Sign In to Follow Application
View All Documents & Correspondence

Image Capturing Security System And Method

Abstract: The present disclosure pertains to an image capturing security system and method. The system includes one or more processors configured to receive a set of inputs from computing device associated with a user, where the computing device includes an image sensor. The one or more processors are configured to transmit recording attributes in response to the received set of inputs, where the recording attributes are stored in database of the one or more processors. The recording attributes includes any or a combination of email verification code, authentication code, personal identification number, alphanumeric key, digital security key, and the like. The one or more processors after verifying the authentication code and the digital security key, enable in accessing and activating the image sensor and upon non verification, helps in blocking the image sensor and disables the image sensor for a pre-determined time for capturing one or more images.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
25 May 2021
Publication Number
09/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
info@khuranaandkhurana.com
Parent Application

Applicants

Chitkara Innovation Incubator Foundation
SCO: 160-161, Sector - 9c, Madhya Marg, Chandigarh- 160009, India.

Inventors

1. SHARMA, Chetan
Chitkara University, Atal Shiksha Kunj, Pinjore-Nalagarh National Highway (NH-21A), District: Solan - 174103, Himachal Pradesh, India.
2. SAHORE, Deepak
Chitkara University, Atal Shiksha Kunj, Pinjore-Nalagarh National Highway (NH-21A), District: Solan - 174103, Himachal Pradesh, India.
3. SINGH, Jagmohan
Chitkara University, Atal Shiksha Kunj, Pinjore-Nalagarh National Highway (NH-21A), District: Solan - 174103, Himachal Pradesh, India.
4. GUPTA, Lipika
Associate Professor (ECE), Chitkara University, Atal Shiksha Kunj, Pinjore-Nalagarh National Highway (NH-21A), District: Solan - 174103, Himachal Pradesh, India.

Specification

Description:TECHNICAL FIELD
[0001] The present disclosure relates to the field of digital safety. More particularly, the present disclosure relates to an image capturing security system and method for computing devices.

BACKGROUND
[0002] Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Hacking is biggest problem in digital security and other technical field as hacking increases risk of information leakage, and threat. Hacking can be related to devices from which personal information associated with user can be extorted. Some of the devices can be smart phone, laptop, and the like from where personal information can be hacked. Camera associated with the devices can become a threat when hacker can make use of the camera of the device without user knowledge. Various passwords and locking system can be configured with the device to prevent hackers from using camera or related function of the device for safety.
[0004] Existing solutions can include locking system, different patterns for password to avoid use of camera without owner’s knowledge. However, the lock and password with single layer and security can easily be hacked and the camera can be misused by the hacker or similar entity. Other solutions can include applications that facilitates in locking the camera of the device. However, the application includes single safety process for avoiding such threat.
[0005] There is a need to overcome above mentioned problems of prior art by bringing a solution that facilitates in keeping camera or image sensor of the device safe and reduces risk of hacking. Also, the solution includes double safety layer for allowing access to the camera or image sensor, where the user can know if other entity than user access the camera of the device. The solution can include double authentication of digital security key and related code to ensure safety of the image sensor and camera of the device.

OBJECTS OF THE PRESENT DISCLOSURE
[0006] Some of the objects of the present disclosure, which at least one embodiment herein satisfies are as listed herein below.
[0007] It is an object of the present disclosure to provide an image capturing security system and method that facilitates secure login for user.
[0008] It is an object of the present disclosure to provide an image capturing security system and method that enables in providing double security for camera and image sensor associated with computing device
[0009] It is an object of the present disclosure to provide an image capturing security system and method that restricts use of the camera of the computing device without knowledge of computing device owner.
[0010] It is an object of the present disclosure to provide an image capturing security system and method that facilitates in providing safety for image sensor and any unauthorized access to the image sensor.
[0011] It is an object of the present disclosure to provide an image capturing security system and method that prevents operation of the image sensor without authentication code, and digital security key like personal identification number and one time password.

