Sign In to Follow Application
View All Documents & Correspondence

An Access Management System And Method For Operating The Same

Abstract: An access management system is disclosed. The system includes an interface configured to receive a plurality of facial information of a user. The system also includes a locker communicatively coupled to the interface and includes a control subsystem. The control subsystem includes a database configured to store a plurality of predefined facial information of each authorized user and store a predefined time interval for each authorized user. The control subsystem also includes an identification subsystem coupled to the database and configured to compare the plurality of received facial information of the user with the plurality of predefined facial information. The identification subsystem is also configured to generate a confirmation signal based on a compared result and the predefined time interval. The control subsystem further includes a controller configured to control a lock of the locker based on the confirmation signal to access the locker. FIG. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
09 April 2018
Publication Number
05/2019
Publication Type
INA
Invention Field
PHYSICS
Status
Email
dinkar@ipexcel.com
Parent Application

Applicants

Colife Advisory Private Limited
The Summit, Level 4 ,1st 'A' cross ,Anantharama Reddy Layout , Outer Ring Road ,Chinnappanahalli, Marathahalli, Bangalore, Karnataka, Pin-560037.

Inventors

1. Suresh Rangarajan
The Summit, Level 4 ,1st 'A' cross ,Anantharama Reddy Layout , Outer Ring Road ,Chinnappanahalli, Marathahalli, Bangalore, Karnataka, Pin-560037.

