination thereof.
Although, the security system 102 is shown as a server, it must be understood to a person skilled in art that the security system 102 may include other type of computing devices like computer, laptop, tablet, mobile device and any other computer device. For facilitating the security in the premise, according to an embodiment, the security system 102 may be implemented as an application within the communication device 106 and the resident device 110.
Before implementing the security system 102, all the residents staying in the premise may get registered with the security system 102. The registration may be
7
performed by providing credential like name, age, sex, phone number, house number and the like. Once the residents get registered, the credential is stored in memory of the security system 102. It must be further understood to a person skilled in art that the premise may include government buildings, educational institutions, research organizations, residential societies, hospitals, houses of worship, libraries, museums, archives and the like. However, the premise shown in FIG. 1 is a residential society.
Once the visitor reaches the entry gate of the premise, the guard or the security personal may request the visitor to enter visitor data 212 in the communication device 106 associated with the guard. According to the embodiments of present disclosure, the visitor may be a friend, a relative, a delivery boy, a driver, a mechanic, a tutor, a contractor, and a caterer. The visitor may enter the premise by his/her vehicle or simply by walking. In the present case, the visitor shown in FIG. 1 is the delivery boy who wishes to deliver the food to customer i.e., resident of the housing society.
Upon entering the visitor data 212 that include the house number of resident, the security system 102 automatically fetches the mobile number of one or more residents of that house (House A) and generates an approval request message 214. The approval request message 214 is sent to the mobile number of the one or more residents seeking their approval for the entry of the visitor. Once the resident approves the entry of the visitor, the security system 102 now generates a one-time password (OTP) 216 on visitor device 108. The generation of the OTP 216 on the visitor device 108 is performed to add another layer of security for authenticating the visitor.
Now the security guard ask the visitor to enter the OTP 216 into the communication device 106 associated with the guard. Once the OTP 216 is input, the security system 102 processes the entered OTP in relative to generated OTP in order to check the validity of the OTP 216. If the OTP matches, the security system 102
8
authenticates the visitor and may instruct the guard to allow the visitor to enter the premise. However, before allowing to enter the premise, a card may be issued to the visitor which may comprise details about stay of the visitor in the premise.
While entering tower or building in the premise, the card may be used against the various security devices 112, for example card scanner, for authenticating the visitor. It must be noted to a person skilled in art that there may be ‘n’ number of security devices 112 like barcode reader, face recognition system, hand geometry system, finger print recognition system, HID card readers, iris recognition system, webcams, RFID control systems may be used for authenticating the visitor in the premise.
Once the visitor enters the premise, the security system 102 monitors stay-time of the visitor in the premise. The stay-time of the visitor may be compared with stay-time data in order to check whether the visitor is staying in the premise beyond a stay-time threshold. If the visitor’s stay-time is beyond stay-time threshold associated with the visitor, then the security system 102 may generate an alert which may be sent to the resident to concern authority. Further, while leaving the premise, the guard may collect the card at the exit gate. According to an embodiment, the guard may punch the card number on his/her communication device 106 to check the validity of card and visitor before allowing the visitor to leave the premise. If the application interface implemented upon the communication device 106 shows a tick mark, then the guard allows the visitor to exit. However, if the application interface shows red signal, then it means that either the visitor’s card is invalid or stay-time of the visitor has crossed the predefined time limit. In this case, the guard has to follow a standard operating procedure (SOP) before allowing the visitor to leave the premise.
FIG. 2 a detailed block diagram illustrating the security system for facilitating security in the premise in accordance with some embodiments of the present disclosure.
9
The security system 102 includes an I/O interface 202, a processor 204, and a memory 206. The I/O interface 202 may be configured to receive various inputs/data from various devices connected with the security system 102. The memory 206 may be communicatively coupled to the processor 204. The processor 204 may be configured to perform one or more functions of the security system 102 for facilitating security in the premise. In one implementation, the security system 102 may include data 208 and modules 210 for performing various operations in accordance with the embodiments of the present disclosure. In an embodiment, the data 208 may be stored within the memory 206 and may include, without limiting to, visitor data 212, an approval request message 214, one-time password 216, and stay-time data 218.
