Sign In to Follow Application
View All Documents & Correspondence

System And Method For Preventing Human Trafficking

Abstract: Title: SYSTEM AND METHOD FOR PREVENTING HUMAN TRAFFICKING ABSTRACT A system (100) for preventing human trafficking, the system (100) comprising: an infrared transmitter (102) arranged on an exterior of an edifice to monitor a human intrusion; a micro-chip array (104) configured with the infrared transmitter (102) to cluster data of the human intrusion; an infrared receiver (106) adapted to be activated from receiving a signal from the micro-chip array (104); a camera (108) arranged in a proximity of the edifice to capture images and/or a video of the edifice; a safety application (110) installable on a computing device to receive the cluster data of the human intrusion and adapted to send security alerts to a point of interest for a threat of the human instruction, and a responsive unit (112) configured to be activated automatically and/or manually by a security personnel at a point of interest on receiving the security alerts related to the human intrusion. Claims: 10, Figures: 3 Figure 1 is selected.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
31 March 2021
Publication Number
40/2022
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
dr.keertigupta@gmail.com
Parent Application

Applicants

SR University
SR University, Ananthasagar, Warangal, Telangana, India.

Inventors

1. Leo L M I Joseph
S R Engineering College, Ananthasagar (V), Hasanparthy (M), Warangal, Telangana 506371
2. J Tarun Kumar
S R Engineering College, Ananthasagar (V), Hasanparthy (M), Warangal, Telangana 506371
3. B Girirajan
S R Engineering College, Ananthasagar (V), Hasanparthy (M), Warangal, Telangana 506371
4. J Ajayan
S R Engineering College, Ananthasagar (V), Hasanparthy (M), Warangal, Telangana 506371
5. Shubham Tayal
S R Engineering College, Ananthasagar (V), Hasanparthy (M), Warangal, Telangana 506371

Specification

Claims:CLAIMS
I/We Claim:
1. A system (100) for preventing human trafficking, the system (100) comprising:
an infrared transmitter (102) arranged on an exterior of an edifice to monitor a human intrusion;
a micro-chip array (104) configured with the infrared transmitter (102) to cluster data of the human intrusion;
an infrared receiver (106) adapted to be activated from receiving a signal from the micro-chip array (104);
a camera (108) arranged in a proximity of the edifice to capture images and/or a video of the edifice;
a safety application (110) installable on a computing device to receive the cluster data of the human intrusion and adapted to send security alerts to a point of interest for a threat of the human intrusion; and
a responsive unit (112) configured to be activated automatically and/or manually by a security personnel at a point of interest on receiving the security alerts related to the human intrusion.
2. The system (100) as claimed in claim 1, wherein the responsive unit (112) comprises a buzzer (114).
3. The system (100) as claimed in claim 1, wherein the responsive unit (112) comprises a tear gas unit (116).
4. The system (100) as claimed in claim 3, wherein the tear gas unit (116) comprises an array of nozzles (204).
5. The system (100) as claimed in claim 3, wherein the tear gas unit (116) comprises a gas cylinder (202).
6. The system (100) as claimed in claim 1, wherein the micro-chip array (104) comprises a raspberry pi chip.
7. The system (100) as claimed in claim 1, wherein the safety application (110) is GatewayTM by Mozilla.
8. The system (100) as claimed in claim 1, wherein the camera (108) is positioned to be hidden to eyes of an intruder.
9. The system (100) as claimed in claim 1, wherein the cluster data is stored at a data center (118).
10. A method (300) for preventing human trafficking, the method (300) comprise:
monitoring an exterior of an edifice to detect a human intrusion using an infrared transmitter (102);
configuring a micro-chip array (104) the infrared transmitter (102) to cluster data of the human intrusion;
activating an infrared receiver (106) after receiving a signal from the micro-chip array (104);
capturing images and/or a video of the edifice using a camera (108);
fetching the cluster data of the human intrusion through a safety application (110) and sending security alerts to a point of interest for a threat of the human instruction; and
activating a responsive unit (112) to prevent the human intrusion.

Date: 31 March 2021
Place: Noida
Dr. Keerti Gupta
Agent for the Applicant
(IN/PA-1529)
, Description:FORM 2

THE PATENT ACT 1970
(39 of 1970)
&

THE PATENTS RULES, 2003

COMPLETE SPECIFICATION
(See Section 10, and rule 13)

SYSTEM AND METHOD FOR PREVENTING HUMAN TRAFFICKING

APPLICANT(S)
NAME: LEO L M I JOSEPH
NATIONALITY: INDIAN
ADDRESS: S R ENGINEERING COLLEGE, ANANTHASAGAR (V), HASANPARTHY (M), WARANGAL, TELANGANA 506371

The following specification particularly describes the invention and the manner in which it is to be performed