SUMMARY
[0012] The present disclosure relates to the field of digital safety. More particularly, the present disclosure relates to an image capturing security system and method for computing devices.
[0013] An aspect of the present disclosure pertains to an image capturing security system. The system may include one or more processors operatively coupled to a memory storing set of instructions, where upon execution of the set of instructions the one or more processors may be configured to receive a set of inputs from one or more computing devices, where the one or more computing devices may be communicatively coupled to the one or more processors, and configured with an image sensor, where the one or more computing devices may be configured to receive a set of inputs from a user.
[0014] In an aspect, the one or more processors may be configured to transmit recording attributes to the one or more computing devices, where the recording attributes may be transmitted in response to the received set of inputs from the user, where the set of inputs may pertain to user credentials, where the recording attributes may facilitate in registering the user credentials in a database of the one or more processors.
[0015] In an aspect, the one or more processors may be configured to receive an authentication code and a digital security key from the one or more computing devices in response to the transmitted recording attributes. The one or more processors may be configured to verify the authentication code and the digital security key with pre-stored recording attributes residing in the database, and correspondingly may transmit a set of activation signals upon positive verification of the authentication code and the digital security key. The set of activation signals may be transmitted to the one or more computing devices, and where the set of activation signals may facilitate in activating the image sensor associated with the one or more computing devices of an authenticated user.
[0016] In an aspect, the user credentials may include user name, password, electronic mail address, user information, email id, and phone number.
[0017] In an aspect, the recording attributes may include email verification code, personal identification number, and alphanumeric key.
[0018] In an aspect, the digital security key may pertain to any or a combination of personal identification number (PIN) alphanumeric key, and where the authentication code may pertain to one time password.
[0019] In an aspect, positive verification of the authentication code and the digital security key may pertain to matching of the PIN and the one time password with the pre-stored recording attributes, where the PIN may be entered by the authenticated user and the one time password may be generated in response to the entered PIN by the one or more processors.
[0020] In an aspect, a negative verification of the authentication code and the digital security key may pertain to unmatched authenticated code and the digital security key with the pre-stored recording attributes.
[0021] In an aspect, upon negative verification, the one or more processors may be configured to transmit a set of blocking signals to the one or more computing devices, where the set of blocking signals may enable in deactivating the image sensor associated with the one or more computing devices.
[0022] In an aspect, the one or more processors may be configured to authenticate the PIN entered by the authenticated user for a pre-determined number of times.
[0023] In an aspect, after invalidation of the PIN entered by the authenticated user for the pre-defined number of times, the one or more processors may be configured to transmit a set of alert signals to at least one of the one or more computing devices and facilitates in resetting the user credentials and recording attributes.
[0024] Another aspect of the disclosure pertains to an image capturing security method. The method may include a step of receiving, by one or more processors, a set of inputs from one or more computing devices, where the one or more processors may be communicatively coupled to the one or more computing devices, and configured with an image sensor, where the one or more computing device may be configured to receive a set of inputs from a user. The method may include a step of transmitting, by the one or more processors, recording attributes, where the recording attributes can be transmitted to the one or more computing devices in response to the received set of inputs from the user, where the set of inputs can pertain to user credentials, where the recording attributes can facilitate in registering the user credentials in a database of the one or more processors. The method may include a step of receiving, by the one or more processors, an authentication code and a digital security key from the one or more computing devices in response to the transmitted recording attributes, and verifying, by the one or more processors, the authentication code and the digital security key with pre-stored recording attributes residing in the database. The method may include a step of transmitting, by the one or more processors , a set of activation signals upon positive verification, and a set of blocking signals upon negative verification of the authentication code and the digital security key, where the set of activation signals and the set of blocking signals can be transmitted to the one or more computing devices, and where the set of activation signals can facilitate in activating the image sensor and the set of blocking signals can facilitate in deactivating and disabling the image sensor associated with the one or more computing devices of an authenticated user for a pre-determined time.

