Abstract: INTEGRATED SECURITY SYSTEM FOR CONTROLLED ACCESS AND HEIGHT-BASED AUTHORIZATION The present invention discloses an integrated security system that enhances access control by combining infrared (IR) sensors, height measurement, and real-time approval mechanisms. The system utilizes IR sensors to detect entry attempts, height sensors to distinguish between adults and children, and a real-time approval process to grant or deny access. In the event of unauthorized access attempts or denied access, the system sends alerts to designated personnel or authorities. This multi-layered approach improves security by preventing unauthorized entry, particularly by young children, and enabling immediate response to potential threats.
Description:FIELD OF THE INVENTION
The present invention relates to security systems and, more particularly, to an integrated security system that controls access based on a combination of infrared (IR) sensors, height measurements, and real-time approval from an authorized individual.
BACKGROUND OF THE INVENTION
Unauthorized entry into restricted areas poses a significant security threat. There is a need for an intelligent system that can distinguish between authorized and unauthorized individuals and provide access control based on predefined criteria, such as approval from an inside person and height measurements to provide access to persons.
EXISTING SOLUTIONS
• Traditional access control systems using simple IR sensors to detect entry attempts.
• Biometric systems that rely on fingerprint or facial recognition for access control.
• Height-based access control systems that prevent children from entering certain areas.
COMPARISON:
• Traditional IR Systems: Only detect entry attempts but lack the ability to differentiate between authorized and unauthorized individuals.
• Biometric Systems: Rely on biometric data, which can be costly and may not be suitable for height-based control.
• Height-Based Systems: Prevent child entry but lack the real-time approval and alert mechanisms.
Security remains a paramount concern in today's world, with the need to protect homes and properties from unauthorized access becoming increasingly crucial. Traditional security measures, while effective to a degree, often suffer from limitations such as reliance on single-factor authentication, vulnerability to breaches, and inability to handle specific scenarios like preventing unsupervised access for children.
Existing security systems typically rely on passwords, keycards, or biometric data for authentication. However, these methods can be compromised through theft, loss, or technological advancements that enable circumvention. Additionally, these systems often lack the capability to differentiate between authorized individuals based on factors like age or height, leading to potential security risks.
Security remains a paramount concern in today's world, with the need to protect homes and properties from unauthorized access becoming increasingly crucial. Traditional security measures, while effective to a degree, often suffer from limitations such as reliance on single-factor authentication, vulnerability to breaches, and inability to handle specific scenarios like preventing unsupervised access for children.
Existing security systems typically rely on passwords, keycards, or biometric data for authentication. However, these methods can be compromised through theft, loss, or technological advancements that enable circumvention. Additionally, these systems often lack the capability to differentiate between authorized individuals based on factors like age or height, leading to potential security risks.
The present invention addresses these challenges by introducing a novel approach to security and access control. By integrating multiple technologies, including infrared (IR) sensors, height measurement, and real-time authorization, the system provides a comprehensive and adaptable solution for safeguarding homes and other secured areas.
The innovative aspect of this invention lies in its ability to combine these technologies to create a multi-layered security protocol. This approach enhances security by not only detecting unauthorized entry attempts but also distinguishing between adults and children. Moreover, the system's real-time approval mechanism allows for immediate intervention by authorized individuals, further strengthening the overall security framework.
The present invention addresses these challenges by introducing a novel approach to security and access control. By integrating multiple technologies, including infrared (IR) sensors, height measurement, and real-time authorization, the system provides a comprehensive and adaptable solution for safeguarding homes and other secured areas.
The innovative aspect of this invention lies in its ability to combine these technologies to create a multi-layered security protocol. This approach enhances security by not only detecting unauthorized entry attempts but also distinguishing between adults and children. Moreover, the system's real-time approval mechanism allows for immediate intervention by authorized individuals, further strengthening the overall security framework.
SUMMARY OF THE INVENTION
This summary is provided to introduce a selection of concepts, in a simplified format, that are further described in the detailed description of the invention.
This summary is neither intended to identify key or essential inventive concepts of the invention and nor is it intended for determining the scope of the invention.
The present invention provides an integrated security system that addresses the limitations of conventional security systems by incorporating multiple layers of security. The system utilizes IR sensors to detect entry attempts, height sensors to differentiate between adults and children, and a real-time approval mechanism to grant or deny access. In the event of unauthorized access attempts, the system sends alerts to designated personnel or authorities.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
The proposed invention is an integrated security system designed to control access based on IR sensor inputs and height measurements. The system operates as follows:
System Initialization: The system is initialized, and the activation time is set.
