Sign In to Follow Application
View All Documents & Correspondence

Digital Lock And Security System And Device

Abstract: The present disclosure pertains to a digital lock and security system (100) including a mobile computing device (104, 108) associated with a first entity (106) and a second entity (110), a device (112) including a lock (202), a controller (208), and a displayer (204) configured to display a matrix of numbers, an image capturer (206) configured to capture an image of a second entity (110) and the first entity (106) and correspondingly generate a first set of signals. The mobile computing device (104) associate with the first entity (106) are configured to generate an encrypted code upon receiving the set of alert signals , where the encrypted code is generated after a questionnaire is authenticated by the controller (208), and where the encrypted code is transmitted to the mobile computing device (108) associated with the second entity (110) and the device (112) upon authentication of the questionnaire, and the controller (208) configured to authenticate the encrypted code fed by the second entity (110) through the displayer (204).

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
12 December 2020
Publication Number
24/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
info@khuranaandkhurana.com
Parent Application

Applicants

Chitkara Innovation Incubator Foundation
SCO: 160-161, Sector - 9c, Madhya Marg, Chandigarh- 160009, India.

Inventors

1. SHARMA, Neha
Chitkara University, Chandigarh-Patiala National Highway (NH-64), Village Jansla, Rajpura, Punjab - 140401, India.
2. GEETANJALI
Chitkara University, Chandigarh-Patiala National Highway (NH-64), Village Jansla, Rajpura, Punjab - 140401, India.
3. AGGARWAL, Sonam
Chitkara University, Chandigarh-Patiala National Highway (NH-64), Village Jansla, Rajpura, Punjab - 140401, India.
4. CHATURVEDI, Srishti Priya
Chitkara University, Chandigarh-Patiala National Highway (NH-64), Village Jansla, Rajpura, Punjab - 140401, India.

Specification

Claims:1. A digital lock and security system (100) comprising
a mobile computing device (104, 108) associated with a first entity (106) and a second entity (110) , wherein the mobile computing device (104, 108) is in communication with a device (112), the device (112)comprising
a lock (202);
a displayer (204) operatively coupled to the lock (202) and configured to display a matrix of numbers;
an image capturer (206) operatively coupled to the displayer (204) and configured to capture an image of the second entity (110) and the first entity (106) and correspondingly generate a first set of signals;
a controller (208) operatively coupled to the image capturer (206) and the displayer (204), wherein the controller (208) including one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors configured to:
receive the first set of signals;
convert the first set of signals into a second set of signals, wherein the second set of signals pertain to facial parameters associated with the captured image;
match the facial parameters with a dataset, wherein the dataset includes pre-stored features and characteristics of the image associated with the first entity (106);
transmit a set of alert signals to the mobile computing device (104) associated with the first entity (106) when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image,
and wherein the a mobile computing device (104) associated with the first entity (106) are configured to generate an encrypted code upon receiving the set of alert signals , wherein the encrypted code is generated after a questionnaire is authenticated by the controller (208) , and wherein the encrypted code is transmitted to the mobile computing device (108) associated with the second entity (110) and the device (112) upon authentication of the questionnaire,
wherein the controller (208) is configured to authenticate the encrypted code fed by the second entity (110) through the displayer (204).
2. The system (100) as claimed in claim 1, wherein the encrypted code generated by the mobile computing device (104) are entered by the first entity (106) through the mobile computing device (104) , and wherein the encrypted code is entered by the second entity (110) through the matrix of numbers associated with the displayer (204).
3. The system (100) as claimed in claim 1, wherein the image capturer (206) includes any or a combination of digital camera, scanner and video tape recorder.
4. The system (100) as claimed in claim 1, wherein the questionnaire includes security attributes of the first entity (106), wherein the security attributes include any or a combination of date of birth, electronic mail password, adhar identification number, and pan number.
5. The system (100) as claimed in claim 1, wherein the facial parameters include any or a combination of color of eyes, gap between eyebrows, slant of eyes, check bone, and distance between chick and nose and nose and forehead.
6. The system (100) as claimed in claim 1, wherein the lock (202) is configured to be in as first mode and a second mode, wherein the first mode pertains to a closed configuration and the second mode pertains to an open configuration.
7. The system (100) as claimed in claim 1, wherein upon authentication of the encrypted code by the controller (208) , the lock (202) is configured to be in the open configuration, and wherein the open configuration persist for a pre-determined time.
8. A digital lock and security device (112) comprising:
a lock (202);
a displayer (204) operatively coupled to the lock (202) and configured to display a matrix of numbers;
an image capturer (206) operatively coupled to displayer (204) and configured to capture an image of a second entity (110) and a first entity (106) and correspondingly generate a first set of signals;
a controller (208) operatively coupled to the image capturer (206) and the displayer (204), wherein the controller (208) including one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors configured to:
receive the first set of signals;
convert the first set of signals into a second set of signals, wherein the second set of signals pertain to facial parameters associated with the captured image;
match the facial parameters with a dataset, wherein the dataset includes pre-stored features and characteristics of the image associated with the first entity (106);
transmit a set of alert signals to a mobile computing device (104) associated with the first entity (106) when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image associated with the first entity (106),
and wherein the mobile computing device (104) associated with the first entity (106) is configured to generate a encrypted code upon receiving the set of alert signals, wherein the encrypted code is generated after a questionnaire is authenticated by the controller (208) , and wherein the encrypted code is transmitted to the mobile computing device (108) associated with the second entity (110) and the device (112) upon authentication of the questionnaire,
wherein the controller (208) is configured to authenticate the encrypted code fed by the second entity (108) through the displayer (204).
9. The device (112) as claimed in claim 8, wherein the mobile computing device (104, 108) is associated with the first entity (106) and the second entity (110), wherein the mobile computing device (104, 108) is in communication with the controller (208) through a communication module.
10. The device (112) as claimed in claim 8, wherein upon authentication of the encrypted code by the controller (208), the lock (202) is configured to be in an open configuration, and wherein the open configuration persist for a pre-determined time.

