Abstract: Title: SYSTEM AND METHOD FOR MONITORING SAFE HANDLING OF VALUABLES AND THEIR SECURITY THEREOF ABSTRACT: Disclosed herein is a system (150) and method for monitoring safe handling of valuables and their security thereof when kept stationary or are transported to another location. The system comprises a security device (153) of varying dimensions adequate to accommodate the volume of valuables. It is operably connected to a data server (151) through the internet (152). The said device further comprises functionally coupled multiple security controls and sensors. Depending on the type of valuables being transported, predefined security parameters are enabled by the system prior to their transportation from source (154) to the destination (155). Auto-generated live security reports are important ready references for customers, investigation agencies and similar, for taking necessary actions against complaints lodged in the system for mishandling, loss of valuables and the said device. The said system is an affordable, speedy and result oriented security system thereby eliminating human intervention to a great scale. Figure 1
Claims:CLAIMS
We Claim,
1. A system (150) for monitoring safe handling of valuables and their security thereof, the system comprising:
a security device (153) operably connected to a dock (200) and central data server (151) through Internet (152) for transporting the valuables of any kind from source customer (154) to destination customer (155) and for providing live security records and reports based on predefined settings and built-in security parameters according to the type of valuables being transported, thereby reducing human intervention to a larger scale.
2. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, wherein the said security device (153), comprises operably connected microcontroller board (101) as the main embodiment, further comprising functionally coupled embodiments:
Battery (102) and Backup Battery (103) as Power Supply sources (104);
Camera (105) for capturing the images during loading, unloading, transportation of valuables and similar related activities;
Global Positioning System (GPS) and Global System for Mobile communication (GSM) Module (106) for identifying location and communication respectively with the said device (153);
Motion Sensor (107) for sensing motion, activating or deactivating the device if it is stationary or moving;
Microphone (108) for capturing audio signals in and around the said device (153);
Weight Sensor (109) for detecting occurrences of proper handling or mishandling of valuables by the impact of load and for identifying the situation when the said device (153) is overloaded;
Sonar System (110) for detecting the location of said device (153) if it is dropped in any waterbody;
Temperature Sensor (111) for monitoring/generating alarm/s when the temperature inside or outside the said device (153) is within or outside predefined temperature limits;
Tilt Sensor (112) for detecting the amount and direction of tilt and for identifying unfavourable condition during transportation of valuables;
Humidity Sensor (113) for monitoring, generating alarm(s) when the humidity inside and outside the said device (153) is within or outside predefined humidity levels;
Fingerprint Scanner (114) for scanning predefined unique fingerprint patterns and strengthening, locking and unlocking of the security device (153);
LED (115) for giving indications to the end-user;
Vibrator (116) for providing haptic alarms;
Lock (117) for activating or deactivating locking mechanism in combination with fingerprints obtained through Fingerprint Scanner (114);
UV lights (118) for sanitizing the valuables under defined circumstances;
Speakers (119) for generating audio alarms for indication/during emergency cases;
Communication device with GSM and GPS antenna (120) for communicating the said device (153) by automatically detecting available network operator with required signal strength at its location;
A wireless charging receiver antenna (121) for charging powers supply (104) and for communicating between PC or mobile phone of the source (154) or destination (155) customer and the said security device (153) via dock (200);
Ambient Light Sensor (122) for detecting the light in and around the said security device (153); and
Light source (123) with a visible or invisible spectrum of light, for illuminating inside of the box when the lid of the said device (153) is in any state.
3. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, wherein the said security device (153) further comprises preloaded, preactivated and predefined multi-operator SIM card which is operably connected to central data server (151) for data communication.
4. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, wherein the said security device (153) further comprises of a built-in mechanical lock(s) (117) working in unison with magnets for activating or deactivating locking mechanism in combination with Fingerprint Scanner (114) for detecting the concerned person as an authorized person or unauthorized person based on predefined unique patterns generated with respect to the number of times a specific finger is presented as well as the timing and sequence of type of finger placed for taking the fingerprints.
5. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, wherein the said security device (153) has varying shape and size adequate for accommodating the quantity of the valuables to be transported.
6. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, wherein the said security device (153) is manufactured using tamper-resistant material which is comparatively affordable to source customer (154) and is complying to security requirements of the type of valuables to be transported.
7. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, wherein the dock (200) comprises functionally coupled wireless charging pad (221), wired or wireless connection to the end-user computers (222), a locking mechanism (223) and status indicator light (224) for providing multiple step authentication to secure the data transfer to authorized persons’ computers.
8. The system (150) for monitoring safe handling of valuables and their security thereof, as claimed in claim 1, generates alarms, notifications, log events and similar alerts based on the conditional logic applied for indicating the presence of an unequal number of security guards with respect to the predefined number of security guards required for accompanying the security device (153) during the transportation.
9. A method for monitoring safe handling of valuables and their security thereof, the method comprising:
accessing the system (150) by end-user using login credentials;
enabling default security parameters (210) built-in into the system (150);
enabling predefined security parameters (220) according to the type of valuables to be transported by using the said device (153); and
storing the security records and sharing the live security result reports (230) with the concerned customers, supporting agencies and similar concerned entities.
10. The method for monitoring safe handling of valuables and their security thereof, as claimed in claim 9, wherein the source customer (154) creates login credentials for all those required security device (153) transporters, depending upon the system (150) generated recommendations regarding the suitability of respective transporter complying to his previous trusted ratings stored in central data server (151).