BRIEF DESCRIPTION OF THE DRAWINGS
[0025] The accompanying drawings are included to provide a further understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure.
[0026] The diagrams are for illustration only, which thus is not a limitation of the present disclosure, and wherein:
[0027] FIG. 1 illustrates network architecture of proposed image capturing security system, to elaborate upon its working in accordance with an embodiment of the present disclosure.
[0028] FIG. 2 illustrates exemplary functional components of the proposed image capturing security system, in accordance with an embodiment of the present disclosure.
[0029] FIG. 3 illustrates an exemplary flow chart of step involved in functioning of the proposed image capturing security system, in accordance with an embodiment of the present disclosure.
[0030] FIG. 4 illustrates an exemplary flow diagram of image capturing security method in accordance with an embodiment of the present disclosure.
[0031] FIG. 5 illustrates an exemplary computer system in which or with which embodiments of the present invention can be utilized in accordance with embodiments of the present disclosure.
DETAIL DESCRIPTION
[0032] In the following description, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[0033] While embodiments of the present invention have been illustrated and described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the spirit and scope of the invention, as described in the claim.
[0034] The present disclosure relates to the field of digital safety. More particularly, the present disclosure relates to an image capturing security system and method for computing devices.
[0035] FIG. 1 illustrates network architecture of proposed image capturing security system, to elaborate upon its working in accordance with an embodiment of the present disclosure.
[0036] In an embodiment, FIG. 1 illustrates a network diagram for the proposed image capturing security system (102) (also referred to as system (102), herein). The system (102) is communicatively coupled to one or more computing devices (106) devices (106-1, 106-2…106-N(collectively referred to as computing devices (106)), and individually referred to as computing device (106), herein), which are associated with one or more users (108) (108-1, 108-2…108-N(collectively referred to as users (108), and individually referred to as user (108), herein), coupled with one another through a network (104) (interchangeably referred to as networking module or networking unit (104), herein). In an embodiment, the system (102) can include one or more processors, where the one or more processors can be communicatively coupled to the computing device (106), associated with the user (108). In another embodiment, the system (102) can be communicatively coupled to a server (110) via the network (104).
[0037] In an illustrative embodiment, the network (104) can include a communication unit including any or a combination of Wireless local area network (WLAN), Wireless fidelity (Wi-fi), Worldwide interoperability for microwave access (WiMAX), cellular communication module, Bluetooth module, Zigbee, infrared wireless, ultra wideband, and the like.
[0038] In an illustrative embodiment, the one or more processors can be configured with the computing device (106) with help of the networking module (104), where the computing device (106) can include any or a combination of cell phones, mobiles, laptops, computers, a smart phone, a portable computer, a personal digital assistant, a handheld device, computer, and the likes.
[0039] In an embodiment, the computing device (106) can include an image sensor like camera, scanner, where the image sensor can facilitate in capturing one or more images of the user (108). In another embodiment, the system (102) can facilitate in customizing image sensor and enables in controlling operation of the image sensor to capture images of the user (108). In yet another embodiment, the system (102) can enable in initializing the image sensor of the computing device (106) after verifying an authentication code and a digital security key with help of the one or more processors.
[0040] In an illustrative embodiment, the system (102) can facilitate in blocking and disabling the image sensor like camera associated with the computing device (106) for a pre-determined time when the authentication code and the digital security key does not matches with a database of the processor.
[0041] In an embodiment, the system (100) can be configured to one or more processors can be configured can be operatively coupled to a memory, where the one or more processors can be in communication with the computing device (106) through the communication unit. In another embodiment, the one or more processors can be configured to register user credentials from set of inputs received from the user (108), where the user credentials includes any or a combination of user name, password, user information, email id, phone number, and the like. The recording attributes can be received by the computing device (106) and accordingly the user (108) can be an authenticated user.
[0042] In an illustrative embodiment, the system (102) can facilitate in preventing unauthorized access of a camera installed in the computing device (106). The system (102) can enable in performing authorization of the user (108) to access the camera of the computing device (106) such as smart phone, laptop, and the like. The camera can be operatively coupled with the one or more processors, and while using the camera first time, the user (108) is required to get registered first. The one or more processors can be configured to transmit the recording attributes pertaining to the registered user (108) and facilitate in displaying the recording attributes on a display unit associated with the computing device (106), where the user (108) can input the recording attributes such as email id verification code, alphanumeric key, recording attributes include email verification code, personal identification number, and alphanumeric key. Name, phone number, email id and the likes, and, an authentication code is transmitted to the provided phone number and email id. When the user (108) inputs the correct authentication code received on the computing device (106), and the email id, the user gets registered to access camera of the computing device (106).