Description:TECHNICAL FIELD
[0001] The present disclosure relates generally to field of digital security. More particularly, the present disclosure provides a digital lock and security system and device.

BACKGROUND
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Theft and fraudulent associated with bank locker, account, and other valuable asset is common and requires special security and privacy to avoid losses and damages. Finger print and encrypted code like one time password, personal identification number and the likes can be means for accessing the bank locker, account, etc. However, even such means are no longer safe and can be hacked by burglar, robber and the likes. In case some important document or money is required to be taken out from the lock and authorized person is out of station or somehow not physically not available to access the lock himself, then the problem arises as to how to get the documents in the absence of the authorized person. In this case the authorized person might ask a legitimate person to operate the lock for him. Therefore, authorizing a person to access fingerprint and code in case of an emergency situation is also required.
[0004] Existing solution can include where fingerprint of legitimate person can be used but this gives access to that legitimate person forever or till the time the fingerprint access is not removed from that solution. However, in case the legitimate person is not a family member or someone whom the authorized person wants to give just one time access, then the finger prints of the legitimate person cannot be used. In that case granting access through a one time password with security question at the end of the authorized person allows safe access for transaction opening of the bank locker, and the likes.
[0005] There is a need to overcome above mentioned problem of prior art by bringing a solution where only authorized person can access the locker through finger prints and in case of emergency, the authorized person can give access to the legitimate person such that the solution restricts access to the legitimate person by using fingerprint and one time password with security questioning forming double layer security. Also, the solution enables granting access by generating one time password to access the bank locker, account, and similar security locks without using fingerprint sensor.

OBJECTS OF THE PRESENT DISCLOSURE
[0006] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as listed herein below.
[0007] It is an object of the present disclosure to provide a system and device that facilitates avoiding theft of important things saved inside locker.
[0008] It is an object of the present disclosure to provide a system and device that that gives an advantage to authorized person as well as legitimate user to access safe lock.
[0009] It is an object of the present disclosure to provide a system and device with double layer of security at times when a person is not available to access the system himself and wants someone else to operate for him.
[0010] It is an object of the present disclosure to provide a system and device with digital Safe lock which restricts access to anybody by using fingerprint sensor and One Time Password with security questioning.