11. The method for monitoring safe handling of valuables and their security thereof, as claimed in claim 9, wherein enablement of default security parameters (210) built-in into the system (150) is done automatically when the said device (153) attains motion during its stationary phase as well as during in transportation phase based on logically instructed time duration/amplitude independent of motion sensor output.
12. The method for monitoring safe handling of valuables and their security thereof, as claimed in claim 9, wherein enablement of predefined security parameters (220) is done automatically when the source customer (154) provides inputs to the system (150) about the type of valuables to be transported by using the said device (153).
13. The method for monitoring safe handling of valuables and their security thereof, as claimed in claim 9, wherein storing the security records and sharing the live security result reports (230) to source customer (154) and destination customer (155) is done automatically by the system (150).
14. The method for monitoring safe handling of valuables and their security thereof, as claimed in claim 9, wherein storing the security records and sharing live security result reports (230) with the supporting and investigation agencies is done for the specific duration required for providing resolution to the complaint against which first information report is lodged for mishandling and for loss of the security device (153) during its transportation.
15. The method for monitoring safe handling of valuables and their security thereof, as claimed in claim 9, wherein enabling predefined security parameters (220) includes the tamper detection system which is based on the combination of signals from Weight sensor (109), Microphone (108), Humidity sensor (113), Temperature sensor (111), Tilt sensor (112), Motion sensor (107), Camera (105) and Ambient Light Sensor (122) using logical intelligence for monitoring normal operations, for detecting the abnormal activities of the security device (153), for recording status and for triggering all alarms on the device and alert customers.
Dated this 25th day of September 2020
Madhuvanti Mandar Kelkar
(Agent of Applicant)
IN / PA 3044
, Description:FIELD OF THE INVENTION
The present invention relates to the field of safety and security management. More particularly it relates to the security of precious and valuable items like cash, documents, arms and ammunition, jewellery, ornaments and similar items either when they are kept stationary or during their transport from one location to another location.
BACKGROUND OF THE INVENTION
Transportation or transport of any item is one of the most important and imperative activities among the supporting systems of current business fields. When it comes to the transport of precious and valuable items like arms and ammunition, cash, documents, jewellery, ornaments and many more likewise, then the security of such items plays a pivotal role further. All such precious items are the assets of the owner carrying high monetary value. These assets are looked upon as an investment which can be encashed or kept as a mortgage during an emergency. These are required to be insured and secured during mishaps or accidents like robbery, theft, burglary etc.
At present, there is a lot of human intervention while handling and transporting such valuable items from one location to another location. People engaged in this activity have faced many psychological, physical issues since they find themselves very much insecure and under continuous mental stress during such transportation. It is like a life-threatening task for them.
The Indian Patent Application 201921022928 reveals an intelligent box with multiple security features useful only for banks to transport the currency. This intelligent box prevents unauthorized access of human beings thereby ruling out human intervention and improving the security of currency transport. This invention has a limitation that it handles security aspects of transportation of bank currency only.
The US patent US7714708, reveals the smart cargo container system applicable to all industries involved in transport and warehousing of goods, especially high-added-value goods, such as pharmaceuticals, consumer electronics goods, electronic parts, entertainment products, and goods requiring high-security transport. This system mainly handles the security aspects of the transportation of consumer goods mentioned above.
Considering the current situation and the way the world is progressing, the security of any valuable item is going to be a very crucial and important aspect. Not only the companies involved in transportation and goods carriers, the banks and jewellery shops dealing with money and ornaments, arms and ammunition factories manufacturing weapons but also a common man in the country needs security for his valuables either when those are kept at home or while carrying them from one place to another, in his daily routine. Thus, there is a pressing need for safe handling of any kind of valuables for every individual as well. In addition to the security of valuables, it is also imperative to provide security to all the personnel involved in the transportation of the valuables. But the prior art found so far has not addressed this aspect.
The inventor of this present invention has mitigated the aforementioned drawbacks by providing a security system (150) comprising an easily portable and operable, well secured with strong locking mechanism and affordable security device (153) which makes smart decisions and provides live updates of the situation around the device with live security reports to the customers for every transit of their valuables which can be of any kind. Also, the said device (153) has varying shape and size which is adequate to accommodate the volume of any kind of valuables. It is manufactured using tamper-resistant material which is comparatively affordable to source customer (154) and is also complying to security requirements of the type of valuables to be transported. These live security reports are automatically generated by the system. These are based on built-in predefined security parameters which are required for the type of valuables to be transported. This security system functions through a logically instructed security device which is operably connected to a central data server for data communication, thereby reducing human intervention to a great scale.
The detailed description of the present invention is followed herewith.
OBJECT OF THE INVENTION
The main object of the present invention is to provide a security system for monitoring safe handling of any kind of valuables either when they are kept stationary or during their transportation from one location to another, leading to the elimination of human intervention to a great scale.
Yet another object is to provide a cost-effective and affordable security system for safe handling of any kind of valuables for any type of customer.
Yet another object is to provide an easy to operate and speedy security system for safe handling of any kind of valuables of any kind of customer.
Yet another object is to get live tracking and live reporting of each sensor to provide live updates during system uptime to all concerned personnel and agencies as well as a service provider.
Yet another object is to store records of mishandling of any kind of valuables as well as a security device and provide respective reports to all the concerned personnel and agencies.
