Abstract: "SECURITY SYSTEM AND MECHANISM FOR PASSIVE OPTICAL BOXES" [0001] A security system (106) and security mechanism for a passive optical box (108) are disclosed. The security system (106) is easy to install and designed to retrofit. The security system (106) includes a base assembly (102) and a lid assembly (104). The base assembly (102) encloses an electromechanical lock (202) and a controller (204). The controller (204) is communicatively coupled with the electromechanical lock (202) to control its operation. The lid assembly (104) is secured on the top of the base assembly (102). The base assembly (102) and the lid assembly (104) altogether form a casing or covering for the electromechanical lock (202) and the controller (204). The security system (106) is communicatively coupled with a mobile device (302), having a mobile application, in a wired or wireless manner that allows to lock, unlock, access, and manage the passive optical box (108).
FIELD OF INVENTION
[0001] The present disclosure relates to the field of passive optical communication and more specifically relates to a security system and mechanism for passive optical boxes. This application is based on and derives the benefit of Indian Provisional Application 202011042467 filed on 30th September, 2020, the contents of which are incorporated herein by reference.
BACKGROUND OF INVENTION
[0002] Optical fiber cables are the core and fundamental part of the current high-speed network infrastructure. The optical fiber cables are installed in long-haul and multi-branched communication networks. The communication networks have multiple independent optical fiber cable distribution and termination points, which are generally enclosed in passive optical boxes, may also be termed as optical panels or enclosures, for management and easy deployments/distribution of optical fiber links to various users premises for a variety of applications. In general, the passive optical boxes are installed in various buildings, offices, and the like.
[0003] Security of the passive optical boxes and in-built elements/components is an important aspect as well as a serious concern, especially when they are installed in an outdoor environment. Typically, the passive optical boxes are secured through usual means such as mechanical locks to prevent any theft. These mechanical locks operate with a specific key or a few keys. However, the conventional mechanical locks are heavy for the passive optical boxes and do not offer the desired protection as they can easily be broken down by using some tools. Therefore, security breaching problems are associated with conventional locking systems. Further, the conventional solutions do not provide real-time monitoring and controlling, access management, product health management, material management for the passive optical boxes.
[0004] In view of the aforementioned problems, the present invention seeks to ameliorate the aforementioned disadvantages by providing a useful alternative.
OBJECT OF INVENTION
[0005] The primary object of the present disclosure is to provide a security system and mechanism for a passive optical box for theft prevention.
[0006] Another object of the present disclosure is to provide an application for managing and controlling the security system of the passive optical box.
[0007] Another object of the present disclosure is to provide real-time remote monitoring of the passive optical box without human intervention.
SUMMARY
[0008] In an aspect, a security system and security mechanism for a passive optical box are disclosed. The security system is easy to install and designed to retrofit. The security system includes a base assembly and a lid assembly. The base assembly encloses an electromechanical lock and a controller. The controller acts like a control panel that is communicatively coupled with the electromechanical lock to control its operation. The lid assembly is secured on the top of the base assembly. The base assembly and the lid assembly altogether form a casing or covering for the electromechanical lock and the controller.
[0009] The security system is communicatively coupled with a mobile device, having a mobile application, in a wired or wireless manner that allows to lock, unlock, access and manage the passive optical box.
[0010] Advantageously, the proposed solution provides ease of management of passive network inventory or passive optical box using an automated solution leveraging the Internet-of-Things (IoT) platform for managing passive cabinets and enclosures in both indoor and outdoor environments.
[0011] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments
herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF FIGURES
[0012] The invention is illustrated in the accompanying drawings, throughout which reference letters indicate corresponding parts in the various figures. The embodiments herein will be better understood from the following description with reference to the drawings, in which:
[0013] FIG. 1 illustrates a perspective view of a passive optical box incorporating a security system;
[0014] FIG. 2a illustrates a cross-sectional view of the security system;
[0015] FIG. 2b illustrates a top perspective view of the security system;
[0016] FIG. 2c illustrates a left perspective view of the security system;
[0017] FIG. 2d illustrates a front perspective view of a lid assembly; and
[0018] FIG. 3 illustrates the security system communicatively coupled with a mobile device.
DETAILED DESCRIPTION OF INVENTION
[0019] In the following detailed description of embodiments of the invention, numerous specific details are set forth in order to provide a thorough understanding of the embodiment of the invention. However, it will be obvious to a person skilled in the art that the embodiments of the invention may be practiced with or without these specific details. In other instances, well known methods, procedures and components have not been described in detail so as not to unnecessarily obscure aspects of the embodiments of the invention.
[0020] Furthermore, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions and equivalents will be apparent to those skilled in the art, without parting from the scope of the invention.