SUMMARY
[0011] The present disclosure relates generally to field of digital security. More particularly, the present disclosure provides a digital lock and security system and device.
[0012] An aspect of the present disclosure pertains to a digital lock and security system. The system may include a mobile computing device associated with a first entity and a second entity, where the mobile computing device may be in communication with a device. The device may include a lock, a displayer operatively coupled to the lock and configured to display a matrix of numbers, an image capturer operatively coupled to displayer and configured to capture an image of a second entity and the first entity and correspondingly generate a first set of signals. The device may include a controller operatively coupled to the image capturer and the displayer, where the controller may include one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors. The controller may be configured to receive the first set of signals and convert the first set of signals into a second set of signals, where the second set of signals may pertain to facial parameters associated with the captured image. The controller may be configured to match the facial parameters with a dataset, where the dataset may include pre-stored features and characteristics of the image associated with the first entity. The controller may be configured to transmit a set of alert signals to the mobile computing device associated with the first entity when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image. The mobile computing device associate with the first entity may be configured to generate a encrypted code upon receiving the set of alert signals, where the encrypted code may be generated after a questionnaire is authenticated by the processor, and where the encrypted code may be transmitted to the mobile computing device associated with the second entity and the device upon authentication of the questionnaire. The controller may be configured to authenticate the encrypted code fed by the second entity in the displayer.
[0013] In an aspect, the encrypted code generated by the mobile computing device are entered by the first entity through the mobile computing device, and where the encrypted code entered by the second entity through the matrix of numbers associated with the displayer.
[0014] In an aspect, the image capturer may includes any or a combination of digital camera, scanner and video tape recorder.
[0015] In an aspect, the questionnaire may include security attributes of the first entity, where the security attributes may include any or a combination of date of birth, electronic mail password, adhar identification number, and pan number.
[0016] In an aspect, the facial parameters may include any or a combination of color of eyes, gap between eyebrows, slant of eyes, check bone, and distance between chick and nose and nose and forehead.
[0017] In an aspect, the lock may be configured to be in as first mode and a second mode, where the first mode may pertain to a closed configuration and the second mode may pertain to an open configuration.
[0018] In an aspect, upon authentication of the encrypted code by the processor, the lock may be configured to be in the open configuration, and where the open configuration persist for a pre-determined time.
[0019] According to an another aspect the present disclosure pertains to a digital lock and security device. The device may include a lock, a displayer operatively coupled to the lock and configured to display a matrix of number and an image capturer operatively coupled to displayer and configured to capture an image of a second entity and the first entity and correspondingly generate a first set of signals. The device may include a controller operatively coupled to the image capturer and the displayer, where the controller may include one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors. The controller may be configured to receive the first set of signal, convert the first set of signals into a second set of signals, where the second set of signals may pertain to facial parameters associated with the captured image. The controller may be configured to match the facial parameters with a dataset, where the dataset may include pre-stored features and characteristics of the image associated with the first entity. The controller may be configured to transmit a set of alert signals to a mobile computing device associated with the first entity when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image associated with the first entity. The mobile computing device associated with the first entity may be configured to generate a encrypted code upon receiving the set of alert signals, where the encrypted code may be generated after a questionnaire is authenticated by the controller, and where the encrypted code may be transmitted to the mobile computing device associated with the second entity and the device upon authentication of the questionnaire. The controller may be configured to authenticate the encrypted code fed by the second entity in the displayer.
[0020] In an aspect, the mobile computing device may be associated with the first entity and the second entity, where the mobile computing device may be in communication with the controller through a communication module.
[0021] In an aspect, upon authentication of the encrypted code by the processor, the lock may be configured to be in an open configuration, and where the open configuration may persist for a pre-determined time.

BRIEF DESCRIPTION OF THE DRAWINGS
[0022] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0023] The diagrams are for illustration only, which thus is not a limitation of the present disclosure, and wherein:
[0024] FIG. 1 illustrates a network implementation of proposed digital lock and security system, in accordance with an embodiment of the present disclosure.
[0025] FIG. 2 illustrates a block diagram of proposed digital lock and security device, in accordance with an embodiment of the present disclosure.
[0026] FIG. 3 illustrates exemplary functional components of controller of the proposed digital lock and security device, in accordance with an embodiment of the present disclosure.