SUMMARY OF THE INVENTION
Accordingly, the present invention provides a system (150) and the method for monitoring safe handling of valuables and their security thereof. The said system provides security during transportation of any kind of valuables when they are kept stationary at one place or when carried from one place to another place by any registered customer to the destination customer as per defined contract. The said contract is between the system provider and the customer. The said system comprises a security device (153) as the main embodiment which is operably connected to a dock (200) and is connected through the internet (152) to a data server (151). The said security device (153) is functionally coupled with different controllers and sensors as illustrated in the schematic diagram (figure 2) herein. The said security device (153) as illustrated in its isometric view (figure 3) is a compact, communicatively and an operably interactive device which makes smart decisions. Based on the type of valuables to be transported, security parameters are predefined into the said system (150) before their transportation. The said security system enables only these security controls which are specific to source customer (154) requirements, during the transport and delivery of these valuables to destination customer (155). During the transportation of valuables, if any mishandling or mishap occurs, then the predefined sensors start working more effectively and the frequency of updates will be higher compared to a normal use case scenario, along with predefined alerts and alarms to the customer as well as a service provider. These events are recorded and stored by the system (150). Customer or service provider can share the above event information to investigation agencies to track and trace the mishandling or mishap. Those reports are ready references for the authorized supporting agencies like investigation agencies or similar registered into the said system (150). This way the functioning of the said system is well configured, auto-monitored and auto-controlled producing auto-generated reports for customers thereby eliminating human intervention to a great scale.
In summary, the present invention overcomes the drawbacks of currently available safe boxes, safety devices and security systems thereof, by providing such a security system (150) comprising a security device (153) which is an easily portable and operable device having strong locking mechanism with predefined security parameters therein. The said device (153) has varying shape and size which is adequate to accommodate the volume of any kind of valuables. It is manufactured using tamper-resistant material which is comparatively affordable to source customer (154) and is also complying to security requirements of the type of valuables to be transported. The said system is cost-effective and beneficial for customers of all kinds. Most importantly, the said security system maintains the records of all the events, mishandling practices and procedures which take place during loading, unloading, transportation of the valuables. Reports of such mishandling cases are automatically generated through the said security system and are provided to all the concerned personnel and agencies as per the situational need. These reports are very important from the perspective of claiming the insurance for the damages of valuables. These reports are also useful for tracking the current surrounding situation during any mishap, which is further used for investigations and related tasks thereof. These are the key benefits of the said security system to its customers which are unique in nature and are different to identify for a person skilled in the state of art.
BRIEF DESCRIPTION OF INVENTION
The figures provided herein are not necessarily to the scale, out of which:
figure 1: Illustrates a schematic diagram of the functionality of the security system (150)
figure 2: Illustrates a schematic block diagram of a security device therein
figure 3: Illustrates an isometric view of the Security Device (153)
figure 4: Illustrates a top view of the Security Device (153)
figure 5: Illustrates a front view of the Security Device (153)
figure 6: Illustrates an isometric view of the Dock (200)
figure 7: Illustrates a process flow of a method to access the security system (150)
figure 8: Illustrates a process flow of default security features activation (210) of the method to access the security system (150)
figure 9: Illustrates a process flow of custom driven predefined security features activation (220) of a method to access the security system (150)
figure 10: Illustrates a process flow of report generation (230) of the method to access the security system (150)
DETAILED DESCRIPTION OF INVENTION
The features of the present invention and its technical advantages can be better understood from the following description of preferred embodiments together with the claims and accompanying schematic drawings in which,
Referring to figure 1, which illustrates the functionality of the system, wherein the present invention is a system (150) provided for monitoring safe handling of valuables and their security thereof. The said system provides security during transportation of any kind of valuables when kept stationary or carried from one place to another by any customer. The said system comprises a security device (153) as the main embodiment and a data server (151) connected through the internet (152). The said security device (153) is operably connected to the dock (200). Transportation of valuables from Source Customer (154) to Destination Customer (155) is done through a security device (153). Based on the type of valuables of Source Customer (154), the specific security parameters get automatically configured into the said security system (150) before their transportation. The said device (153) has varying shape and size which is adequate to accommodate the volume of any kind of valuables. It is manufactured using tamper-resistant material which is comparatively affordable to source customer (154) and is also complying to security requirements of the type of valuables to be transported. While transporting and delivering these valuables to Destination Customer (155), these preconfigured security requirements are processed by the security device (153) and valuables handling records are stored and reports are generated through the said security system (150). Source Customer (154) and Destination Customer (155) both receive the said security system (150) generated live reports with appropriate levels of security alerts for their ready reference and further needful actions. Thus, the functioning of the security device (153) is to make the smart decisions based on preconfigured security requirements according to the type of valuables to be transported, thereby reducing human intervention to a larger scale. During the transportation of valuables, if any mishandling or mishap occurs, then the predefined sensors start working more effectively and the frequency of updates will be higher compared to a normal use case scenario, along with predefined alerts and alarms to the customer as well as a service provider. It is recorded and stored by the system. Customer or service provider can share the above event information to investigation agencies to track and trace the mishandling or mishap. Those reports are ready references for supporting agencies like investigation agencies or similar registered into the said system (150). The system (150) is accessed by a user using login credentials. In an embodiment, the system (150) is accessed by a user through a web portal. The dock (200) is operably connected to the computers of source customer (154) and destination customer (155). In certain cases, it is not necessary to keep the security device (153) on the dock (200). The security device (153) communicates directly to the system (150) through Wi-Fi or GSM network. The dock (200) provides multiple step authentication to secure the data transfer to authorized persons’ computers. The locking mechanism (223) on the dock is used to hold the box firmly and to only deactivate if the battery status of the security device (153) is above the defined threshold and the authentication is confirmed.
According to figure 2, it further schematically illustrates the security device (153) as the main embodiment of the said security system (150).