BACKGROUND
Field of Invention
[001] Embodiments of the present invention generally relate to a smart fence, and particularly to a system and method for preventing human trafficking by configuring a smart fence.
Description of Related Art
[002] Human trafficking is the trade of humans for forced labor, sexual slavery, or commercial sexual exploitation for the trafficker or others. According to a research, it is estimated that internationally there are between 20 million and 40 million people in modern slavery today. Predominantly, children are trafficked to and from institutions, deprived of their family rights, and put at a bigger menace of exploitation. The children in institutional care such as orphanages, government-run facilities, can be easy targets for traffickers. The children are especially susceptible when traffickers recognize and take advantage of this need for emotional bonding from the absence of stable family life.
[003] Despite the huge technological advancement, there is still no system that can detect and check on criminal activities like human trafficking.
[004] There is thus a need for a system and a method for preventing human trafficking in a more efficient manner.
SUMMARY
[005] Embodiments in accordance with the present invention provide a system for preventing human trafficking. The system comprising: an infrared transmitter arranged on an exterior of an edifice to monitor a human intrusion; a micro-chip array configured with the infrared transmitter to cluster data of the human intrusion; an infrared receiver adapted to be activated from receiving a signal from the micro-chip array; a camera arranged in a proximity of the edifice to capture images and/or a video of the edifice; a safety application installable on a computing device to receive the cluster data of the human intrusion and adapted to send security alerts to a point of interest for a threat of the human instruction, and a responsive unit configured to be activated automatically and/or manually by a security personnel at a point of interest on receiving the security alerts related to the human intrusion.
[006] Embodiments in accordance with the present invention provide a method for preventing human trafficking, the method comprises: monitoring an exterior of an edifice to detect a human intrusion using an infrared transmitter; configuring a micro-chip array with the infrared transmitter to cluster data of the human intrusion; activating an infrared receiver after receiving a signal from the micro-chip array; capturing images and/or a video of the edifice using a camera; fetching the cluster data of the human intrusion on a safety application and sending security alerts to a point of interest for a threat of the human instruction, and activating a responsive unit to prevent the human intrusion.
[007] Embodiments of the present invention may provide a number of advantages depending on its particular configuration. First, embodiments of the present application provide a system and a method for preventing human trafficking.
[008] Next, embodiments of the present application provide a system for preventing human trafficking which is designed to monitor a human intrusion in places such as orphanages, government organizations, non-governmental organizations (NGOs), and other child care center.
[009] Next, embodiments of the present application provide a system for preventing human trafficking which is an improvement over a smart fencing-based surveillance system.
[0010] Next, embodiments of the present application provide a system for preventing human trafficking which comprises a camera positioned to be hidden to eyes of an intruder.
[0011] Next, embodiments of the present application provide a system for preventing human trafficking which is adapted to monitor as well as to initiate a controlling action to prevent a human intrusion.
[0012] Next, embodiments of the present application provide a system for preventing human trafficking which comprises a responsive unit to generate an alarm and/or to expel a tear gas to prevent the human intrusion.
[0013] These and other advantages will be apparent from the present application of the embodiments described herein.
[0014] The preceding is a simplified summary to provide an understanding of some embodiments of the present invention. This summary is neither an extensive nor exhaustive overview of the present invention and its various embodiments. The summary presents selected concepts of the embodiments of the present invention in a simplified form as an introduction to the more detailed description presented below. As will be appreciated, other embodiments of the present invention are possible utilizing, alone or in combination, one or more of the features set forth above or described in detail below.
BRIEF DESCRIPTION OF THE DRAWINGS
[0015] The above and still further features and advantages of embodiments of the present invention will become apparent upon consideration of the following detailed description of embodiments thereof, especially when taken in conjunction with the accompanying drawings, and wherein:
[0016] FIG. 1 illustrates a block diagram depicting a system for preventing human trafficking, according to an embodiment of the present invention;
[0017] FIG. 2 illustrates a component of the system for preventing human trafficking, according to an embodiment of the present invention; and
[0018] FIG. 3 depicts a flowchart of a method for preventing human trafficking, according to another embodiment of the present invention.
[0019] The headings used herein are for organizational purposes only and are not meant to be used to limit the scope of the description or the claims. As used throughout this application, the word "may" is used in a permissive sense (i.e., meaning having the potential to), rather than the mandatory sense (i.e., meaning must). Similarly, the words “include”, “including”, and “includes” mean including but not limited to. To facilitate understanding, like reference numerals have been used, where possible, to designate like elements common to the figures. Optional portions of the figures may be illustrated using dashed or dotted lines, unless the context of usage indicates otherwise.
DETAILED DESCRIPTION
[0020] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention as defined in the claims.
[0021] In any embodiment described herein, the open-ended terms "comprising," "comprises,” and the like (which are synonymous with "including," "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of," consists essentially of," and the like or the respective closed phrases "consisting of," "consists of, the like.
[0022] As used herein, the singular forms “a”, “an”, and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.
[0023] As depicted in FIG. 1, an embodiment of the present invention may provide a system 100 for preventing human trafficking. The system 100 may comprise an infrared transmitter 102, a micro-chip array 104, an infrared receiver 106 and, a camera 108.