DETAIL DESCRIPTION
[0027] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[0028] Embodiments of the present invention include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, firmware and/or by human operators.
[0029] Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present invention with appropriate standard computer hardware to execute the code contained therein. An apparatus for practicing various embodiments of the present invention may involve one or more computers (or one or more processors within a single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the invention could be accomplished by modules, routines, subroutines, or subparts of a computer program product.
[0030] If the specification states a component or feature “may”, “can”, “could”, or “might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
[0031] As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0032] Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this invention will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).
[0033] While embodiments of the present invention have been illustrated and described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the spirit and scope of the invention, as described in the claim.
[0034] The present disclosure relates generally to field of digital security. More particularly, the present disclosure provides a digital lock and security system and device.
[0035] FIG. 1 illustrates a network implementation of proposed digital lock and security system, in accordance with an embodiment of the present disclosure.
[0036] As illustrated in FIG. 1, the proposed system 100 (also referred to as system 100, herein) can include a networking module 102, one or more first entities 106 ( 106-1, 106-2, 106-3…..106-N, collectively referred as first entities 106, and individually referred to as first entity 106), one or more mobile computing devices 104 (104-1, 104-2, 104-3….104-N, collectively referred to as mobile computing devices 104, and individually referred to as mobile computing device 104, herein), where the mobile computing device (104) can be associated with the first entity 106. The system (100) can include a server 114, and a device (112). The system (100) can include one or more second entities 110 ( 110-1, 110-2, 110-3…..110-N, collectively referred as second entities 110, and individually referred to as second entity 110), one or more mobile computing devices 108 (108-1, 108-2, 108-3….108-N, collectively referred to as mobile computing devices 108, and individually referred to as mobile computing device 108, herein), where the mobile computing device (108) can be associated with the second entity 110. The N can be integer.
[0037] In an embodiment, the system (100) can be implemented using any or a combination of hardware components and software components such as a cloud, a server, a computing system, a computing device, a network device and the like. Further, the mobile computing device (104) associated with the first entity (106) and the mobile computing device (108) associated with the second entity (110) can interact with the device (112) through plurality of networking module, such as Wi-Fi, Bluetooth, Li-Fi, or an application, that can reside in the mobile computing device (104, 108). In an implementation, the system (100) can be accessed by the networking module (102) or a server (114) that can be configured with any operating system, including but not limited to, AndroidTM, iOSTM, and the like.
[0038] In an embodiment, the mobile computing device (104, 108) and the device (112) can communicate with the system (100) through the networking module (102). The mobile computing device (104, 108) can include any or a combination of cell phone, mobile, laptop, c, a smart camera, a smart phone, a portable computer, a personal digital assistant, a handheld device,, and the likes.
[0039] Further, the networking module (102) can be a wireless network, a wired network or a combination thereof that can be implemented as one of the different types of networks, such as Intranet, Local Area Network (LAN), Wide Area Network (WAN), Internet, and the like. Further, the networking module (102) can either be a dedicated network or a shared network. The shared network can represent an association of the different types of networks that can use variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like.
[0040] In an embodiment, the device (112) can be communicatively coupled with the mobile computing device (104, 108) with help of a communication module, where the communication module can include any or a combination of Bluetooth low energy (BLE), ZigBee, and the likes.
[0041] In an illustrative embodiment, when important document or money is required to be taken out and the first entity (106) is out of station or somehow physically not available to access the system (100), then the first entity (106) can give access to the second entity (110), where the second entity (110) can be legitimate person, but not limited to the likes. In another illustrative embodiment, when the first entity (106) or the second entity (110) a tries to access a lock associated with the device (112) through a scanner and a displayer using fingerprint sensor for more than ten seconds but not limited to the likes or uses a keypad associated with the displayer for access more than three times, but not limited to the likes. The image capturer (206) can be configured to camera capture the image of the first entity (106) or the second entity (110) person and uploads the image to the server (114).
[0042] In an illustrative embodiment, the mobile computing device (104) associated with the first entity (106) can be configured to receive the captured image and checks the captured image stored on the server (114) and an encrypted code like one time password (OTP), but not limited to the likes can be generated through the communication module. In another illustrative embodiment, the OTP generated can be sent to the device (112) for synchronization, and when the synchronization is completed, the keypad associated with the displayer can be activated to receive the sent OTP. The first entity (104) or the second entity (110) can enter the OTP through the keypad and upon authentication, the lock can be opened.