[0021] The accompanying drawings are used to help easily understand various technical features and it should be understood that the embodiments presented herein are not limited by the accompanying drawings. As such, the present disclosure should be construed to extend to any alterations, equivalents and substitutes in addition to those which are particularly set out in the accompanying drawings. Although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are generally only used to distinguish one element from another.
[0022] Unlike conventional locking systems and mechanisms such as mechanical locks operated with keys, the present disclosure provides a passive optical box inventory management that incorporates a lock or security system and mechanism for theft prevention and detection that is operated through a mobile application. The mobile application wirelessly and remotely controls the security system and provides real-time monitoring of the passive optical box without human intervention.
[0023] Referring now to the drawings, and more particularly to FIGS. 1 through 3, there are shown preferred embodiments.
[0024] FIG. 1 illustrates a perspective view of a passive optical box (108) incorporating a security system (106). FIG. 2a illustrates a cross-sectional view of
the security system (106). FIG. 2b illustrates a top perspective view of the security system (106). FIG. 2c illustrates a left perspective view of the security system (106). FIG. 2d illustrates a front perspective view of a lid assembly (104). The passive optical box (100) is coupled with the security system (106) through mechanical or other suitable means. The security system (106) is easy to install and designed to retrofit. The security system (106) includes a base assembly (102) and the lid assembly (104).
[0025] The base assembly (102) encloses an electromechanical lock (202) and a controller (204). The electromechanical lock (202) may be a deadbolt or deadlock or any other suitable lock that may be rotated for locking and unlocking. The controller (204) acts like a control panel that is communicatively coupled with the electromechanical lock (202) to control its operation. The lid assembly (104) is secured on the top of the base assembly (102). In general, the base assembly (102) and the lid assembly (104) altogether form a casing or covering for the electromechanical lock (202) and the controller (204), thus all the elements form the proposed security system (106).
[0026] FIG. 3 illustrates the security system communicatively coupled with a mobile device that provides ease of management of passive network inventory or passive optical box using automated solution leveraging Internet-of-Things (IoT) platform for managing passive cabinets and enclosures in both indoor and outdoor environments. The security system (106) is installed on the passive optical box (108). The proposed security system (106) may be retrofitted to any passive optical box (108). The security system (106) is communicatively coupled with the mobile device (302) in a wired or wireless manner that allows locking/unlock/access/manage the passive optical box (108).
[0027] The wired connection may utilize an On The Go (OTG) adapter or any other suitable connector for connecting the security system (106) with the mobile device (302). The wireless connection may utilize near field communication (NFC), Bluetooth, Zigbee, or any other suitable wireless communication mechanism. The mobile device (302) may be, for example, a portable, hand-held, computer-comprised, or vehicle-mounted device, which is enabled to communicate
voice and/or data. The mobile device (302) may be a smartphone that comprises an application (also referred to as a mobile app/application) and is operated by a user (staff) to manage the security and inventory of the passive optical box (108). In case of wireless connection, the mobile device can communicate with the security system (106) to lock and unlock the passive optical box (108) wirelessly, receive notifications when the staff operates the passive optical box (108), and manage the accessibility of the security system (106) remotely.
[0028] In an aspect, the passive optical box (108) is incorporated with an un-powered security system (106), which is connected with the mobile device (302) using the wired connection. Once the wired connection is established and the user has logged in to the application after verification, the user may unlock the passive optical box (108) for accessing and managing it. The application has server-managed access control. That is, the application is communicatively coupled to a server via an SSL (secure sockets layer) or other suitable protocols that create an encrypted channel between the application and the server. The server may be stored such as cloud storage, where user data is transmitted for further processing. In case of unavailability of the network, the user data may be stored in a local memory of the mobile device (302) and forwarded to the server once the network strength is good.
[0029] The memory or storage may include one or more computer-readable storage media. The memory may include non-volatile storage elements. Examples of such non-volatile storage elements may include magnetic hard discs, optical discs, floppy discs, flash memories, or forms of electrically programmable memories (EPROM) or electrically erasable and programmable (EEPROM) memories. In addition, the memory may, in some examples, be considered a non-transitory storage medium. The term "non-transitory" may indicate that the storage medium is not embodied in a carrier wave or a propagated signal. However, the term "non-transitory" should not be interpreted that the memory is non-movable.
[0030] The user data may be usage log, activities of the user, image data captured before opening and/or after closing the passive optical box (108), or the like. The image may be captured with an in-built camera of the mobile device (302).
An admin panel available in the application or at the server may allow a network operations center (NOC) to view logs such as log history of the lock/unlock, user list or the like. The application may comprise a full-fledged and comprehensive NOC dashboard representing aggregate map view, real-time voltage and status view, aggregate view of all units for NOC and management, real-time graphs to indicate, open/close/invalid access, instant reports (in downloadable and viewable form). The application may also include a client view dashboard to let the clients see/set their asset permissions or the like.