Specification

Claims:WE CLAIM:
1. An access management system (10) comprising:
an interface (20) configured to receive a plurality of facial information of a user;
a locker (30) communicatively coupled to the interface (20), wherein the locker (30) comprises a control subsystem (40), wherein the control subsystem (40) comprises:
a database (50) configured to:
store a plurality of predefined facial information of each authorized user;
store a predefined time interval for each authorized user;
an identification subsystem (60) coupled to the database (50) and configured to:
compare a plurality of received facial information of the user with the plurality of predefined facial information;
generate a confirmation signal based on a compared result and the predefined time interval; and
a controller (70) coupled to the database (50) and the identification subsystem (60) and configured to control a lock of the locker (30) based on the confirmation signal to access the locker (30).
2. The system (10) as claimed in claim 1, wherein the interface (20) comprises an electronic device such as a mobile phone, a tablet, a laptop or a digital camera.
3. The system (10) as claimed in claim 1, wherein the plurality of facial information comprises a plurality of features of a user face.
4. The system (10) as claimed in claim 1, wherein the locker (30) comprises an electromagnetic locker (30).
5. The system (10) as claimed in claim 1, wherein the control subsystem () is coupled on the lock of the locker (30).
6. The system (10) as claimed in claim 1, wherein the interface (20) and the control subsystem (40) are also configured to provide access privilege to an authorized person in a premise based on the confirmation signal.
7. The system (10) as claimed in claim 1, further comprising an alert subsystem (100) configured to generate an alert when the locker (30) is accessed by an unauthorized user.
8. The method (120) comprising:
receiving a plurality of facial information of a user; (130)
storing a plurality of predefined facial information of each authorized user; (140)
storing a predefined time interval for each authorized user; (150)
comparing the plurality of received facial information of the user with the plurality of predefined facial information; (160)
generating a confirmation signal based on a compared result and the predefined time interval; and (170)
controlling a lock of the locker based on the confirmation signal to access the locker. (180)
9. The method (120) as claimed in claim 8, further comprising providing access privilege to a guest based on the predefined time interval.
, Description:BACKGROUND
[0001] Embodiments of a present disclosure relate to security arrangements, and more particularly to an access management system and method for operating the same.
[0002] All residences, businesses and governments places employ locks to control physical access to premises and to protect valuable contents and occupants from outsiders. In real estate, access management and physical site visits is a big challenge which requires intervention of multiple stakeholders, sales agent, security guard, inventory manager at all time.
[0003] Currently, an access to key is controlled by an owner of a premises. However, such solution is majorly human driven which is resource heavy and adds heavy monetary overhead. Also, because of the intervention of multiple heads, inventory management is also difficult. Further, keeping track of who has keys to which doors is a big issue.
[0004] In some systems, premises are equipped with the keypad lock in which password is required for access the premises. However, passwords or keypad numbers are unintentionally or consciously revealed which leads to falling security and resulting in a need to re-program the keypad lock to accept a new password.
[0005] Hence, there is a need for an improved access management system to address the aforementioned issues.
BREIF DESCRIPTION
[0006] In accordance with an embodiment of the present disclosure, an access management system is provided. The system includes an interface configured to receive a plurality of facial information of a user. The system also includes a locker communicatively coupled to the interface. The locker includes a control subsystem. The control subsystem includes a database configured to store a plurality of predefined facial information of each authorized user. The database is also configured to store a predefined time interval for each authorized user. The control subsystem also includes an identification subsystem coupled to the database and configured to compare a plurality of received facial information of the user with the plurality of predefined facial information. The identification subsystem is also configured to generate a confirmation signal based on a compared result and the predefined time interval. The control subsystem further includes a controller coupled to the database and the identification subsystem and configured to control a lock of the locker based on the confirmation signal to access the locker.
[0007] In accordance with another embodiment of the present disclosure, a method for operating the access management system is provided. The method includes receiving a plurality of facial information of a user. The method also includes storing a plurality of predefined facial information of each authorized user. The method further includes storing a predefined time interval for each authorized user. The method further includes comparing the plurality of received facial information of the user with the plurality of predefined facial information. The method further includes generating a confirmation signal based on a compared result and the predefined time interval. The method further includes controlling a lock of the locker based on the confirmation signal to access the locker.
[0008] To further clarify the advantages and features of the present disclosure, a more particular description of the disclosure will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the disclosure and are therefore not to be considered limiting in scope. The disclosure will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
[0009] FIG. 1 is a block diagram of an access management system in accordance with an embodiment of the present disclosure;
[0010] FIG. 2 is a block diagram of an exemplary access management system of FIG. 1 in accordance with an embodiment of the present disclosure;
[0011] FIG. 3 illustrates a flow chart representing the steps involved in a method for operating the access management system of FIG. 1 in accordance with an embodiment of the present disclosure.
[0012] Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
[0013] For the purpose of promoting an understanding of the principles of the disclosure, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the disclosure is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the disclosure as would normally occur to those skilled in the art are to be construed as being within the scope of the present disclosure.
[0014] The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or sub-systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
[0015] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this disclosure belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
[0016] In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms “a”, “an”, and “the” include plural references unless the context clearly dictates otherwise.
[0017] Embodiments of the present disclosure relates to an access management system. The system includes an interface configured to receive a plurality of facial information of a user. The system also includes a locker communicatively coupled to the interface. The locker includes a control subsystem. The control subsystem includes a database configured to store a plurality of predefined facial information of each authorized user. The database is also configured to store a predefined time interval for each authorized user. The control subsystem also includes an identification subsystem coupled to the database and configured to compare the plurality of received facial information of the user with the plurality of predefined facial information. The identification subsystem is also configured to generate a confirmation signal based on a compared result and the predefined time interval. The control subsystem further includes a controller coupled to the database and the identification subsystem and configured to control a lock of the locker based on the confirmation signal to access the locker.
[0018] FIG. 1 is a block diagram of an access management system (10) in accordance with an embodiment of the present disclosure. The system (10) includes an interface (20) configured to receive a plurality of facial information of a user. In one embodiment, the interface (20) may include an electronic device such as a mobile phone, a tablet, a laptop or a digital camera. In some embodiments, the plurality of facial information may include a plurality of features of a user face. The system (10) also includes a locker (30) communicatively coupled to the interface (20). In one embodiment, the interface (20) may be embedded in the locker (30). In another embodiment, the interface (20) may be at distance from the locker (30). In a specific embodiment, the locker (30) may include an electromagnetic locker. The locker (30) further includes a control subsystem (40). In some embodiments, the control system (40) may be coupled on a lock of the locker (30).
[0019] Furthermore, the control subsystem (40) includes a database (50) which is configured to store a plurality of predefined facial information of each authorized user. The database (50) is also configured to store a predefined time interval for each authorized user. In one embodiment, the predefined time interval may include in-time and out-time of each of the authorized user. The control subsystem (40) further includes an identification subsystem (60) operatively coupled to the database (50). The identification subsystem (60) is configured to compare the plurality of received facial information of the user with the plurality of predefined facial information. The identification subsystem (60) is further configured to generate a confirmation signal based on a compared result and the predefined time interval. In some embodiments, the identification subsystem (60) may generate a rejection signal upon unsuccessful comparison of the plurality of facial information.