[0043] In an illustrative embodiment, the system (100) includes one master who can access the lock with help of finger prints. However, in case of emergency, when the master is not available and wants to access the lock, the master can give access to the second entity (110), where the master can be the first entity (106). In another illustrative embodiment, when the second entity (110) tires to open the lock for a pre-defined time like ten seconds, but not limited to the likes and type a wrong encrypted code for pre-determined number of times like three, but not limited to the likes, the image capturer can be configured to capture image of the second entity (110) and an alert signals can be generated by a controller associated with the device (112), where the alert signals can be transmitted to the mobile computing device (104) associated with the first entity (106). When the firs entity (106) wants, the OTP can be transmitted to the mobile computing device (108) associated with the second entity (110) and the device (112). The OTP can be generated by the first entity (106) after filling a questionnaire, where the questionnaire can include security attributes associated with the first entity (106),avoiding a situation if the mobile computing device (104) is stolen or misplaced and then the OTP is generated. The OTP can be sent to second entity (110) and after authentication by the controller, the lock can be opened, where the lock can be opened for a pre-determined time.
[0044] In an illustrative embodiment, the system (100) facilitates providing double layer security for digital lock and security system (100).
[0045] FIG. 2 illustrates a block diagram of proposed digital lock and security device, in accordance with an embodiment of the present disclosure.
[0046] As illustrated in FIG. 2, the proposed device (112) can include a lock (202), a displayer (204), an image capturer (206), and a controller (208). The device (112) can be digital lock and security based device. In an embodiment, the lock (202) can be configured to be in as first mode and a second mode, where the first mode can pertain to a closed configuration and the second mode can pertain to an open configuration. In another embodiment, the displayer (204) can be operatively coupled to the lock (202) and configured to display a matrix of numbers. In an illustrative embodiment, the displayer (204) can be display screen but not limited to the likes, with matrix of numbers configured with the display screen, where the display screen can be of pre-determined dimension including length and width of the displayer (204). In another illustrative embodiment, upon authentication of the encrypted code by the controller, the lock is configured to be in the open configuration, and wherein the open configuration persist for a pre-determined time.
[0047] In an embodiment, the image capturer (206) can be operatively coupled to the displayer (204) and configured to capture an image of a second entity (110) and a first entity (106) and correspondingly generate a first set of signals. In an illustrative embodiment, the image capturer (206) can include any or a combination of digital camera, scanner, video tape recorder, and the likes.
[0048] In an embodiment, the controller (208) can be operatively coupled to the image capturer (206) and the displayer (204), where the controller (208) can include one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors. The controller (208) can be configured to receive the first set of signals from the image capturer (206). The controller (208) can be configured to convert the first set of signals into a second set of signals, where the second set of signals can pertain to facial parameters associated with the captured image. The controller (208) can be configured to match the facial parameters with a dataset, where the dataset can include pre-stored features and characteristics of the image associated with the first entity. The controller (208) can be configured to transmit a set of alert signals to a mobile computing device (104) associated with the first entity (106) when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image associated with the first entity (106). In an illustrative embodiment, the facial parameters can include any or a combination of color of eyes, gap between eyebrows, slant of eyes, check bone, distance between chick and nose and nose and forehead, and the likes.
[0049] In an illustrative embodiment, the controller (208) can be configured to receive the first set of signals from the image capturer (206) in electrical form, where the first set of signals can be converted into machine readable form or binary form by the controller (208). In another illustrative embodiment, the controller (208) can be any or a combination of microprocessor, microcontroller, Arduino Uno, At mega 328, other similar processor, but not limited to the likes. The controller (208) can be configured to transmit the set of alert signals generated by the controller to the mobile computing device (104) associated with the first entity (106) in machine readable form or binary form.
[0050] In an embodiment, the mobile computing device (104) associated with the first entity (106) is configured to generate an encrypted code upon receiving the set of alert signals , where the encrypted code can be generated after a questionnaire is authenticated by the controller (208). In another embodiment, the encrypted code can be transmitted to the mobile computing device (108) associated with the second entity (110) upon authentication of the questionnaire. In yet another embodiment, the controller (208) can be configured to authenticate the encrypted code fed by the second entity (110) in the displayer (204).
[0051] In an illustrative embodiment, the encrypted code generated by the mobile computing device (104) are entered by the first entity (106) through the mobile computing device (104) , and where the encrypted code entered by the second entity (110) through the matrix of numbers can be associated with the displayer. In another illustrative embodiment, the questionnaire can include security attributes of the first entity, wherein the security attributes include any or a combination of date of birth, electronic mail password, adhar identification number, and pan number. In yet another illustrative embodiment, upon authentication of the encrypted code by the controller (208), the lock (202) can be configured to be in the open configuration, and where the open configuration can persist for a pre-determined time.