Monitor IR Sensors: The outside IR sensor monitors entry attempts. If the outside IR sensor is active and the inside IR sensor is inactive, the system proceeds to check the height sensors.
Height Verification: The height sensors determine if the individual is a child. If the height is within the child's range, the system notifies the inside person for approval or child also can open the lock
If the height of outside person is not family persons range and inside IR sensor is not active than alert or information send to nearest station. The Outside IR sensor timer measure the timing if it is more than some time
Inside Person Approval: The family person receives a notification to approve or deny access. If approved, access is granted. If denied, an alert is sent the nearest police station.
Alert Systems: Alerts are sent to notify authorized personnel or authorities of unauthorized entry attempts.
BRIEF DESCRIPTION OF THE DRAWINGS
The illustrated embodiments of the subject matter will be understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and methods that are consistent with the subject matter as claimed herein, wherein:
FIGURE 1: SETUP OF PROPOSE SYSTEM
FIGURE 2: FLOW DIAGRAM OF SYSTEM
The figures depict embodiments of the present subject matter for the purposes of illustration only. A person skilled in the art will easily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.
DETAILED DESCRIPTION OF THE INVENTION
The detailed description of various exemplary embodiments of the disclosure is described herein with reference to the accompanying drawings. It should be noted that the embodiments are described herein in such details as to clearly communicate the disclosure. However, the amount of details provided herein is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present disclosure as defined by the appended claims.
It is also to be understood that various arrangements may be devised that, although not explicitly described or shown herein, embody the principles of the present disclosure. Moreover, all statements herein reciting principles, aspects, and embodiments of the present disclosure, as well as specific examples, are intended to encompass equivalents thereof.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms “a",” “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises,” “comprising,” “includes” and/or “including,” when used herein, specify the presence of stated features, integers, steps, operations, elements and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components and/or groups thereof.
It should also be noted that in some alternative implementations, the functions/acts noted may occur out of the order noted in the figures. For example, two figures shown in succession may, in fact, be executed concurrently or may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
In addition, the descriptions of "first", "second", “third”, and the like in the present invention are used for the purpose of description only, and are not to be construed as indicating or implying their relative importance or implicitly indicating the number of technical features indicated. Thus, features defining "first" and "second" may include at least one of the features, either explicitly or implicitly.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which example embodiments belong. It will be further understood that terms, e.g., those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The present invention is an integrated security system designed to control access based on IR sensor inputs and height measurements. The system operates as follows:
System Initialization: The system is initialized, and the activation time is set.
Monitor IR Sensors: The outside IR sensor monitors entry attempts. If the outside IR sensor is active and the inside IR sensor is inactive, the system proceeds to check the height sensors.
Height Verification: The height sensors determine if the individual is a child. If the height is within the child's range, the system notifies the inside person for approval or child also can open the lock
If the height of outside person is not family persons range and inside IR sensor is not active than alert or information send to nearest station. The Outside IR sensor timer measure the timing if it is more than some time
Inside Person Approval: The family person receives a notification to approve or deny access. If approved, access is granted. If denied, an alert is sent the nearest police station.
Alert Systems: Alerts are sent to notify authorized personnel or authorities of unauthorized entry attempts.
The proposed system comprises the following components:
• IR Sensors: An outside IR sensor monitors entry attempts, and an inside IR sensor detects the presence of individuals within the secured area.
• Height Sensors: These sensors measure the height of an individual attempting to gain access.
• Microcontroller: The microcontroller processes sensor data, makes access decisions, and triggers alerts.
• Communication Module: This module enables communication with authorized individuals (e.g., via mobile notifications) and authorities (e.g., by sending alerts to the nearest police station).
• Lock Mechanism: The lock mechanism controls access to the secured area.
The system operates as follows:
1. System Initialization: The system is initialized, and the activation time is set.
2. Monitor IR Sensors: The outside IR sensor continuously monitors for entry attempts. When the outside IR sensor is triggered and the inside IR sensor is inactive, indicating someone is attempting to enter from the outside, the system proceeds to check the height sensors.
3. Height Verification: The height sensors measure the height of the individual at the entrance. If the height falls within a predefined child's range, the system sends a notification to an authorized individual inside for approval. If the height is outside the family members' range and the inside IR sensor is inactive, an alert is sent to the nearest police station. The outside IR sensor timer measures the duration of the trigger; if it exceeds a certain threshold, an alert is also sent.