[0020] Moreover, the control subsystem (40) further includes a controller (70) operatively coupled to the database (50) and the identification subsystem (60). The controller (70) is configured to control the lock of the locker (30) based on the confirmation signal to access the locker (30). If the facial information of the user matches with the predefined facial information of the user stored in the database (50), then the user may access the locker (30) and an object inside the locker (30). In addition, if an arrival time of the user matches with the predefined time interval stored in the database (50) for such user, then also the user may access the locker (30).
[0021] In one embodiment, the system (10) may include an alert subsystem (not shown in FIG. 1) configured to generate an alert when the locker (30) is accessed by an intruder or an unauthorized user. In such case, if the facial information of the user does not match with the predefined facial information stored in the database (50) or the arrival time of the user does not match with the predefined time interval, then the alert subsystem (not shown in FIG. 1) generates an alert of an unauthorized access of the locker (30).
[0022] In some embodiments, the interface (20) and the control subsystem (40) may also be configured to provide access privilege to an authorized person in a premise based on the confirmation signal.
[0023] FIG. 2 is a block diagram of an exemplary access management system (10) of FIG. 1 in accordance with an embodiment of the present disclosure. In one embodiment, a premise includes an access management system (10) through which a user may get the access of the building. The access management system (10) is provided at an entrance of the premise. The system (10) includes an interface (20) which receives a plurality of facial information of the user. In one embodiment, the interface (20) may include an electronic device such as a mobile phone, a tablet, a laptop or a digital camera. The electronic device includes an imaging device such as camera to capture the plurality of facial information of the user. In some embodiments, the plurality of facial information may include a plurality of features of a user face. In such embodiment, the plurality of features of the user face may include an iris pattern of a human eye or position and placement of human nose, eye and lips.
[0001] The system (10) further includes a locker (30) communicatively coupled to the interface (20). The locker (30) includes an electromagnetic locking mechanism that restricts the opening of the lock. In one embodiment, the interface (20) may be embedded in the locker (30). In another embodiment, the interface (20) may be at distance from the locker (30). At distance, the locker (30) and interface (20) may communicate each other using a communication network (80). In one embodiment, the communication network (80) may include wired communication network such as LAN. In another embodiment, the communication network may include a wireless communication network such as 2G, 3G, 4G, LTE, HSDPA, WiFi, Bluetooth, Zigbee, Low Power WAN and the like.
[0002] In a specific embodiment, the locker (30) may include a plurality of keys of one or more houses or one or more doors inside the premise. The user may gain entry to the one or more houses by getting the access of the plurality of keys inside the locker (30) or by getting the access privilege of the premises. In one embodiment, the user may gain the access by placing his or her face near the interface (20) which includes one or more face detection sensors. In such embodiment, the one or more face detection sensors may receive the plurality of facial information of the user who request for the access of the plurality of the key.
[0024] Furthermore, the locker (30) includes a control subsystem (40). In some embodiments, the control subsystem (40) may be coupled on a lock (90) of the locker (30). The control subsystem (40) includes a database (50) which is configured to store a plurality of predefined facial information of each authorized user that is used in determining whether to allow a person access. The database (50) is also configured to store a predefined time interval for each authorized user to specify the hours during which the authorized user may gain access to the locker (30) or the premise. In one embodiment, the predefined time interval may include in-time and out-time of each of the authorized user.
[0025] The control subsystem (40) further includes an identification subsystem (60) operatively coupled to the database (50). The identification subsystem (60) is configured to compare the plurality of received facial information of the user with the plurality of predefined facial information. The identification subsystem (60) is further configured to generate a confirmation signal based on a compared result and the predefined time interval. When the user attempts to pass through an access point, the user must place his or her face near the interface (20) for the detection of the plurality of facial information. The identification subsystem (60) compares an electronic representation of the plurality of facial information to the plurality of predefined facial information stored in the database (50).
[0026] In addition, the identification subsystem (60) compares an arrival time of the user with the predefined time interval stored in the database (50) for such user. If this comparison generates a match, then the identification subsystem (60) generates the confirmation signal. In some embodiments, the identification subsystem (60) may generate a rejection signal upon unsuccessful comparison of the plurality of facial information.
[0027] The control subsystem (40) further includes a controller (70) operatively coupled to the database (50) and the identification subsystem (60). The controller (70) is configured to control the lock (90) of the locker (30) based on the confirmation signal to access the locker (30). If the facial information of the user matches with the predefined facial information of the user stored in the database (50), then the confirmation signal is send to the lock (90) and the user may access the locker (30) and the plurality of keys inside the locker (30).
[0028] In one embodiment, the system (10) may include an alert subsystem (100) configured to generate an alert when the locker (30) is accessed by an intruder. In such case, if the facial information of the user does not match with the predefined facial information stored in the database (50) or the arrival time of the user does not match with the predefined time interval, then the alert subsystem (100) generates an alert of an unauthorized access of the locker (30). In a specific embodiment, upon unsuccessful matching, the system (10) may display a message on interface (20) that the facial information did not match. Such situation may occur due to improper placement of the face near interface (20). The user may then re-attempt the access process.
[0029] In some embodiments, the interface (20) and the control subsystem (40) may also be configured to provide access privilege to an authorized person in a premise based on the confirmation signal.
[0030] FIG. 3 illustrates a flow chart representing the steps involved in a method (400) for operating the access management system of FIG. 1 in accordance with an embodiment of the present disclosure. The method (120) includes receiving a plurality of facial information of a user in step 130. In one embodiment, receiving the plurality of facial information of the user comprises receiving a plurality of features of a user face. The method also includes storing a plurality of predefined facial information of each authorized user in step 140. The method (120) further includes storing a predefined time interval for each authorized user in step 150. In some embodiments, storing a predefined time interval for each authorized user comprises storing a in-time and out-time of each of the authorized user.
[0031] The method (120) further includes comparing the plurality of received facial information of the user with the plurality of predefined facial information in step 160. The method (120) further includes generate a confirmation signal based on a compared result and the predefined time interval in step 170. The method (120) further includes controlling a lock of the locker based on the confirmation signal to access the locker in step 180.
[0032] In one embodiment, the method (120) may include generate an alert when the locker is accessed by an unauthorized user. In some embodiments, the method (120) may include providing access privilege to an authorized person in a premise based on the confirmation signal. In such embodiment, the method (120) includes providing access privilege to a guest based on the predefined time interval.
[0033] Various embodiments of the present disclosure provide automatic access management system which reduces the human intervention at every access point. The system is highly secure system as the locker may be accessed by the user’s facial information which unique for every person. Hence, that is difficult to break such a strong access system.
[0034] Furthermore, the system provides the easy track of who is having key and how many persons accessed the keys as the system stores the time interval for each authorized user.
[0035] In addition, the system helps in reducing the overall system cost and complexity by reducing the human efforts required for security of the various access points. Thus, the system reducing the cost by over 90%, increasing overall efficiency of the process and opening multiple routes for exponential growth.
[0036] The system captures various data points including verifying and authenticating end user and company agent, which in turn increases the overall transaction time.
[0037] It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the disclosure and are not intended to be restrictive thereof.
[0038] While specific language has been used to describe the disclosure, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
[0039] The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Documents