In some embodiments, the data 208 may be stored within the memory 206 in the form of various data structures. Additionally, the data 208 may be organized using data models, such as relational or hierarchical data models.
In an embodiment, the visitor data 212 may comprises at least one of a mobile number, name, and house number which the visitor wishes to enter. In case the visitor is coming by his/her vehicle, then the visitor data 212 may also include the details about the vehicle, for example vehicle name, vehicle registration number, parking number allocated to the visitor and the like.
In an embodiment, the approval request message 214 may comprise a text message requesting the resident to approve the entry of the visitor. According to an embodiment, the approval request message 214 may comprise details of the visitor for getting the confirmation from the resident. In an embodiment, the one-time password (OTP) 216 may comprise numeric characters or alphabet or alphanumeric characters generated for authenticating the validity of the visitor.
10
In an embodiment, the stay-time data 218 may comprise a plurality of stay-time limit corresponding to a plurality of visitors. For example, the stay-time limit for the visitor as a delivery boy may be 15 minutes. The stay-time limit may be associated with duration of stay of the visitor. If the visitor is a mechanic or a tutor, then the stay-time limit may be 2 hours. However, if the visitor is a friend or relative, then the stay-time limit may be more than 2 hours.
In some embodiments, the data 208 may be processed by one or more modules 210 of the security system 102. In one implementation, the one or more modules 210 may be stored as a part of the processor 204. In another implementation, the one or more modules 210 may be communicatively coupled to the processor 204 for performing one or more functions of the security system 102. The modules 210 may include, without limiting to, a registering module 220, an enabling module 222, a generating module 224, a processing module 226, a monitoring module 228, and other modules 230.
As used herein, the term ‘module’ refers to an application specific integrated circuit (ASIC), an electronic circuit, a processor (shared, dedicated, or group) and memory that execute one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality. In an embodiment, the other modules 230 may be used to perform various miscellaneous functionalities of the security system 102. It will be appreciated that such modules 210 may be represented as a single module or a combination of different modules.
In an embodiment, the registering module 220 may register a plurality of residents associated with the premise. The registration is performed by inputting credentials of the plurality of residents. The credentials may include name of the resident, phone number, age, sex, house/flat/apartment number and the like. As discussed above, the premise may include government buildings, educational institutions, research organizations, residential societies, hospitals, houses of worship, libraries,
11
museums, archives and the like. Thus, based on the premise, the residents may get registered with the security system 102. For example, if the premise is the government building, the residents may be employees or staff associated with the government building. Once the residents are registered, the credential information may be stored in the memory 206 of the security system 102.
Now when the visitor tries to enter the premise, the security system 102 may perform various security checks to authenticate the visitor into the premise. In an embodiment, the enabling module 222 may enable the communication device 106, associated with the security personnel or guard, to ca the capture the visitor data 212. In other words, the visitor may enter the visitor data 212, for example mobile number of the visitor, name of the visitor, and house number in which the visitor wishes to enter. As an example shown in FIG. 1, the house number may be House 1 in which the visitor (delivery boy) may wish to enter to deliver the order.
Once the visitor data 212 is captured, the security system 102 may search the credential information stored in the memory 206 to fetch the mobile number or email address of one or more residents of the house number entered by the visitor. In an embodiment, the generating module 224 may generate the approval request message 214 seeking resident’s approval for the entry of the visitor. Further, the approval request message 214 generated is sent to the resident device 110 via a SMS or email. The resident may now either reject or approve the entry of visitor by replying over the received approval request message 214.
If the resident approves the entry of the visitor, the generating module 224 generates the one-time password (OTP) 216 and send it on the visitor device 108. In other words, the generation of OTP 216 on the visitor device 108 gives a confirmation that that the resident has approved the entry of the visitor. Now the enabling module 222 of the security system 102 may enable the communication device 106 to receive the receive the OTP 216. In other words, the guard may ask the visitor to enter the
12
OTP 216 into the communication device 106. The OTP 216 entered by the visitor is used for verification.