[0043] In an illustrative embodiment, when the user (108) opens the camera, a message can be displayed on the display unit to input a password, and a one time password (OTP) can be sent to the associated phone number, and upon receiving the correct OTP entered by the user (108), the one or more processors can enable the user (108) to access the camera, else the camera is blocked for a pre-defined amount of time.
[0044] In an embodiment, the system (102) can be implemented using any or a combination of hardware components and software components such as a cloud, a server, a computing system, a computing device, a network device and the like. Further, the computing device (106) can interact with the one or more processors and the server (110) through plurality of networking module (104), such as Wi-Fi, Bluetooth, Li-Fi, or an application, that can reside in the computing device (106). In an implementation, the system (102) can be accessed by the networking module (104) or a server that can be configured with any operating system, including but not limited to, AndroidTM, iOSTM, and the like.
[0045] Further, the networking module (104) can be a wireless network, a wired network or a combination thereof that can be implemented as one of the different types of networks, such as Intranet, Local Area Network (LAN), Wide Area Network (WAN), Internet, and the like. Further, the networking module (102) can either be a dedicated network or a shared network. The shared network can represent an association of the different types of networks that can use variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like.
[0046] FIG. 2 illustrates exemplary functional components of the proposed image capturing security system, in accordance with an embodiment of the present disclosure.
[0047] FIG. 3 illustrates an exemplary flow chart of step involved in functioning of the proposed image capturing security system, in accordance with an embodiment of the present disclosure.
[0048] As illustrated in an embodiment, the system (102) can include one or more processor(s) (202). The one or more processor(s) (202) can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) (202) are configured to fetch and execute computer-readable instructions stored in a memory (204) of the system (102). The memory (204) can store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. The memory (204) can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0049] In an embodiment, the system (102) can also include an interface(s) (206). The interface(s) (206) may include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) (206) may facilitate communication of the system (102) with various devices coupled to the system (102) like a display unit of computing device (106). The interface(s) (206) may also provide a communication pathway for one or more components of system (102). Examples of such components include, but are not limited to, processing engine (208) and database (210).
[0050] In an embodiment, the processing engine (208) can be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the controller (208). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine (208) may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine (208) may include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine (208). In such examples, the system (102) can include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to system (102) and the processing resource. In other examples, the processing engine (208) may be implemented by electronic circuitry. A database (210) can include data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine (208).
[0051] In an embodiment, the processing engine (208) can include a verification unit (212), signal generation unit (214), and other unit(s) (216). The other unit(s) (216) can implement functionalities that supplement applications or functions performed by the system (102) or the processing engine (208).
[0052] The database (210) can include data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine (208).
[0053] As illustrated in FIG. 2, the system (102) can include one or more processors (202) (interchangeably referred to as processor or processing unit (202), herein) where the processing unit (202) can be configured to receive a set of inputs from a computing device (106). The computing device is configured to receive the set of inputs from a user (108), where the set of inputs can pertain to user credentials like user name, password, email id, phone number, and the like. In an embodiment, the processing unit (202) can receive the set of inputs and store in the database (210).
[0054] In an illustrative embodiment, the verification unit (212) can be configured to transmit recording attributes to the computing device (106) upon receiving and storing the user credentials, where the recording attributes can facilitate in registering the user (108) for accessing an image sensor configured with the computing device (106). In another illustrative embodiment, the recording attributes can include any or a combination of alphanumeric key, email verification code, authentication code, personal identification number (PIN), digital security key, and the like, where the recording attributes can be stored in the database (210).