[0052] In an illustrative embodiment, the device (112) can include a scanner configured to scan attributes of the first entity (106) and the second entity (110), where the attributes can include any or a combination of eye, finger print, thumb impression, and the likes. The controller (208) can be configured to match the attributes of the first entity (106) and the second entity (110) with pre-stored attributes of the first entity, where the pre-stored attributes of the first entity (106) can be stored in a database. In another illustrative embodiment, the controller (208) can be configured to actuate the image capturer (206), when the scanned attributed does not match with the pre-stored attributes, where the image capturer (206) can be configured to capture the image of the first entity (106) and the second entity (110) whose attributes does not match with the pre-stored attributes.
[0053] In an illustrative embodiment, the image capturer (204) can be configured to capture the image of the first entity (104) and the second entity (110) and correspondingly generate the first set of signals. The controller (208) can be configured to convert the first set of signals into the second set of signals, where the second set of signals can pertain to facial parameters associated with the captured image and the controller (208) can be configured to match the facial parameters with the pre-stored features and characteristics of the image associated with the first entity (106) and when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image, the controller (208) can be configured to transmit the set of alert signals to the mobile computing device (104) associated with the first entity (106). After the mobile computing device (104) receives the set of alert signals, the questionnaire can be displayed on the mobile computing device (104), where the questionnaire can pertain to security attributes associated with the first entity (106), where the security attributes can include any or a combination of date of birth, electronic mail password, adhar identification number, pan number, and the likes. The questionnaire can be filed by the first entity (106) and authenticated by the controller (208) through a communication module. The mobile computing device (104, 108) can be in communication with the controller (208) through the communication module, where the communication module can include any or a combination of Wireless Fidelity (Wi-Fi) module, Bluetooth module, Li-Fi module, optical fiber, Wireless Local Area Network (WLAN), and ZigBee module and the likes.
[0054] In an illustrative embodiment, upon authentication of the questionnaire filled by the first entity (106), the first entity (106) can be configured to feed the encrypted code through the mobile computing device (104), where the mobile computing device (104) can be configured to transmit the encrypted code to the mobile computing device (108) associated with the second entity (110) and the device (112). In another illustrative embodiment, the second entity (110) can feed the received encrypted code through the displayer (204) and the controller (208) can be configured to authenticate the encrypted code, such that the encrypted code received by the device and the mobile computing device (108) are same.
[0055] In an illustrative embodiment, when the controller (208) authenticates the encrypted code, the controller (208) can be configured to bring the lock (202) in the second mode, where the second mode pertains to open configuration of the lock (202), where the open configuration persist for a pre-determined time, and where the pre-determined time can be controlled and monitored by the controller (208).
[0056] In an illustrative embodiment, the first entity (106) can include any or a combination of owner of the lock (202), concerned person for decrypting the lock (202) regarding important document, cash withdrawal, valuable ornament, precious metal and the likes and the second entity (110) can include person to whom access for the lock (202) and decrypting the lock (202) can be given.
[0057] FIG. 3 illustrates exemplary functional components of controller of the proposed digital lock and security device, in accordance with an embodiment of the present disclosure.
[0058] As illustrated in an embodiment, the controller (208) can include one or more processor(s) (302). The one or more processor(s) (302) can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) (302) are configured to fetch and execute computer-readable instructions stored in a memory (304) of the controller (208). The memory (304) can store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. The memory (304) can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0059] In an embodiment, the controller (208) can also include an interface(s) (306). The interface(s) (306) may include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) (306) may facilitate communication of the controller (208) with various devices coupled to the controller (208). The interface(s) (306) may also provide a communication pathway for one or more components of controller (208). Examples of such components include, but are not limited to, processing engine(s) (308) and database (310).
[0060] In an embodiment, the processing engine(s) (308) can be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) (308). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) (308) may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) (308) may include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (308). In such examples, the controller (208) can include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to controller (208) and the processing resource. In other examples, the processing engine(s) (308) may be implemented by electronic circuitry. A database (310) can include data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine(s) (308).
[0061] In an embodiment, the processing engine(s) (308) can include a conversion unit (312), a matching unit (314), a signal generation unit (316), an authentication unit (318), and other unit (s) (320). The other unit(s) (320) can implement functionalities that supplement applications or functions performed by the system (100) or the processing engine(s) (308).