In an embodiment, the processing module 226 may process the OTP 216 input by the visitor in order to authenticate the visitor. The processing module 226 matches the entered OTP 216 with OTP generated by the generating module 224. If the OTP matches, the visitor gets authenticated and therefore allowed to enter the premise. Once the visitor is authenticated, in next step, the security system 102 issues a visitor card to the visitor. The visitor card may comprise details about stay of the visitor in the premise. The visitor may use the visitor card against various security devices 112 to enter the tower/building of the premise. For example, the visitor may scan the visitor card against card reader to enter into the tower or building of the resident.
Further, the monitoring module 228 of the security system 102 may monitor the stay-time of the visitor in the premise. As discussed earlier, there may be various stay-time associated with different types of visitor. For example, if the visitor is a mechanic or a tutor, then the stay-time limit may be 2 hours. However, if the visitor is a friend or relative, then the stay-time limit may be more than 2 hours. If the stay-time goes beyond stay-time limit (overstay) associated with the visitor, the generating module 224 may generate an alert and send it to the resident or the concerned authority. Overstay is calculated from the Exit Time registered in the system (e. g. Exit Time of Last House for Home-Tutor, Normal Exit Time for Contract Labour). For extension in no. of days, resident has to approve contractor’s request then the concerned authority to be notified about the same. Only concerned authority has the rights to modify overstay time.
According to embodiments of present disclosure, the security system 102 provides a facility to the resident to pre-register a visitor. In this scenario, the resident may provide the details about the visitor in advance based on which a unique password or key is generated corresponding to that visitor. When that visitor arrives to the
13
premise, the security system 102 may authenticate the visitor based on the unique password.
According to another embodiment of the present disclosure, the security system 102 provides a facility to authenticate and/or re-authenticate a visitor/staff while the visitor/staff enters the premise or is roaming around in person or inside his vehicle in the premise, on a mobile handheld Device associated with the guard. The device supports Password, Smart card, bio-metric etc.
According to another embodiment of the present disclosure, the security system 102 provides a facility to re-authenticate a resident. In this scenario, for example, the guard on patrolling finds a resident, he may ask the visitor to re-authenticate himself through any of the mode on the mobile device with any of the authentication mode.
A handheld device associated with the guard or security personal as a part of the security system, comprises an application to achieve this process. The handheld device is connected to the cloud over wireless Internet.
According to another embodiment of the present disclosure, the security system 102 provides vehicular safety to the resident. In this scenario, the entry and the exit of the vehicle are marked with the RFID tag readers and the resident gets a real time alert when the vehicle leaves the main gate. Moreover, the vehicle exit can be controlled through mobile controls, e.g. when a resident is on vacation, the system makes sure that the vehicle of the resident does not leave the premise without his permission. The security system 102 can remotely block the exit of the vehicles of resident from the premises even for a shorter duration
According to another embodiment of the present disclosure, the security system 102 is provided to handle various exceptions. The examples of the exceptions are provided here below, but these examples may not be considered as limiting examples of exceptions.
14
For example, if there is no response on SMS from resident to authenticate the visitor, then parallel intercom call shall be made.
If in case an OTP is not received by the visitor due to network failure / fiasco or intentionally the visitor has given wrong number in that case the Guard will verify the Visitor’s mobile number and make a manual entry. The same will be informed to the concerned authority for example, Supervisor and Estate Manager (EM) respectively. Guard will follow the instructions based on local SOP designed by EM. 3. If any unregistered Visitor is not carrying a mobile , in that case the Guard will ask for his original ID proof, which shall be kept at the main gate under the custody of the supervisor and shall be returned on his exit. Simultaneously, Guard will make a manual entry as a specific case and the same will be informed to the Estate Manager through Supervisor.
If the visitor has come in without Mobile phone, the guard will direct him to the in gate to collect his ID proof, at that time his entry is manually made.
If resident forget his card and also forgets his PIN /equipment malfunction, then guard recognizes him and uses his card to allow access. If he does not recognize then he will authenticate on intercom. If now it is confirmed that he is resident, the entry is allowed otherwise he is treated as a visitor.