[0055] In an illustrative embodiment, after the computing device (106) receives the recording attributes, the user (108) can enter at least one of the recording attributes and when the user (108) wants to access the image sensor, the user (108) enters the authentication code, and the digital security key through the computing device (106). In another illustrative embodiment, the verification unit (212) can be configured to verify the authentication code and the digital security key received from the computing device (106) with the pre-stored recording attributes stored in the database (210).
[0056] In an illustrative embodiment, upon positive verification of the authentication code and the digital security key, the verification unit (212) can be configured to transmit a set of verifying signals to the signal generation unit (214). In another illustrative embodiment, the positive verification pertains to matching of the received authentication code and the digital security key with the pre-stored recoding attributes. In yet another illustrative embodiment, the digital security key can pertain to any or a combination of personal identification number (PIN) alphanumeric key, and where the authentication code can pertain to one time password.
[0057] In an illustrative embodiment, the PIN can be entered by the authenticated user and the one time password can be generated in response to the entered PIN by the verification unit (212). In another illustrative embodiment, negative verification of the authentication code and the digital security key pertains to unmatched authenticated code and the digital security key with the pre-stored recording attributes. In yet another illustrative embodiment, upon negative verification, the verification unit (212) can be configured to transmit the set of non verifying signals to the signal generation unit (214).
[0058] In an illustrative embodiment, upon receiving the set of verifying signals from the verification unit (212), the signal generation unit (214) can be configured to transmit a set of activation signals to the computing device (106), where the computing device enables in activating and initializing the image sensor upon receiving the set of activation signals. In another illustrative embodiment, the set of activation signals can enable in providing access to the image sensor to capture one or more images and only registered user with verified authentication code and digital security key can have access for the image sensor of the computing device (106).
[0059] In an illustrative embodiment, upon receiving the set of non verifying signals from the verification unit (212) pertaining to the negative verification of the authentication code and the digital security key, the signal generation unit (214) can be configured to transmit a set of blocking signals to the computing device (106), where the set of blocking signals can enable in deactivating the image sensor and blocking the image sensor access for the user (108). In another illustrative embodiment, the one or more processors can be configured to authenticate the PIN entered by the authenticated user for a pre-determined number of times. For example, the user (108) can enter incorrect PIN for three times and then the signal generation unit (214) can be configured to transmit the set of blocking signals to the computing device to disable functioning or access for the image sensor or camera of the computing device (106).
[0060] In an illustrative embodiment, the signal generation unit (214) can be configured to transmit a set of alert signals upon negative verification of the authentication code and the digital security key, where the set of alert signals can be transmitted to the computing device (106) in form of SoS alert, email, message, and the like. In another illustrative embodiment, the set of alert signals can help the user (108) to re-register for accessing the image sensor or camera and to receive the recording attributes through the processor (202).
[0061] In an illustrative embodiment, the other unit(s) (216) can include a timing unit, where the timing unit can facilitate in blocking the image sensor for a pre-determined time, where the pre-determined time can include thirty minutes, but not limited to the like.
[0062] In an illustrative embodiment, upon initialization of the image sensor, the computing device (106) displays a request for entering the PIN, and upon verification of the PIN by the verification unit (212), the onetime password can be sent by the verification unit (212) to the computing device and upon matching of the onetime password the access for the image sensor or camera can be done and enables in capturing the one or more images.
[0063] In an illustrative embodiment, the system (102) can be an application, where the application can be downloaded by the computing device and the user (108) can register for accessing the image sensor or camera by entering user credentials like user name, password, email id, phone number, and the like and the system (102) can send the one time password and email verification code to the user (108) and the user (108) can be registered and the user credentials can be stored in the database (210) of the system (102).
[0064] After authentication of the user (108) email id and the user credentials, the recording attributes can be sent to the computing device (106) associated with the user (108) and upon entering the recording attributes by the user (108) through the computing device (1060, and authentication, the image sensor or camera can be initialized for capturing the one or more images. The system (102) can facilitate in displaying a pop window for PIN, where the user (108) can enter the PIN and upon verification of the PIN, the OTP can be sent to the computing device (106). The OTP can be verified and upon positive verification of both the PIN and OTP, the camera or the image sensor can be accessed by the user (108).