According to figure 3, it represents the isometric view of the security device (153) with various built-in sensors and controllers.
According to figure 4, it represents a top view of the said security device (153).
According to figure 5, it represents a front view of the security device (153).
According to figure 6, it represents an isometric view of the Dock (200).
According to figure 7, it represents a process flow of method to access the system (150).
According to figure 8, it represents a process flow of default security features activation (210) of method to access the security system (150).
According to figure 9, it represents a process flow of custom driven predefined security features activation (220) of a method to access the security system (150).
According to figure 10, it represents a process flow of report generation (230) method to access the security system (150).
Referring to figure 3, the micro-controller board (101) is the main embodiment of the said security device (153). The micro-controller board (101) is functionally coupled with different types of sensors, electronic gadgets and power supply as other embodiments namely Battery (102) and Backup Battery (103) as Power Supply sources (104), Camera (105), GPS & GSM Module (106), Motion Sensor (107), Microphone (108), Weight Sensor (109), Sonar System (110), Temperature Sensor (111), Tilt Sensor (112), Humidity Sensor (113), Fingerprint Scanner (114), LED (115), Vibrator (116), Lock (117), UV lights (118), Speakers (119), Communication device with GSM and GPS antenna (120), a wireless charging receiver antenna (121), Ambient Light Sensor (122) and Light source (123). The said device is operably connected to Dock (200) provided therein.
As seen in figure 3, that all these aforementioned embodiments are built-in into the security device, which is provided to the customers for safe handling and transportation of their valuables. Based on the type of valuables to be transported, predefined customer-driven security requirements are configured into the said security system before transportation. The said security system enables only those security controls which are specific to source customer (154) requirements, during the transport and delivery of those valuables to destination customer (155). During the transportation of valuables, if any mishap occurs then the system generated mishandling reports are made available to the supporting agency like investigation agency or similar already registered into the system (150) for its ready reference after the complaint is lodged in the system (150) and First Information Report (FIR) is lodged at registered supporting agencies in the system (150). FIR will include complaint details available in the system (150).
Referring to figure 3 further, the micro-controller board (101) comprises multiple microcontrollers, out of which each microcontroller controls various individual security actions by processing the received data after its interpretation. These multiple micro-controllers work together within the security device (153) to handle the respective tasks. Each built-in security control is an embodiment of the said security device (153) which is operably connected to the dock (200). It is further described below.
As shown in figure 3, Power Supply (104) comprises a compact rechargeable battery (102) and Backup Battery (103). Power Supply (104) is operably connected to the microcontroller board (101). Wireless charging receiver antenna (121) is used for charging the battery (102) through the dock (200).
As one of the embodiments, wherein video processing uses camera (105) output data to identify, if say N number of goods/Specific item/s is/are removed and/or inserted and/or exchanged using AI, Image progressing or related technology. Based on this processing, a decision is made if a favourable or unfavourable event has occurred or not. For example, if the device is utilized for gold item transportation, the details of deliverables are already available with the device. But during transit, if any item of gold is removed or added then the appropriate action is taken accordingly. The identification of the above event or events is the output of the combined effect of camera-based output and the location both. This is achieved by using intelligent logics which decide the occurrence of a favourable or unfavourable, desired or undesired event(s) for taking further necessary action(s) accordingly.
In another embodiment, wherein the Global Positioning System (GPS) and Global System for Mobile communication (GSM) module (106) which is operably connected to the microcontroller board (101), for following purposes:
a. for tracking the precise location of the said security device (153). The frequency of update on tracking can be defined by the customer as per his needs. The module will also assist in the operation of geofencing the said security device to a certain area for operation.
b. GSM SIM card is used for communication with the security device (153) and the server, to transmit GPS coordinates to the data server (151) at a predefined time interval to assess the timestamped location of the Security device (153) for further processing and reporting.
c. Along with GPS coordinates the GSM part of the module (106) is also responsible for the data transmission of all sensor data to the data server (151) for further processing and reporting.
d. Location service will also be obtained via Location-Based Service that uses mobile phone signals. The tracking can be done using GSM cell towers of local mobile phone service providers.
e. Wi-Fi locating technology is also used by relative network signal strength gathered at network access points to gain better positioning of the said Security Device (153).
f. In any given time, if the said security device (153) gets disconnected from all GSM networks, the device will look for a Wi-Fi signal through the Communication module (120) to transmit the data to the data server. In absence of signals for communication, the security device (153) will be hibernated in a locked state, until it regains any type of network and communication with the data server (151) for its pending responses.
g. The GSM module comprises pre-loaded, preactivated and predefined multi-operator SIM card which is built-in into the said security device (153). It allows the said security device (153) to work instantly without waiting for activation of the SIM card. This pre-loaded and preactivated multi-operator SIM card will be such that, in case if the present service provider has low operating signals, the network operator will change automatically to another available network operator with required signal strength at that location. This will happen seamlessly with high availability of data connection with sufficient signal strength.
In another embodiment wherein a Motion sensor (107) which is operably connected to the microcontroller board (101) detects whether the said device (153) is carried by a person or by a vehicle. Motion sensor (107) is also used to activate the device if stationary. This detection is based on various parameters as distance travelled, number of steps travelled during walking and likewise. This type of information is very much useful for any kind of investigations against mishaps and mishandling of security device (153).
In another embodiment wherein the microphone (108) which is operably connected to the microcontroller board (101) captures audio signals around the device (153). Based on these captured audio signals, the system detects, voice and number of people around the device, the language in which these people are speaking, specific code words. All this information is useful for investigations or live tracking of situations in and around the device.