4. Inside Person Approval: The authorized individual receives a notification and can choose to approve or deny access. If access is approved, the lock mechanism is unlocked. If access is denied, an alert is sent to the nearest police station.
5. Alert Systems: In the event of unauthorized entry attempts or denied access, the system sends alerts to designated personnel or authorities.
, Claims:1. A security system for controlling access, comprising:
a) An outside infrared (IR) sensor configured to detect entry attempts;
b) An inside IR sensor configured to detect presence within a secured area;
c) At least one height sensor configured to measure the height of an individual at an entrance;
d) A microcontroller configured to receive signals from the IR sensors and the height sensor, process the signals, and make access decisions;
e) A communication module configured to send notifications to authorized individuals and alerts to authorities;
f) A lock mechanism configured to control access to the secured area.
2. The security system as claimed in claim 1, wherein the microcontroller is configured to:
Trigger the height sensor when the outside IR sensor is active and the inside IR sensor is inactive;
Send a notification to an authorized individual inside the secured area if the measured height is within a predefined child's range;
Send an alert to authorities if the measured height is outside a predefined family members' range and the inside IR sensor is inactive;
Send an alert to authorities if the outside IR sensor remains active for a duration exceeding a predefined threshold;
Unlock the lock mechanism if the authorized individual approves access;
Send an alert to authorities if the authorized individual denies access.
3. The security system as claimed in claim 1, also having:
a) A voice control system configured to receive voice commands and control the lock mechanism;
b) A mobile application configured to receive notifications, allow authorized individuals to approve or deny access, and monitor the system's status.
4. A method for controlling access using a security system, comprising the steps of:
a) Monitoring an entrance using an outside IR sensor;
b) Detecting presence within a secured area using an inside IR sensor;
c) Measuring the height of an individual at the entrance using a height sensor when the outside IR sensor is active and the inside IR sensor is inactive;
d) Sending a notification to an authorized individual inside the secured area if the measured height is within a predefined child's range;
e) Sending an alert to authorities if the measured height is outside a predefined family members' range and the inside IR sensor is inactive;
f) Sending an alert to authorities if the outside IR sensor remains active for a duration exceeding a predefined threshold;
g) Unlocking a lock mechanism if the authorized individual approves access;
h) Sending an alert to authorities if the authorized individual denies access.
5. The method as claimed in claim 4, further comprising the steps of:
Receiving voice commands using a voice control system;
Controlling the lock mechanism based on the received voice commands;
Sending notifications and allowing authorized individuals to approve or deny access using a mobile application; and
Monitoring the system's status using the mobile application.
| # | Name | Date |
|---|---|---|
| 1 | 202441069329-STATEMENT OF UNDERTAKING (FORM 3) [13-09-2024(online)].pdf | 2024-09-13 |
| 2 | 202441069329-REQUEST FOR EARLY PUBLICATION(FORM-9) [13-09-2024(online)].pdf | 2024-09-13 |
| 3 | 202441069329-POWER OF AUTHORITY [13-09-2024(online)].pdf | 2024-09-13 |
| 4 | 202441069329-FORM-9 [13-09-2024(online)].pdf | 2024-09-13 |
| 5 | 202441069329-FORM FOR SMALL ENTITY(FORM-28) [13-09-2024(online)].pdf | 2024-09-13 |
| 6 | 202441069329-FORM 1 [13-09-2024(online)].pdf | 2024-09-13 |
| 7 | 202441069329-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [13-09-2024(online)].pdf | 2024-09-13 |
| 8 | 202441069329-EVIDENCE FOR REGISTRATION UNDER SSI [13-09-2024(online)].pdf | 2024-09-13 |
| 9 | 202441069329-EDUCATIONAL INSTITUTION(S) [13-09-2024(online)].pdf | 2024-09-13 |
| 10 | 202441069329-DRAWINGS [13-09-2024(online)].pdf | 2024-09-13 |
| 11 | 202441069329-DECLARATION OF INVENTORSHIP (FORM 5) [13-09-2024(online)].pdf | 2024-09-13 |
| 12 | 202441069329-COMPLETE SPECIFICATION [13-09-2024(online)].pdf | 2024-09-13 |
| 13 | 202441069329-FORM 18 [18-02-2025(online)].pdf | 2025-02-18 |