[0065] In an illustrative embodiment, upon negative verification of the PIN, the system (102) can sent a reset link to reset and re-enter the user credentials and can transmit the recording attributes as per the re-entered user credentials, where the reset link can be sent to the computing device (106) in form of message or mail, but not limited to the like. In another illustrative embodiment, upon entering wrong OTP for a pre-determined number of times, the system (102) can block the camera or access to the camera or image sensor and disables the image sensor as shown in FIG. 3. In yet another illustrative embodiment, the system (102) can help in providing double security for accessing image sensor or camera associated with the computing device (106) and facilitates in securing the camera by double security layer.
[0066] It would be appreciated that units being described are only exemplary units and any other unit or sub-unit may be included as part of the system (102). These units too may be merged or divided into super- units or sub-units as may be configured. Also, some units may be associated with the processor and other units may be associated with the controller.
[0067] FIG. 4 illustrates an exemplary flow diagram of image capturing security method in accordance with an embodiment of the present disclosure.
[0068] In an embodiment, FIG. 4 illustrates an image capturing security method (400). The method (400) can include a step (402) of receiving, by one or more processors (202), a set of inputs from one or more computing devices (106), where the one or more processors (202) can be communicatively coupled to the one or more computing devices (106), and configured with an image sensor, where the one or more computing devices (106) can be configured to receive a set of inputs from a user (108).
[0069] In an embodiment, the method (400) includes a step (404) of transmitting, by the one or more processors (202), recording attributes, where the recording attributes can be transmitted to the one or more computing devices (106), in response to the received set of inputs from the user (108), where the set of inputs can pertain to user credentials, where the recording attributes can facilitate in registering the user credentials in a database of the one or more processors (202).
[0070] In an embodiment, the method (400) can include a step (406) of receiving, by the one or more processors (202), an authentication code and a digital security key from the one or more computing devices (106) in response to the transmitted recording attributes.
[0071] In an embodiment, the method (400) can include a step (408) of verifying, by the one or more processors (202), the authentication code and the digital security key with pre-stored recording attributes residing in the database (210).
[0072] In an embodiment, the method (400) can include a step (410) of transmitting, by the one or more processors (202), a set of activation signals upon positive verification, and a set of blocking signals upon negative verification of the authentication code and the digital security key, where the set of activation signals and the set of blocking signals can be transmitted to the one or more computing devices (106), and where the set of activation signals can facilitate in activating the image sensor and the set of blocking signals can facilitate in deactivating and disabling the image sensor associated with the one or more computing devices (106) of an authenticated user for a pre-determined time.
[0073] FIG. 5 illustrates an exemplary computer system in which or with which embodiments of the present invention can be utilized in accordance with embodiments of the present disclosure.
[0074] As shown in FIG. 5, computer system includes an external storage device (510), a bus (520), a main memory (530), a read only memory (540), a mass storage device (550), communication port (560), and a processor (570). A person skilled in the art will appreciate that computer system may include more than one processor and communication ports. Examples of processor (570) include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on a chip processors or other future processors. Processor (570) may include various modules associated with embodiments of the present invention. Communication port (560) can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port (560) may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[0075] In an embodiment, the memory (530) can be Random Access Memory (RAM), or any other dynamic storage device commonly known in the art. Read only memory (540) can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 570. Mass storage (550) may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[0076] In an embodiment, the bus 520 communicatively couples processor(s) 570 with the other memory, storage and communication blocks. Bus 520 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor 570 to software system.
[0077] In another embodiment, operator and administrative interfaces, e.g. a display, keyboard, and a cursor control device, may also be coupled to bus 520 to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 560. External storage device 510 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[0078] As used herein, and unless the context dictates otherwise, the term "coupled to" is intended to include both direct coupling (in which two elements that are coupled to each other contact each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean “communicatively coupled with” over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[0079] While the foregoing describes various embodiments of the invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.