In another embodiment wherein Weight sensor (109) which is operably connected to the microcontroller board (101) detects the occurrence of favourable or unfavourable conditions of handling the valuables being transported. It is possible to identify if the goods being carried are exceeding the limit of the total predefined carrying capacity of the said security device (153) or not. It is also possible to identify whether the mishandling of the valuables is done or not by processing the impact generated while loading or unloading the goods like glassware, ammunition, explosives and similar. Reports of such mishandling records are generated through the said security system and are provided to all the concerned stakeholders. These reports are very important from the perspective of claiming the insurance for the damages of valuables. Weight sensor also helps in understanding if the device (153) was tampered by pressure. These reports are also useful for tracking the current surrounding situation during any mishap, which is further used for investigations and related tasks thereof.
In another embodiment wherein Sonar system (110) which is operably connected to the microcontroller board (101) detects the location of the said security device (153) if the device is dropped in a water body such as river or pond or likewise, with the help of transmitter by sonar signal processing.
In another embodiment wherein Temperature sensor (111) which is operably connected to the microcontroller board (101) detects the level of temperature. It allows the said system to identify the current temperature inside and outside the security device (153). If it exceeds the predefined temperature limits, alarms are generated.
In another embodiment wherein the Tilt sensor (112) which is operably connected to the microcontroller board (101) detects the tilting of the box and the direction of tilt. It allows them to find unfavourable conditions for sensitive goods during their transportation.
In another embodiment wherein Humidity sensor (113) which is operably connected to the microcontroller board (101) detects the current level of humidity inside and outside the security device (153) with respect to some predefined humidity levels. If it exceeds the limits, an alarm is generated.
In another embodiment wherein Fingerprint scanner (114) which is operably connected to the microcontroller board (101) detects the concerned person is authorized person or unauthorized person based on predefined unique patterns with respect to number of times any finger is presented as well as the timing and sequence. This eliminates the typical flaw that underlies during just single instance finger scanning.
In another embodiment wherein Light Emitting Diode (LED) (115) which is operably connected to the microcontroller board (101) is used to show various indications based on the situation for guiding the user about action to be taken for that situation and indicate emergency status on them as well.
In another embodiment wherein Vibrator (116) which is operably connected to the microcontroller board (101) provides haptic alarms.
In another embodiment wherein the lock (117) which is operably connected to the microcontroller board (101), is a built-in device to secure the lid of the security device (153) firmly in its position when closed. The lock (117) is a mechanical lock with a combination of magnets to hold the lid in place once the lock is deactivated. The lock gets activated or deactivated internally in combination with fingerprints, a mechanism to avoid external tampering of the lock.
In another embodiment wherein UV light (118) which is operably connected to the microcontroller board (101) is useful for killing the germs and for sanitizing certain valuables under defined circumstances.
In another embodiment wherein speaker or buzzer or hooter (119) which is operably connected to the microcontroller board (101), generates audio alarms during emergency cases.
In another embodiment wherein Communication device with GSM & GPS antenna (120) which is operably connected to the microcontroller board (101), comprises
a. Wi-Fi module and its antenna, functioning together to assist data transmission to the data server (151) in the absence of the GSM network.
b. A Bluetooth or similar suitable module to communicate with nearby mobile devices. For example, if the said security device (153) is to be accompanied by say N number of security guards or personnel or devices, then, if at any point of time, during transit, less than N security guards or personnel or devices are found to be present, the system will raise alarm(s), indication(s), log the event and take the associated action(s) as per the settings provided to the device or server or admin centre.
c. The GSM and GPS antenna in combination with GSM and GPS module (106) facilitate the data transmission between the security device (153) and data server (151).
In another embodiment wherein a wireless charging receiver antenna (121) which is operably connected to the microcontroller board (101) and the Dock (200), facilitates charging of powers supply (104) and the communication between PC and the security device (153) via dock (200).
In another embodiment wherein Ambient light sensor (122) which is operably connected to the microcontroller board (101), detects the light in the surrounding of the said security device (153).
In another embodiment wherein the Light source (123) which is operably connected to the microcontroller board (101), lights up when the said security device (153) is opened.
Referring to figure 7, in another aspect, the present invention provides a method for monitoring safe handling of valuables and their security thereof. Specifically, the method is described in conjunction with the system (150) of figure 1.
The method involves accessing the system (150) which is operably connected to a Dock (200), by an end-user using his login credentials. In an embodiment, the system (150) is accessed by the user through a web portal. In another embodiment, the system (150) is enabled on the said security device (153) through built-in preloaded SIM which is accessed by the system either during the transportation of valuables from source to destination customer or when the device is kept stationary. The end-user who is not a supporting agency like an investigation agency or similar gets registered into the system (150) through official paperwork and user credentials will be provided to him after verification of contract. Every data request to the database server (151) is authenticated to keep away unauthorized traffic. The source customer (154) while registering all the responsible persons who are going to handle the security device (153) during transportation, collects their user credentials and fingerprints for authentication on the security device (150). The information about these persons who will be handling the device is shared with the data server (151) to validate previous employment history stored in the database of the server (151). Based on the trust rating stored therein, the system (150) suggests the suitability of the person being added in the system profile for the employer based on his record.