[0031] In an implementation, the application and server may utilize an encryption algorithm that uses a server-side permissions database and symmetric encryption key such as a pre-placed key (PPK) encryption scheme to ensure only the valid mobile device and user login has access to the passive optical box (108).
[0032] The security system (106) may incorporate an alarm intimation (i.e. anti-theft alert) feature that helps in identifying intrusion attempts on the passive optical box (108). The passive optical box (108) as well as the security system (106) is compliant with an IP65 rating, thus are waterproof and weatherproof. The passive optical box (108) as well as the security system (106) utilize solid outer case construction and high-impact resistant units.
[0033] In an aspect, the passive optical box (108) may incorporate a powered security system (106) that may utilize a battery as a power source. The battery may have a life estimate of about 3-5 years.
[0034] The proposed invention may utilize features such as geotagging. The proposed invention may define the geolocation boundary for the user, who is valid and accessing the passive optical box (108).
[0035] In an implementation, the proposed invention may have characteristics of intellectualization that can utilize artificial intelligence (AT)/ Machine learning (ML) techniques to carry out image analysis, tampering identification, and the like. As the user captures images before opening and/or after closing the passive optical box (108), the implementation of artificial intelligence (AI)/ Machine learning (ML) techniques on the captured images may help in analyzing and ensuring that no tampering has been done to the passive optical box
(108) or no incorrect approaches have been taken to access the passive optical box (108) or the like. In other words, the implementation of the artificial intelligence (AI)/ Machine learning (ML) techniques may help the network operations center in pre-post activity theft detection.
[0036] The security system (106) may be integrated with the existing geographic information system (GIS) and enables the user to locate the deployed/installed unit i.e. the passive optical box (108) incorporating the security system (106) using a global positioning system (GPS).
[0037] The proposed invention provides keyless and high-security solutions to the passive optical box (108) installed in outdoor environments.
[0038] Advantageously, the security system (106) is easy to install and designed to retrofit, thus require no wear and tear. With the use of the security system (106), there is no need to maintain bunch of keys unlike the conventional locking system and is also easy for upgradation even when installed in remote space. Due to coupling with the mobile application and incorporation of AI and IoT type features, it is possible to provide real time 24x7 monitoring of the passive optical box (108), increase network uptime, alert the right person at right time via SMS/email/push notification, predictive alerts, fully automation, no human intervention, multi-level auto-escalations.
[0039] It will be apparent to those skilled in the art that other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention. While the foregoing written description of the invention enables one of ordinary skill to make and use what is considered presently to be the best mode thereof, those of ordinary skill will understand and appreciate the existence of variations, combinations, and equivalents of the specific embodiment, method, and examples herein. The invention should therefore not be limited by the above-described embodiment, method, and examples, but by all embodiments and methods within the scope of the invention. It is intended that the specification and examples be considered exemplary, with the true scope of the invention being indicated by the claims.
[0040] The conditional language used herein, such as, among others, "can," "may," "might," "may," "e.g.," and the like, unless specifically stated otherwise, or otherwise understood within the context as used, is generally intended to convey that certain embodiment include, while other embodiments do not include, certain features, elements and/or steps. Thus, such conditional language is not generally intended to imply that features, elements and/or steps are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without other input or prompting, whether these features, elements and/or steps are included or are to be performed in any particular embodiment. The terms "comprising," "including," "having," and the like are synonymous and are used inclusively, in an open-ended fashion, and do not exclude additional elements, features, acts, operations, and so forth. Also, the term "or" is used in its inclusive sense (and not in its exclusive sense) so that when used, for example, to connect a list of elements, the term "or" means one, some, or all of the elements in the list.
[0041] Disjunctive language such as the phrase "at least one of X, Y, Z," unless specifically stated otherwise, is otherwise understood with the context as used in general to present that an item, term, etc., may be either X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z). Thus, such disjunctive language is not generally intended to, and should not, imply that certain embodiments require at least one of X, at least one of Y, or at least one of Z to each be present.
[0042] While the detailed description has shown, described, and pointed out novel features as applied to various embodiments, it can be understood that various omissions, substitutions, and changes in the form and details of the devices or algorithms illustrated can be made without departing from the scope of the disclosure. As can be recognized, certain embodiments described herein can be embodied within a form that does not provide all of the features and benefits set forth herein, as some features can be used or practiced separately from others.
