Abstract: Embodiments of the present disclosure disclose a method and a system for detecting a breach of security in an organization. The method comprises receiving input data in real-time from one or more security systems. The method further comprises analyzing the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons, and facial features of the one or more persons. The method further comprises correlating the security information, the trajectory information and the facial features. The method further comprises detecting the security breach in the organization based on the correlation. FIGURE 4
CLIAMS:We claim:
1. A method for detecting a security breach in an organization, comprising:
receiving, by a security breach detection system, input data in real-time from one or more security systems;
analyzing, by the security breach detection system, the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons, and facial features of the one or more persons;
correlating, by the security breach detection system, the security information, the trajectory information and the facial features; and
detecting, by the security breach detection system, the security breach in the organization based on the correlation.
2. The method as claimed in claim 1, wherein the correlation further comprising:
comparing the trajectory information of the persons with a predefined behavior; and
determining a mismatch between the trajectory information of the one or more persons and the predefined behavior.
3. The method as claimed in claim 2, wherein the predefined behavior is updated based on past experiences and the predefined behavior is personalized based on type of work of the one or more persons.
4. The method as claimed in claim 1, wherein the security information comprises at least one of authentication details, swipe data, login data, count of the one or more persons and frames of video feeds.
5. The method as claimed in claim 1, wherein the one or more security system are selected from a group comprising Radio-Frequency Identification(RFID) readers, biometric scanners, image capturing units and authentication database.
6. The method as claimed in claim 1, wherein analyzing the input data comprises:
segmenting the input data based on format of the input data; and
determining rules to process the segmented input data to generate the security information.
7. The method as claimed in claim 1 further comprising raising alerts in real-time upon detecting the security breach, wherein the alerts comprise information of the one or more persons including at least one of entry time, exit time, employee identification number, swipe logs, network logs and time spent in different locations.
8. A security breach detection system for detecting a security breach in an organization, comprising:
a processor; and
a memory communicatively coupled to the processor, wherein the memory stores processor-executable instructions, which, on execution, causes the processor to:
receive input data in real-time from one or more security systems;
analyze the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons and facial features of the one or more persons;
correlate the security information, the trajectory information and the facial features; and
detect the security breach in the organization based on the correlation.
9. The security breach detection system as claimed in claim 8 further comprises:
comparing the trajectory information of the persons with a predefined behavior; and
determining a mismatch between the trajectory information of the one or more persons and the predefined behavior.
10. The security breach detection system as claimed in claim 9, wherein the predefined behavior is updated based on past experiences and the predefined behavior is personalized based on type of work of the one or more persons.
11. The security breach detection system as claimed in claim 8, wherein the security information comprises at least one of authentication details, swipe data, login data, count of the one or more persons and frames of video feeds.
12. The security breach detection system as claimed in claim 8, wherein the one or more security system are selected from a group comprising RFID readers, biometric scanners, image capturing units and authentication database.
13. The security breach detection system as claimed in claim 8, wherein analyzing the input data comprises:
segmenting the input data based on format of the input data; and
determining rules to process the segmented input data to generate the security information.
14. The security breach detection system as claimed in claim 8, further comprising raising alerts in real-time upon detecting the security breach, wherein the alerts comprise information of the one or more persons including at least one of entry time, exit time, employee identification number, swipe logs, network logs and time spent in different locations.
15. A non-transitory computer readable medium including instructions stored thereon that when processed by at least one processor cause a system to perform operations comprising:
receiving input data in real-time from one or more security systems;
analyzing the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons and facial features of the one or more persons;
correlating the security information, the trajectory information and the facial features; and
detecting the security breach in the organization based on the correlation.
Dated this 6th day of January, 2015
R RAMYA RAO
OF K & S PARTNERS
AGENT FOR THE APPLICANT
,TagSPECI:TECHNICAL FIELD
The present subject matter is related, in general to access control systems and more particularly, but not exclusively to a method and a system for detecting a security breach in an organization.
| # | Name | Date |
|---|---|---|
| 1 | 103-CHE-2015 FORM-9 06-01-2015.pdf | 2015-01-06 |
| 2 | 103-CHE-2015 FORM-18 06-01-2015.pdf | 2015-01-06 |
| 3 | abstract 103-CHE-2015.jpg | 2015-01-24 |
| 4 | IP29108-spec.pdf | 2015-03-12 |
| 5 | IP29108-fig.pdf | 2015-03-12 |
| 6 | FORM 5-IP29108.pdf | 2015-03-12 |
| 7 | FORM 3-IP29108.pdf | 2015-03-12 |
| 8 | 103CHE2015_CertifiedCopyRequest.pdf | 2015-03-12 |
| 9 | 103-CHE-2015 POWER OF ATTORNEY 25-05-2015.pdf | 2015-05-25 |
| 10 | 103-CHE-2015 FORM-1 25-05-2015.pdf | 2015-05-25 |
| 11 | 103-CHE-2015 CORRESPONDENCE OTHERS 25-05-2015.pdf | 2015-05-25 |
| 12 | 103-CHE-2015-FER.pdf | 2019-11-14 |
| 13 | 103-CHE-2015-FORM 3 [18-11-2019(online)].pdf | 2019-11-18 |
| 1 | search-21_13-11-2019.pdf |