After successful login by the source customer (154), at step (210), the method involves activation of default security sensors and controls by accessing built-in preloaded and preactivated SIM (106) of the security device (153), which is in possession with the source customer (154). Referring to figure 8, which illustrates sequential enabling of controls and sensors namely Motion sensor (107), GPS & GSM Module (106), LEDs (115), Vibrator (116), Speakers (119), Fingerprint Scanner (114), a Locking mechanism (117), Weight Sensor (109), Microphone (108), Tilt Sensor (112), Ambient Light Sensor (118), Communication Module (120) and wireless charging receiver antenna (121), as a mandatory process for activating the security device (153) for its working.
After successful enabling of default features of security device (153), at step (220), the method involves enabling of those security sensors which are already configured into the system (150) based on predefined security parameters required for types of valuables to be transported by source customer (154) to destination customer (155).
Referring to figure 9, which illustrates the enabling of such configured sensors namely UV lights (118), Temperature Sensors (111), Humidity Sensor (113), Camera (105), Sonar System (110) and tamper detection process. The tamper detection method is based on interpretation of the combination of signals from Weight sensor (109), Microphone (108), Humidity sensor (113), Temperature sensor (111), Tilt sensor (112), a Motion sensor (107), Camera (105) and Ambient Light Sensor (122) using logical intelligence. This method will be used to detect the abnormal activities of the security device (153) to trigger all alarms on the device and alert customers. These abnormal results from any combination of these sensors are treated as tampering of the security device (153). The security device (153) is enabled with the tamper detection method which is implemented on data server (151). It also detects false tampering and omits it from the final tamper detection. False tampering could be detected when a vehicle gets a jerk due to speed breaker or sudden application of brakes while driving is ignored based on location information.
Referring to figure 10, at step (230), the method involves auto-generation of security reports for customer-driven security parameters by accessing the records stored into the database of a server (151). These auto-generated reports are stored in encrypted form in databases hosted on a data server (151) and are shared with source customer (154) and destination customer (155). Also, these reports are made available to already registered supporting agencies like investigation agencies or similar in the system (150). The investigation agencies and supporting agencies will get a mirror web portal of the main portal for ease of their investigation, for their ready reference for further necessary actions against the complaint and FIR lodged for the mishandled security device (153) if any mishap and mishandling of valuables occurs while they are transported from source customer (154) to destination customer (155). The access to the investigation and supporting agencies will be until the resolution of the particular complaint.
The aforementioned descriptions of specific embodiments of the present invention have been presented for the purpose of illustration and description. They are not intended to be exhaustive or to limit the present invention to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above description. The embodiments were chosen and described in order to best explain the principles of the present invention and its practical application, and to thereby enable others skilled in the art to best utilize the present invention and various embodiments with various modifications as are suited to their specific considered use.
It is understood that various omissions and substitutions of equivalents are considered as the circumstances may suggest or render advantageous, but such omissions and substitutions are intended to cover the application or implementation without departing from the scope of the claims of the present invention.
| # | Name | Date |
|---|---|---|
| 1 | 202021041605- Certificate of Inventorship-022000235( 08-04-2025 ).pdf | 2025-04-08 |
| 1 | 202021041605-RELEVANT DOCUMENTS [26-03-2024(online)].pdf | 2024-03-26 |
| 1 | 202021041605-STATEMENT OF UNDERTAKING (FORM 3) [25-09-2020(online)].pdf | 2020-09-25 |
| 2 | 202021041605-FORM-27 [05-04-2025(online)].pdf | 2025-04-05 |