CLAIMS
We claim:
1. A passive optical box comprising:
walled elements and door elements forming an enclosure;
a connector to enable a handheld device to be connected to a server;
an electromechanical lock and controller capable of opening and closing the door elements post authentication of the handheld device;
a camera mounted inside the passive cabinet capable of capturing pre-activity and post-activity images, wherein the pre-activity images are captured after the handheld device is connected to the server and before the door elements are opened allowing access to the passive cabinet, wherein the post-activity images are captured after the door elements are closed restricting access to the passive cabinet;
a transmitter-receiver unit capable of communicating with the server and the handheld device, wherein the pre-activity and the post-activity images to the server for comparison;
a microcontroller interfacing with one or more of the door elements, lock controller, and the transmitter-receiver unit; and
a power source to power up one or more of the microcontrollers and the lock controller,
wherein the connector, the lock controller, the camera, the transmitter-receiver unit, the microcontroller and the power source are enclosed in the enclosure.
2. A method of a mobile application for accessing the passive optical box
comprising:
an application gateway (mobile application) is in between box and server to process information wherein the information includes user information or OTP validation;
the mobile application includes a compulsory feature to capture the photos while opening and closing the box;
when the user will connect the mobile device to access the cabinet through wired or wireless means; the installed mobile application starts processing;
the mobile application provides the validation to access the optical box, wherein the mobile application is also connected with the server for data processing and validating; further, the validation includes OTP verification for opening and closing the optical box;
the mobile-based/enabled application provides the feature through which pre and post-images of the passive optical box will be captured and stored in the system present at the server for image processing and quality validation.
3. A system of claim 1, wherein the camera is mounted on inside of the door elements.
4. A system of claim 1, further comprising a remote image analytics unit for comparing the pre-activity and the post-activity images enables automated inventory in the passive cabinet, wherein the automated inventory allows addition, subtraction, or modification to one or mode network components in the passive cabinet.
5. A system of claim 1, further wherein this handheld device is connected to the transmitter-receiver unit through a physical connector (OTG connector) installed on the passive cabinet, wherein the physical connector is accessible without opening the passive cabinet
6. A system of claim 1, further wherein this handheld device is connected to the transmitter-receiver unit through a wireless connector.
7. A system of claim 1, further comprising a microcontroller capable of interfacing with the server and motors (or locks)
8. A system of claim 1, wherein the passive cabinet is IP65 compliant
9. The method of claim 2, wherein the verification message communicated
to the mobile application comprises authentication information in an
encrypted form.
10. The method of claim 2, wherein the determining whether the target mobile device/user is authorized to operate the electronic locking mechanism comprises determining whether the authentication information satisfies the validation information.
11. The method of claim 2, wherein determining whether the user/mobile device is authorized to operate the electronic locking mechanism further comprises:
determining from the authentication information that the target mobile device is not authorized to operate the locking mechanism; and
incident to the determination that the locking mechanism is not authorized, performing one or more of the following functions: generating alarm at the server end; alerting server/authorities; alerting the user/mobile device; restraining the requesting mobile device from operating the electronic locking mechanism; or preventing any further requests that preclude the identifier from operating the electronic locking device.
| # | Name | Date |
|---|---|---|
| 1 | 202011042467-STATEMENT OF UNDERTAKING (FORM 3) [30-09-2020(online)].pdf | 2020-09-30 |
| 2 | 202011042467-PROVISIONAL SPECIFICATION [30-09-2020(online)].pdf | 2020-09-30 |
| 3 | 202011042467-POWER OF AUTHORITY [30-09-2020(online)].pdf | 2020-09-30 |
| 4 | 202011042467-FORM 1 [30-09-2020(online)].pdf | 2020-09-30 |
| 5 | 202011042467-DRAWINGS [30-09-2020(online)].pdf | 2020-09-30 |
| 6 | 202011042467-DECLARATION OF INVENTORSHIP (FORM 5) [30-09-2020(online)].pdf | 2020-09-30 |
| 7 | 202011042467-RELEVANT DOCUMENTS [14-10-2020(online)].pdf | 2020-10-14 |
| 8 | 202011042467-FORM-26 [14-10-2020(online)].pdf | 2020-10-14 |
| 9 | 202011042467-FORM 13 [14-10-2020(online)].pdf | 2020-10-14 |
| 10 | 202011042467-Proof of Right [07-01-2021(online)].pdf | 2021-01-07 |
| 11 | 202011042467-DRAWING [30-09-2021(online)].pdf | 2021-09-30 |
| 12 | 202011042467-CORRESPONDENCE-OTHERS [30-09-2021(online)].pdf | 2021-09-30 |
| 13 | 202011042467-COMPLETE SPECIFICATION [30-09-2021(online)].pdf | 2021-09-30 |
| 14 | 202011042467-FORM 18 [03-09-2024(online)].pdf | 2024-09-03 |