Application Documents

# Name Date
1 201841013474-STATEMENT OF UNDERTAKING (FORM 3) [09-04-2018(online)].pdf 2018-04-09
2 201841013474-POWER OF AUTHORITY [09-04-2018(online)].pdf 2018-04-09
3 201841013474-FORM FOR STARTUP [09-04-2018(online)].pdf 2018-04-09
4 201841013474-FORM FOR SMALL ENTITY(FORM-28) [09-04-2018(online)].pdf 2018-04-09
5 201841013474-FORM 1 [09-04-2018(online)].pdf 2018-04-09
6 201841013474-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [09-04-2018(online)].pdf 2018-04-09
7 201841013474-EVIDENCE FOR REGISTRATION UNDER SSI [09-04-2018(online)].pdf 2018-04-09
8 201841013474-DRAWINGS [09-04-2018(online)].pdf 2018-04-09
9 201841013474-DECLARATION OF INVENTORSHIP (FORM 5) [09-04-2018(online)].pdf 2018-04-09
10 201841013474-COMPLETE SPECIFICATION [09-04-2018(online)].pdf 2018-04-09
11 Correspondence by Agent_Complete Specification_13-04-2018.pdf 2018-04-13
12 201841013474-FORM-9 [29-01-2019(online)].pdf 2019-01-29
13 201841013474-FORM 18 [13-04-2022(online)].pdf 2022-04-13
14 201841013474-FER.pdf 2023-03-03

Search Strategy

1 201841013474SearchstratgyE_02-03-2023.pdf