| 2 | 202021041605-RELEVANT DOCUMENTS [21-04-2023(online)].pdf | 2023-04-21 |
| 2 | 202021041605-STARTUP [25-09-2020(online)].pdf | 2020-09-25 |
| 3 | 202021041605-FORM 8A [30-08-2024(online)].pdf | 2024-08-30 |
| 3 | 202021041605-RELEVANT DOCUMENTS [28-06-2022(online)].pdf | 2022-06-28 |
| 3 | 202021041605-REQUEST FOR EARLY PUBLICATION(FORM-9) [25-09-2020(online)].pdf | 2020-09-25 |
| 4 | 202021041605-RELEVANT DOCUMENTS [26-03-2024(online)].pdf | 2024-03-26 |
| 4 | 202021041605-POWER OF AUTHORITY [25-09-2020(online)].pdf | 2020-09-25 |
| 4 | 202021041605-IntimationOfGrant29-10-2021.pdf | 2021-10-29 |
| 5 | 202021041605-RELEVANT DOCUMENTS [21-04-2023(online)].pdf | 2023-04-21 |
| 5 | 202021041605-PatentCertificate29-10-2021.pdf | 2021-10-29 |
| 5 | 202021041605-FORM28 [25-09-2020(online)].pdf | 2020-09-25 |
| 6 | 202021041605-RELEVANT DOCUMENTS [28-06-2022(online)].pdf | 2022-06-28 |
| 6 | 202021041605-FORM-9 [25-09-2020(online)].pdf | 2020-09-25 |
| 6 | 202021041605-FER.pdf | 2021-10-19 |
| 7 | 202021041605-ORIGINAL UR 6(1A) FORM 1 & 26-051020.pdf | 2021-10-19 |
| 7 | 202021041605-IntimationOfGrant29-10-2021.pdf | 2021-10-29 |
| 7 | 202021041605-FORM FOR STARTUP [25-09-2020(online)].pdf | 2020-09-25 |
| 8 | 202021041605-FORM FOR SMALL ENTITY(FORM-28) [25-09-2020(online)].pdf | 2020-09-25 |
| 8 | 202021041605-PatentCertificate29-10-2021.pdf | 2021-10-29 |
| 8 | 202021041605-US(14)-HearingNotice-(HearingDate-06-07-2021).pdf | 2021-10-19 |
| 9 | 202021041605-FER.pdf | 2021-10-19 |
| 9 | 202021041605-FORM 18A [25-09-2020(online)].pdf | 2020-09-25 |
| 9 | Abstract1.jpg | 2021-10-19 |
| 10 | 202021041605-Annexure [18-07-2021(online)].pdf | 2021-07-18 |
| 10 | 202021041605-FORM 1 [25-09-2020(online)].pdf | 2020-09-25 |
| 10 | 202021041605-ORIGINAL UR 6(1A) FORM 1 & 26-051020.pdf | 2021-10-19 |
| 11 | 202021041605-FIGURE OF ABSTRACT [25-09-2020(online)].jpg | 2020-09-25 |
| 11 | 202021041605-US(14)-HearingNotice-(HearingDate-06-07-2021).pdf | 2021-10-19 |
| 11 | 202021041605-Written submissions and relevant documents [18-07-2021(online)].pdf | 2021-07-18 |
| 12 | 202021041605-Annexure [27-06-2021(online)].pdf | 2021-06-27 |
| 12 | 202021041605-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [25-09-2020(online)].pdf | 2020-09-25 |
| 12 | Abstract1.jpg | 2021-10-19 |
| 13 | 202021041605-EVIDENCE FOR REGISTRATION UNDER SSI [25-09-2020(online)].pdf | 2020-09-25 |
| 13 | 202021041605-Correspondence to notify the Controller [27-06-2021(online)].pdf | 2021-06-27 |
| 13 | 202021041605-Annexure [18-07-2021(online)].pdf | 2021-07-18 |
| 14 | 202021041605-CLAIMS [26-01-2021(online)].pdf | 2021-01-26 |
| 14 | 202021041605-ENDORSEMENT BY INVENTORS [25-09-2020(online)].pdf | 2020-09-25 |
| 14 | 202021041605-Written submissions and relevant documents [18-07-2021(online)].pdf | 2021-07-18 |
| 15 | 202021041605-Annexure [27-06-2021(online)].pdf | 2021-06-27 |
| 15 | 202021041605-COMPLETE SPECIFICATION [26-01-2021(online)].pdf | 2021-01-26 |
| 15 | 202021041605-DRAWINGS [25-09-2020(online)].pdf | 2020-09-25 |
| 16 | 202021041605-COMPLETE SPECIFICATION [25-09-2020(online)].pdf | 2020-09-25 |
| 16 | 202021041605-Correspondence to notify the Controller [27-06-2021(online)].pdf | 2021-06-27 |
| 16 | 202021041605-CORRESPONDENCE [26-01-2021(online)].pdf | 2021-01-26 |
| 17 | 202021041605-CLAIMS [26-01-2021(online)].pdf | 2021-01-26 |
| 17 | 202021041605-FER_SER_REPLY [26-01-2021(online)].pdf | 2021-01-26 |
| 17 | 202021041605-FORM 3 [02-10-2020(online)].pdf | 2020-10-02 |
| 18 | 202021041605-COMPLETE SPECIFICATION [26-01-2021(online)].pdf | 2021-01-26 |
| 18 | 202021041605-OTHERS [26-01-2021(online)].pdf | 2021-01-26 |
| 18 | 202021041605-Response to office action [23-12-2020(online)].pdf | 2020-12-23 |
| 19 | 202021041605-CORRESPONDENCE [26-01-2021(online)].pdf | 2021-01-26 |
| 19 | 202021041605-Response to office action [24-12-2020(online)]-1.pdf | 2020-12-24 |
| 19 | 202021041605-Response to office action [24-12-2020(online)].pdf | 2020-12-24 |
| 20 | 202021041605-FER_SER_REPLY [26-01-2021(online)].pdf | 2021-01-26 |
| 20 | 202021041605-Response to office action [24-12-2020(online)]-1.pdf | 2020-12-24 |
| 20 | 202021041605-Response to office action [24-12-2020(online)].pdf | 2020-12-24 |
| 21 | 202021041605-Response to office action [23-12-2020(online)].pdf | 2020-12-23 |
| 21 | 202021041605-OTHERS [26-01-2021(online)].pdf | 2021-01-26 |
| 22 | 202021041605-FER_SER_REPLY [26-01-2021(online)].pdf | 2021-01-26 |
| 22 | 202021041605-FORM 3 [02-10-2020(online)].pdf | 2020-10-02 |
