Sign In to Follow Application
View All Documents & Correspondence

Method And System For Detecting A Security Breach In An Organization

Abstract: Embodiments of the present disclosure disclose a method and a system for detecting a breach of security in an organization. The method comprises receiving input data in real-time from one or more security systems. The method further comprises analyzing the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons, and facial features of the one or more persons. The method further comprises correlating the security information, the trajectory information and the facial features. The method further comprises detecting the security breach in the organization based on the correlation. FIGURE 4

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
06 January 2015
Publication Number
05/2015
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
ipo@knspartners.com
Parent Application

Applicants

WIPRO LIMITED
Doddakannelli, Sarjapur Road, Bangalore 560035, Karnataka, India.

Inventors

1. ABHISHEK SUMAN
House - Swastika Vihar, Ranchi Road, Opp Laxmi Petrol Pump, PO: Bihar Sharif, Dist: Nalanda, Bihar - 803101
2. SREEVIDYA KHATRAVATH
H.No.1-2/2, Balaji Nagar Colony, Near Ambedkar Statue, Jillelguda, Hyderabad, Ranga Reddy, Andhra Pradesh, 500060
3. MANIKHANTAN SANKARA RAMAN
No - 225, G – Mount Apartments, Yadaval Street, Adambakkam, Chennai, Tamil Nadu – 600088

Specification

CLIAMS:We claim:

1. A method for detecting a security breach in an organization, comprising:
receiving, by a security breach detection system, input data in real-time from one or more security systems;
analyzing, by the security breach detection system, the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons, and facial features of the one or more persons;
correlating, by the security breach detection system, the security information, the trajectory information and the facial features; and
detecting, by the security breach detection system, the security breach in the organization based on the correlation.

2. The method as claimed in claim 1, wherein the correlation further comprising:
comparing the trajectory information of the persons with a predefined behavior; and
determining a mismatch between the trajectory information of the one or more persons and the predefined behavior.

3. The method as claimed in claim 2, wherein the predefined behavior is updated based on past experiences and the predefined behavior is personalized based on type of work of the one or more persons.

4. The method as claimed in claim 1, wherein the security information comprises at least one of authentication details, swipe data, login data, count of the one or more persons and frames of video feeds.

5. The method as claimed in claim 1, wherein the one or more security system are selected from a group comprising Radio-Frequency Identification(RFID) readers, biometric scanners, image capturing units and authentication database.

6. The method as claimed in claim 1, wherein analyzing the input data comprises:
segmenting the input data based on format of the input data; and
determining rules to process the segmented input data to generate the security information.

7. The method as claimed in claim 1 further comprising raising alerts in real-time upon detecting the security breach, wherein the alerts comprise information of the one or more persons including at least one of entry time, exit time, employee identification number, swipe logs, network logs and time spent in different locations.

8. A security breach detection system for detecting a security breach in an organization, comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores processor-executable instructions, which, on execution, causes the processor to:
receive input data in real-time from one or more security systems;
analyze the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons and facial features of the one or more persons;
correlate the security information, the trajectory information and the facial features; and
detect the security breach in the organization based on the correlation.

9. The security breach detection system as claimed in claim 8 further comprises:
comparing the trajectory information of the persons with a predefined behavior; and
determining a mismatch between the trajectory information of the one or more persons and the predefined behavior.

10. The security breach detection system as claimed in claim 9, wherein the predefined behavior is updated based on past experiences and the predefined behavior is personalized based on type of work of the one or more persons.

11. The security breach detection system as claimed in claim 8, wherein the security information comprises at least one of authentication details, swipe data, login data, count of the one or more persons and frames of video feeds.

12. The security breach detection system as claimed in claim 8, wherein the one or more security system are selected from a group comprising RFID readers, biometric scanners, image capturing units and authentication database.

13. The security breach detection system as claimed in claim 8, wherein analyzing the input data comprises:
segmenting the input data based on format of the input data; and
determining rules to process the segmented input data to generate the security information.

14. The security breach detection system as claimed in claim 8, further comprising raising alerts in real-time upon detecting the security breach, wherein the alerts comprise information of the one or more persons including at least one of entry time, exit time, employee identification number, swipe logs, network logs and time spent in different locations.

15. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a system to perform operations comprising:
receiving input data in real-time from one or more security systems;
analyzing the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons and facial features of the one or more persons;
correlating the security information, the trajectory information and the facial features; and
detecting the security breach in the organization based on the correlation.

Dated this 6th day of January, 2015

R RAMYA RAO
OF K & S PARTNERS
AGENT FOR THE APPLICANT
,TagSPECI:TECHNICAL FIELD

The present subject matter is related, in general to access control systems and more particularly, but not exclusively to a method and a system for detecting a security breach in an organization.

Documents

Application Documents

# Name Date
1 103-CHE-2015 FORM-9 06-01-2015.pdf 2015-01-06
2 103-CHE-2015 FORM-18 06-01-2015.pdf 2015-01-06
3 abstract 103-CHE-2015.jpg 2015-01-24
4 IP29108-spec.pdf 2015-03-12
5 IP29108-fig.pdf 2015-03-12
6 FORM 5-IP29108.pdf 2015-03-12
7 FORM 3-IP29108.pdf 2015-03-12
8 103CHE2015_CertifiedCopyRequest.pdf 2015-03-12
9 103-CHE-2015 POWER OF ATTORNEY 25-05-2015.pdf 2015-05-25
10 103-CHE-2015 FORM-1 25-05-2015.pdf 2015-05-25
11 103-CHE-2015 CORRESPONDENCE OTHERS 25-05-2015.pdf 2015-05-25
12 103-CHE-2015-FER.pdf 2019-11-14
13 103-CHE-2015-FORM 3 [18-11-2019(online)].pdf 2019-11-18

Search Strategy

1 search-21_13-11-2019.pdf