ADVANTAGES OF THE PRESENT DISCLOSURE
[0080] The present disclosure provides an image capturing security system and method that facilitates secure login for user.
[0081] The present disclosure provides an image capturing security system and method that enables in providing double security for camera and image sensor associated with computing device.
[0082] The present disclosure provides an image capturing security system and method that restricts use of the camera of the computing device without knowledge of computing device owner.
[0083] The present disclosure provides an image capturing security system and method that facilitates in providing safety for image sensor and any unauthorized access to the image sensor.
[0084] The present disclosure provides an image capturing security system and method that prevents operation of the image sensor without authentication code, and digital security key like personal identification number and one time password.

We Claims:

1. An image capturing security system comprising:
one or more processors operatively coupled to a memory storing set of instructions, wherein upon execution of the set of instructions the one or more processors are configured to:
receive a set of inputs from one or more computing devices, wherein the one or more computing devices are communicatively coupled to the one or more processors, and configured with an image sensor, wherein the one or more computing device is configured to receive a set of inputs from a user;
transmit recording attributes to the one or more computing devices, wherein the recording attributes are transmitted in response to the received set of inputs from the user, wherein the set of inputs pertain to user credentials, wherein the recording attributes facilitates in registering the user credentials in a database of the processor;
receive an authentication code and a digital security key from the one or more computing devices in response to the transmitted recording attributes, and
verify the authentication code and the digital security key with pre-stored recording attributes residing in the database, and correspondingly transmit a set of activation signals upon positive verification, and a set of blocking signals upon negative verification of the authentication code and the digital security key, wherein the set of activation signals and the set of blocking signals are transmitted to the one or more computing devices, and wherein the set of activation signals facilitate in activating the image sensor and the set of blocking signals facilitates in deactivating and disabling the image sensor associated with the one or more computing devices of an authenticated user for a pre-determined time.
2. The system as claimed in claim 1, wherein the user credentials include user name, password, electronic mail address, user information, email id, and phone number.
3. The system as claimed in claim 1, wherein the recording attributes include email verification code, personal identification number, and alphanumeric key.
4. The system as claimed in claim 1, wherein the digital security key pertains to any or a combination of personal identification number (PIN) alphanumeric key, and wherein the authentication code pertains to one time password.
5. The system as claimed in claim 1, wherein positive verification of the authentication code and the digital security key pertains to matching of the PIN and the one time password with the pre-stored recording attributes, wherein the PIN is entered by the authenticated user and the one time password is generated in response to the entered PIN by the one or more processors.
6. The system as claimed in claim 1, wherein a negative verification of the authentication code and the digital security key pertains to unmatched authenticated code and the digital security key with the pre-stored recording attributes.
7. The system as claimed in claim 6, wherein the one or more processors are configured to authenticate the PIN entered by the authenticated user for a pre-determined number of times.
8. The system as claimed in claim 8, wherein after invalidation of the PIN entered by the authenticated user for the pre-defined number of times, the one or more processors are configured to transmit a set of alert signals to at least one of the one or more computing devices and facilitates in resetting the user credentials and recording attributes.
9. An image capturing security method comprising:
receiving, by one or more processors, a set of inputs from one or more computing devices, wherein the one or more processors are communicatively coupled to the one or more computing devices, and configured with an image sensor, wherein the one or more computing device is configured to receive a set of inputs from a user;
transmitting, by the one or more processors, recording attributes, wherein the recording attributes are transmitted to the one or more computing devices in response to the received set of inputs from the user, wherein the set of inputs pertain to user credentials, wherein the recording attributes facilitates in registering the user credentials in a database of the one or more processors;
receiving, by the one or more processors, an authentication code and a digital security key from the one or more computing devices in response to the transmitted recording attributes, and
verifying, by the one or more processors, the authentication code and the digital security key with pre-stored recording attributes residing in the database,
transmitting, by the one or more processors , a set of activation signals upon positive verification, and a set of blocking signals upon negative verification of the authentication code and the digital security key, wherein the set of activation signals and the set of blocking signals are transmitted to the one or more computing devices, and wherein the set of activation signals facilitate in activating the image sensor and the set of blocking signals facilitates in deactivating and disabling the image sensor associated with the one or more computing devices of an authenticated user for a pre-determined time.