| 22 | 202021041605-Response to office action [24-12-2020(online)]-1.pdf | 2020-12-24 |
| 23 | 202021041605-COMPLETE SPECIFICATION [25-09-2020(online)].pdf | 2020-09-25 |
| 23 | 202021041605-CORRESPONDENCE [26-01-2021(online)].pdf | 2021-01-26 |
| 23 | 202021041605-Response to office action [24-12-2020(online)].pdf | 2020-12-24 |
| 24 | 202021041605-Response to office action [23-12-2020(online)].pdf | 2020-12-23 |
| 24 | 202021041605-DRAWINGS [25-09-2020(online)].pdf | 2020-09-25 |
| 24 | 202021041605-COMPLETE SPECIFICATION [26-01-2021(online)].pdf | 2021-01-26 |
| 25 | 202021041605-ENDORSEMENT BY INVENTORS [25-09-2020(online)].pdf | 2020-09-25 |
| 25 | 202021041605-FORM 3 [02-10-2020(online)].pdf | 2020-10-02 |
| 25 | 202021041605-CLAIMS [26-01-2021(online)].pdf | 2021-01-26 |
| 26 | 202021041605-COMPLETE SPECIFICATION [25-09-2020(online)].pdf | 2020-09-25 |
| 26 | 202021041605-Correspondence to notify the Controller [27-06-2021(online)].pdf | 2021-06-27 |
| 26 | 202021041605-EVIDENCE FOR REGISTRATION UNDER SSI [25-09-2020(online)].pdf | 2020-09-25 |
| 27 | 202021041605-Annexure [27-06-2021(online)].pdf | 2021-06-27 |
| 27 | 202021041605-DRAWINGS [25-09-2020(online)].pdf | 2020-09-25 |
| 27 | 202021041605-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [25-09-2020(online)].pdf | 2020-09-25 |
| 28 | 202021041605-Written submissions and relevant documents [18-07-2021(online)].pdf | 2021-07-18 |
| 28 | 202021041605-FIGURE OF ABSTRACT [25-09-2020(online)].jpg | 2020-09-25 |
| 28 | 202021041605-ENDORSEMENT BY INVENTORS [25-09-2020(online)].pdf | 2020-09-25 |
| 29 | 202021041605-Annexure [18-07-2021(online)].pdf | 2021-07-18 |
| 29 | 202021041605-EVIDENCE FOR REGISTRATION UNDER SSI [25-09-2020(online)].pdf | 2020-09-25 |
| 29 | 202021041605-FORM 1 [25-09-2020(online)].pdf | 2020-09-25 |
| 30 | 202021041605-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [25-09-2020(online)].pdf | 2020-09-25 |
| 30 | 202021041605-FORM 18A [25-09-2020(online)].pdf | 2020-09-25 |
| 30 | Abstract1.jpg | 2021-10-19 |
| 31 | 202021041605-FIGURE OF ABSTRACT [25-09-2020(online)].jpg | 2020-09-25 |
| 31 | 202021041605-FORM FOR SMALL ENTITY(FORM-28) [25-09-2020(online)].pdf | 2020-09-25 |
| 31 | 202021041605-US(14)-HearingNotice-(HearingDate-06-07-2021).pdf | 2021-10-19 |
| 32 | 202021041605-FORM 1 [25-09-2020(online)].pdf | 2020-09-25 |
| 32 | 202021041605-FORM FOR STARTUP [25-09-2020(online)].pdf | 2020-09-25 |
| 32 | 202021041605-ORIGINAL UR 6(1A) FORM 1 & 26-051020.pdf | 2021-10-19 |
| 33 | 202021041605-FER.pdf | 2021-10-19 |
| 33 | 202021041605-FORM 18A [25-09-2020(online)].pdf | 2020-09-25 |
| 33 | 202021041605-FORM-9 [25-09-2020(online)].pdf | 2020-09-25 |
| 34 | 202021041605-FORM FOR SMALL ENTITY(FORM-28) [25-09-2020(online)].pdf | 2020-09-25 |
| 34 | 202021041605-FORM28 [25-09-2020(online)].pdf | 2020-09-25 |
| 34 | 202021041605-PatentCertificate29-10-2021.pdf | 2021-10-29 |
| 35 | 202021041605-POWER OF AUTHORITY [25-09-2020(online)].pdf | 2020-09-25 |
| 35 | 202021041605-IntimationOfGrant29-10-2021.pdf | 2021-10-29 |
| 35 | 202021041605-FORM FOR STARTUP [25-09-2020(online)].pdf | 2020-09-25 |
| 36 | 202021041605-FORM-9 [25-09-2020(online)].pdf | 2020-09-25 |
| 36 | 202021041605-RELEVANT DOCUMENTS [28-06-2022(online)].pdf | 2022-06-28 |
| 36 | 202021041605-REQUEST FOR EARLY PUBLICATION(FORM-9) [25-09-2020(online)].pdf | 2020-09-25 |
| 37 | 202021041605-STARTUP [25-09-2020(online)].pdf | 2020-09-25 |
| 37 | 202021041605-RELEVANT DOCUMENTS [21-04-2023(online)].pdf | 2023-04-21 |
| 37 | 202021041605-FORM28 [25-09-2020(online)].pdf | 2020-09-25 |
| 38 | 202021041605-STATEMENT OF UNDERTAKING (FORM 3) [25-09-2020(online)].pdf | 2020-09-25 |
| 38 | 202021041605-RELEVANT DOCUMENTS [26-03-2024(online)].pdf | 2024-03-26 |
| 38 | 202021041605-POWER OF AUTHORITY [25-09-2020(online)].pdf | 2020-09-25 |
| 39 | 202021041605-REQUEST FOR EARLY PUBLICATION(FORM-9) [25-09-2020(online)].pdf | 2020-09-25 |
| 39 | 202021041605-FORM-27 [05-04-2025(online)].pdf | 2025-04-05 |
| 40 | 202021041605-STARTUP [25-09-2020(online)].pdf | 2020-09-25 |
| 40 | 202021041605- Certificate of Inventorship-022000235( 08-04-2025 ).pdf | 2025-04-08 |
| 41 | 202021041605-STATEMENT OF UNDERTAKING (FORM 3) [25-09-2020(online)].pdf | 2020-09-25 |
| 41 | 202021041605-RELEVANT DOCUMENTS [02-09-2025(online)].pdf | 2025-09-02 |
| 42 | 202021041605-POA [02-09-2025(online)].pdf | 2025-09-02 |
| 43 | 202021041605-FORM 13 [02-09-2025(online)].pdf | 2025-09-02 |
| 1 | Searchstrategy_202021041605E_24-11-2020.pdf |