Resident can block / unblock his RFID tag on car for exit if he wants or he can give instructions to EM through SMS / E-mail. On the other hand, he can give instructions to EM through GSI. The card is blocked and resident or his driver tries to go out and access is denied - then guard can ask the person driving the car if he has blocked, if “yes”, then request him to unblock or else call up and verify from resident intercom. In case the card is blocked and driver is occupying then guard has to strictly verify from intercom. And in “No” case shall allow car to leave without resident permission. If the tag is damaged or not present on the car but the guard recognizes the resident, Guard should open the barrier manually. He should
15
make a manual report for the same and submit the report to EM through the supervisor.
If the Bio-metric is not accepted then guard has to verify from the resident and allow, at the same time make a manual entry and to forward the same to EM through supervisor to verify expiry of his validity period. If the Resident also does not authenticate the identity of staff then guard shall not allow access.
If the finger is cut / wound / not readable, have the other finger registered Pillion with the resident staff, shall be treated as a visitor and SOP of walk-in Un-registered visitor shall be followed.
According to another embodiment of the present disclosure, the security system 102 provides DND Override. For example, visitor calls Resident. Resident calls guard on intercom to allow visitor. Guard makes an entry of DND Override entry, the option shall be given in set up if the authorization power will be with guard or Supervisor to override the DND, And the process continues.
According to another embodiment of the present disclosure, the security system 102 provides various alerts, for example, staff entry-exit alert, vehicle exit alert, visitor overstay alert, guest intimation alert, pre-expiry of access validity to security team, system/network down alert etc.
According to another embodiment of the present disclosure, the security system 102 provides various reports upon request. For example, the security system generates daily or monthly or weekly reports on visitors, overstay, list of visitors present, DND-entry reports to employee, unauthorized access report and staff attendance, as needed.
FIG. 3 shows a flowchart illustrating a method of facilitating security in the premise in accordance with some embodiments of the present disclosure.
16
As illustrated in FIG. 3, the method 300 includes one or more blocks illustrating a method of facilitating security in a premise using security system 102. The method 300 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, and functions, which perform specific functions or implement specific abstract data types.
The order in which the method 300 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method. Additionally, individual blocks may be deleted from the methods without departing from the spirit and scope of the subject matter described herein. Furthermore, the method can be implemented in any suitable hardware, software, firmware, or combination thereof.
At block 302, the method 300 includes registering, by a security system 102, a plurality of residents associated with the premise. The registration is performed by inputting credentials of the plurality of residents.
At block 304, the method 300 includes enabling a communication device 106, associated with a security personnel, to receive visitor data 212. The visitor data 212 comprises at least one of a mobile number, name, and house number in which the visitor wishes to enter. According to embodiments, the visitor may comprise at least one of a friend, a relative, a delivery boy, a driver, a mechanic, a tutor, a contractor, and a caterer.
At block 306, the method 300 includes generating an approval request message 214 seeking resident’s approval for the entry of the visitor. The approval request message 214 is sent to resident device 110.
At block 308, the method 300 includes generating a one-time password (OTP) 216 on visitor device 108 when the resident approves the entry of the visitor.
17
At block 310, the method 300 includes enabling the communication device 106 to receive the OTP 216. The OTP 216 is input by the visitor.
At block 312, the method 300 includes processing the OTP 216 input by the visitor in order to authenticate the visitor.
The terms "an embodiment", "embodiment", "embodiments", "the embodiment", "the embodiments", "one or more embodiments", "some embodiments", and "one embodiment" mean "one or more (but not all) embodiments of the invention(s)" unless expressly specified otherwise.
The terms "including", "comprising", “having” and variations thereof mean "including but not limited to", unless expressly specified otherwise.
The enumerated listing of items does not imply that any or all the items are mutually exclusive, unless expressly specified otherwise.
While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.