[0062] The database (310) can include data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine(s) (308).
[0063] It would be appreciated that units being described are only exemplary units and any other unit or sub-unit may be included as part of the system (100). These units too may be merged or divided into super- units or sub-units as may be configured.
[0064] As illustrated in FIG. 3, the controller (208) can be configured to receive a first set of signals from an image capturer (206). In an illustrative embodiment, the controller (208) can be configured to convert the first set of signals into a second set of signals with help of the conversion unit (312), where the second set of signals can pertain to facial parameters associated with the captured image. The controller (208) can be configured to match the facial parameters with a dataset with help of the matching unit (314), where the dataset can include pre-stored features and characteristics of the image associated with the first entity (106). The controller (208) can be configured to transmit a set of alert signals with help of the signal generation unit (316) to the mobile computing device (104) associated with the first entity (106) when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the image. The controller (208) can be configured to authenticate an encrypted code with help of the authentication unit (316) fed by the second entity (110) in the displayer (204)., where the encrypted code can be generated by the mobile computing device (104) associated with the first entity (106) upon receiving the set of alert signals from the signal generation unit (316).
[0065] In an illustrative embodiment, the controller (208) can be configured to receive the first set of signals from the image captures (206) in electrical form and transmit the first set of signals in electrical form to the conversion unit (312). In another illustrative embodiment, the conversion unit (312) can be configured to convert the first set of signals from electrical form to machine readable form or binary form into the second set of signals, where the second set of signals can pertain to facial parameters of the first entity (106). In yet another illustrative embodiment, the conversion unit (312) can be configured to transmit the facial parameters to the matching unit (314).
[0066] In an illustrative embodiment, the matching unit (314) can be configured to match the facial parameters with the dataset, where the dataset includes pre-stored features and characteristics of images associated with the first entity (106). The pre-stored features and characteristics of the images can be stored in the database (310). In another illustrative embodiment, the matching unit (314) can be configured to match the facial parameters received from the conversion unit (312), where the facial parameters of the captured image can be matched with the pre-stored characteristics and features and characteristics of the images.
[0067] In an illustrative embodiment, the signal generation unit (316) can be configured to receive unmatched facial parameters from the matching unit (314) in machine readable from of binary form. The signal generation unit (316) can be configured to generate the set of alert signals in machine readable form or binary form when the facial parameters of the captured image does not match with the pre-stored characteristics and features of the images associated with the first entity (106). The signal generation unit (316) can be configured to transmit the set of alert signals to the mobile computing device (104) associated with the first entity (106), when the facial parameters of the captured image does not match with the pre-stored features and characteristics of the images associated with the first entity (106).
[0068] In an illustrative embodiment, after the set of alert signals are transmitted to the mobile computing device (104) associated with the first entity (106), the mobile computing device (104) can be configured to generate an encrypted code and transmit the encrypted code to the mobile computing device (108) associated with the second entity (110) and a device (112). After the set of alert signals are received by the mobile computing device (104) associated with the first entity (106), a questionnaire can be displayed on the mobile computing device (104), where the questionnaire can pertain to security attributes associated with the first entity (106), where the questionnaire can be filled by the first entity, and only upon authentication of the questionnaire by the authentication unit (316), the encrypted code can be feed into the mobile computing device (104) by the first entity (106), where the encrypted code can be transmitted to the mobile computing device (108) associated with the second entity (110) and the device (112) through a communication module.
[0069] In an illustrative embodiment, the security attributes can include any or a combination of date of birth, electronic mail password, adhar identification number, pan number, and the likes, where the security attributes can be stored in the database (310). In another illustrative embodiment, the encrypted code any be one time password, personal identification number, and the likes.
[0070] In an illustrative embodiment, the second entity (110) after receiving the encrypted code transmitted from the mobile computing device (104) associated with the first entity (106) to the mobile computing device (108) associated with the second entity (110), can feed the encrypted code through a displayer (204), where the displayer (204) can be configured with a matrix of numbers, and where the authentication unit (316) can be configured to authenticate the encrypted code fed by the second entity (110) through the displayer (204). In another illustrative embodiment, the authentication unit (316) can be configured to authenticate the encrypted code feed through the displayer with the received encrypted code to the device (112) from the mobile computing device (106) associated with the first entity (104). Upon authentication, a lock (202) can be in second mode, where the second mode can be open configuration of the lock (202).
[0071] It should be apparent to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, ` components, or steps that are not expressly referenced.
[0072] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.