Documents

Application Documents

# Name Date
1 202111023307-STATEMENT OF UNDERTAKING (FORM 3) [25-05-2021(online)].pdf 2021-05-25
2 202111023307-POWER OF AUTHORITY [25-05-2021(online)].pdf 2021-05-25
3 202111023307-FORM FOR STARTUP [25-05-2021(online)].pdf 2021-05-25
4 202111023307-FORM FOR SMALL ENTITY(FORM-28) [25-05-2021(online)].pdf 2021-05-25
5 202111023307-FORM 1 [25-05-2021(online)].pdf 2021-05-25
6 202111023307-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [25-05-2021(online)].pdf 2021-05-25
7 202111023307-EVIDENCE FOR REGISTRATION UNDER SSI [25-05-2021(online)].pdf 2021-05-25
8 202111023307-DRAWINGS [25-05-2021(online)].pdf 2021-05-25
9 202111023307-DECLARATION OF INVENTORSHIP (FORM 5) [25-05-2021(online)].pdf 2021-05-25
10 202111023307-COMPLETE SPECIFICATION [25-05-2021(online)].pdf 2021-05-25
11 202111023307-Proof of Right [14-07-2021(online)].pdf 2021-07-14
12 202111023307-FORM 18 [28-02-2023(online)].pdf 2023-02-28
13 202111023307-FER.pdf 2024-01-24
14 202111023307-FER_SER_REPLY [24-07-2024(online)].pdf 2024-07-24
15 202111023307-DRAWING [24-07-2024(online)].pdf 2024-07-24
16 202111023307-CORRESPONDENCE [24-07-2024(online)].pdf 2024-07-24
17 202111023307-COMPLETE SPECIFICATION [24-07-2024(online)].pdf 2024-07-24
18 202111023307-CLAIMS [24-07-2024(online)].pdf 2024-07-24
19 202111023307-ABSTRACT [24-07-2024(online)].pdf 2024-07-24
20 202111023307-US(14)-HearingNotice-(HearingDate-16-09-2025).pdf 2025-08-18
21 202111023307-FORM-26 [11-09-2025(online)].pdf 2025-09-11
22 202111023307-Correspondence to notify the Controller [11-09-2025(online)].pdf 2025-09-11
23 202111023307-Written submissions and relevant documents [30-09-2025(online)].pdf 2025-09-30
24 202111023307-FORM-26 [30-09-2025(online)].pdf 2025-09-30
25 202111023307-Annexure [30-09-2025(online)].pdf 2025-09-30

Search Strategy

1 202111023307E_08-01-2024.pdf