We Claim:
1. A method of facilitating security in a premise, the method comprising:
registering, by a security system (102), a plurality of residents associated with the premise, wherein the registration is performed by inputting credentials of the plurality of residents;
performing, by the security system (102), when a visitor tries to enter the premise,
enabling a communication device (106), associated with a security personnel, to receive visitor data (212), wherein the visitor data (212) comprises at least one of a mobile number, name, and house number in which the visitor wishes to enter,
generating an approval request message (214) seeking resident’s approval for the entry of the visitor, wherein the approval request message (214) is sent to resident device (110),
generating a one-time password (OTP) (216) on visitor device (108) when the resident approves the entry of the visitor,
enabling the communication device (106) to receive the OTP (216), wherein the OTP (216) is input by the visitor, and
processing the OTP (216) input by the visitor in order to authenticate the visitor.
2. The method as claimed in claim 1, further comprising issuing a visitor card to the visitor based upon the authentication of the visitor, wherein the visitor card comprises details about stay of the visitor in the premise.
3. The method as claimed in claim 1, further comprising:
monitoring stay-time of the visitor in the premise, and
generating an alert when the stay-time goes beyond stay-time limit associated with the visitor.
19
4. The method as claimed in claim 1, further comprising pre-registering a visitor by providing a unique password to the visitor, wherein the pre-registered visitor is authenticated based on the unique password.
5. The method as claimed in claim 1, wherein visitor is at least one of a friend, a relative, a delivery boy, a driver, a mechanic, a tutor, a contractor, and a caterer.
6. A security system (102) to facilitate security in a premise, the system (102) comprises:
a processor (204); and
a memory (206) communicatively coupled to the processor (204), wherein the memory (206) stores processor-executable instructions, which, on execution, causes the processor (204) to:
register a plurality of residents associated with the premise, wherein the registration is performed by inputting credentials of the plurality of residents;
perform, when a visitor tries to enter the premise,
enabling a communication device (106), associated with a security personnel, to receive visitor data (212), wherein the visitor data (212) comprises at least one of a mobile number, name, and house number in which the visitor wishes to enter,
generating an approval request message (214) seeking resident’s approval for the entry of the visitor, wherein the approval request message (214) is sent to resident device (110),
generating a one-time password (OTP) (216) on visitor device (108) when the resident approves the entry of the visitor,
enabling the communication device (106) to receive the OTP (216), wherein the OTP (216) is input by the visitor, and
processing the OTP input by the visitor in order to authenticate the visitor.
20
7. The security system as claimed in claim 6, is further configured to issue a visitor card to the visitor based upon the authentication of the visitor, wherein the visitor card comprises details about stay of the visitor in the premise.
8. The security system as claimed in claim 6, is further configured to:
monitor stay-time of the visitor in the premise, and
generate an alert when the stay-time goes beyond stay-time limit associated with the visitor.
9. The security system as claimed in claim 6, is further configured to pre-register a visitor by providing a unique password to the visitor, wherein the pre-registered visitor is authenticated based on the unique password.
10. The security system as claimed in claim 6, wherein visitor is at least one of a friend, a relative, a delivery boy, a driver, a mechanic, a tutor, a contractor, and a caterer.

Documents

Application Documents

# Name Date
1 201611031634-COMPLETE SPECIFICATION [15-09-2017(online)].pdf 2017-09-15
1 Form 5 [16-09-2016(online)].pdf 2016-09-16
2 201611031634-DRAWING [15-09-2017(online)].pdf 2017-09-15
2 Form 3 [16-09-2016(online)].pdf 2016-09-16
3 abstract.jpg 2016-10-10
3 Drawing [16-09-2016(online)].pdf 2016-09-16
4 Description(Provisional) [16-09-2016(online)].pdf 2016-09-16
5 abstract.jpg 2016-10-10
5 Drawing [16-09-2016(online)].pdf 2016-09-16
6 201611031634-DRAWING [15-09-2017(online)].pdf 2017-09-15
6 Form 3 [16-09-2016(online)].pdf 2016-09-16
7 201611031634-COMPLETE SPECIFICATION [15-09-2017(online)].pdf 2017-09-15
7 Form 5 [16-09-2016(online)].pdf 2016-09-16