ADVANTAGES OF THE PRESENT DISCLOSURE
[0073] The present disclosure provides a system and device that facilitates avoiding theft of important things saved inside locker.
[0074] The present disclosure provides a system and device that gives an advantage to authorized person as well as legitimate user to access safe lock.
[0075] The present disclosure provides a system and device with double layer of security at times when a person is not available to access the system himself and wants someone else to operate for him.
[0076] The present disclosure provides a system and device with digital Safe lock which restricts access to anybody by using fingerprint sensor and One Time Password with security questioning.

Documents

Application Documents

# Name Date
1 202011054100-STATEMENT OF UNDERTAKING (FORM 3) [12-12-2020(online)].pdf 2020-12-12
2 202011054100-POWER OF AUTHORITY [12-12-2020(online)].pdf 2020-12-12
3 202011054100-FORM FOR STARTUP [12-12-2020(online)].pdf 2020-12-12
4 202011054100-FORM FOR SMALL ENTITY(FORM-28) [12-12-2020(online)].pdf 2020-12-12
5 202011054100-FORM 1 [12-12-2020(online)].pdf 2020-12-12
6 202011054100-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [12-12-2020(online)].pdf 2020-12-12
7 202011054100-EVIDENCE FOR REGISTRATION UNDER SSI [12-12-2020(online)].pdf 2020-12-12
8 202011054100-DRAWINGS [12-12-2020(online)].pdf 2020-12-12
9 202011054100-DECLARATION OF INVENTORSHIP (FORM 5) [12-12-2020(online)].pdf 2020-12-12
10 202011054100-COMPLETE SPECIFICATION [12-12-2020(online)].pdf 2020-12-12
11 202011054100-Proof of Right [28-12-2020(online)].pdf 2020-12-28
12 202011054100-FORM 18 [14-09-2022(online)].pdf 2022-09-14
13 202011054100-FER.pdf 2022-12-12
14 202011054100-FORM-26 [12-06-2023(online)].pdf 2023-06-12
15 202011054100-FER_SER_REPLY [12-06-2023(online)].pdf 2023-06-12
16 202011054100-CORRESPONDENCE [12-06-2023(online)].pdf 2023-06-12
17 202011054100-COMPLETE SPECIFICATION [12-06-2023(online)].pdf 2023-06-12
18 202011054100-CLAIMS [12-06-2023(online)].pdf 2023-06-12

Search Strategy

1 SearchHistoryE_09-12-2022.pdf