[0024] In an embodiment of the present invention, the infrared transmitter 102 may be arranged at an exterior of an edifice such that the infrared transmitter 102 may detect a human intrusion. In an embodiment of the present invention, the infrared transmitter 102 may generate an infrared light in a straight line. The infrared receiver 106 may be placed opposite to the infrared transmitter 102 to detect the human intrusion, in an embodiment of the present invention.
[0025] In an embodiment of the present invention, the infrared transmitter 102 and the infrared receiver 106 may collaborate to act as an infrared sensor and detect if a person tries to illegally intrude in the edifice. In an embodiment of the present invention, the system 100 may be adapted to trigger an alarm if a beam of infrared light is broken by an intruder.
[0026] In an embodiment of the present invention, the micro-chip array 104 may be configured with the infrared transmitter 102 to cluster data of the human intrusion. In an embodiment of the present invention, the infrared receiver 106 may be adapted to be activated from receiving a signal from the micro-chip array 104. The micro-chip array 104 may comprise a raspberry pi chip, in accordance with an embodiment of the present invention.
[0027] In an embodiment of the present invention, the micro-chip array 104 may be a processor array. In an embodiment of the present invention, the micro-chip array 104 may be an array of a general-purpose processor which may be, but not limited to, a microcontroller, a development board, and so forth. In another embodiment of the present invention, the micro-chip array 104 may be an array of a conventional processor, a controller, or a state machine. The micro-chip array 104 may also be implemented as a combination of computing devices, e.g., a combination of a Digital Signal Processor (DSP) and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a Digital Signal Processor (DSP) core, or any other such configuration. In further embodiments of the present invention, the micro-chip array 104 may be a microcontroller that may be attuned with breadboards and a micro-chip technology.
[0028] In an embodiment of the present invention, the camera 108 may be positioned in a proximity to the edifice to capture images and/or videos of the exterior of the edifice. In an embodiment of the present invention, the camera 108 may be configured to be hidden and/or invisible to eyes of the intruder. In an embodiment of the present invention, the micro-chip array 104 may cluster the images and/or the videos in form of a cluster of data of the human intrusion.
[0029] In an embodiment of the present invention, the camera 108 may be hidden from view without a sacrifice in a quality of the images and/or videos produced by the camera 108. In a further embodiment of the present invention, the camera 108 may be a compact imaging device and may be embedded with associated control electronics. The embodiments of the present invention are intended to include or otherwise cover any type of the camera 108 including known, related art, and/or later developed.
[0030] In an embodiment of the present invention, the system 100 may further comprise a safety application 110. The safety application 110 may be installable on a computing device (not shown) to receive the cluster data of the human intrusion. In an embodiment of the present invention, the safety application 110 may send security alerts to a point of interest for a threat of the human instruction. In an embodiment of the present invention, the safety application 110 may be a third-party application such a GatewayTM by Mozilla.
[0031] In an embodiment of the present invention, the safety application 110 may be a set of programmable instruction which may be executable on the computing device. The safety application 110 may be configured to monitor and control the exterior of the edifice by fetching the cluster data from a data center 118.
[0032] In an embodiment of the present invention, the data center 118 may be a cloud-based data center 118 that may be configured to store the cluster data as obtained from the micro-chip array 104. In another embodiment of the present invention, the data center 118 may be a local data depository.
[0033] In an embodiment of the present invention, the point of interest may be a security personnel, a caretaker, a police station, a security agency and/or other authorized people. In an embodiment of the present invention, the safety application 110 may be a computer program and/or a software application that may be designed to run on a computing device, in accordance with an embodiment of the present invention.
[0034] In an embodiment of the present invention, the computing device may be a mobile, a laptop, a computer, and so forth. The embodiments of the present invention are intended to include or otherwise cover any type of the computing device including known, related art, and/or later developed.
[0035] In an embodiment of the present invention, the system 100 may further comprise a responsive unit 112. In an embodiment of the present invention, the responsive unit 112 may be configured to be activated automatically on detecting the threat of the human intrusion. In another embodiment of the present invention, the responsive unit 112 may be activated manually by the security personnel on receiving the security alerts of the computing device through the safety application 110.
[0036] In an embodiment of the present invention, the responsive unit 112 may comprise a buzzer 114 that may be configured to generate an alert on detecting the human intrusion. The buzzer 114 may be a piezo-electric buzzer, an electro-mechanical buzzer, and/or a magnetic buzzer. The embodiments of the present invention are intended to include or otherwise cover any type of the buzzer 114 including known, related art, and/or later developed. In an embodiment of the present invention, the responsive unit 112 may comprise a tear gas unit 116. The tear gas unit 116 may be adapted to expel a tear gas on detecting the human intrusion, in an embodiment of the present invention.
[0037] Referring to FIG. 2, the tear gas unit 116 may comprise a gas cylinder 202 and an array of nozzles 204. In an embodiment of the present invention, the gas cylinder 202 may comprise the tear gas that may create irritation in eyes of the intruder. The tear gas may be dispersed through the array of nozzles 204. In another embodiment of the present invention, the gas cylinder 202 may comprise other irritating chemicals to stop the intruder.
[0038] As depicted in FIG. 3, further embodiments of the present invention may provide a method 300 for preventing human trafficking. The method 300 may comprise steps such as:
[0039] At step 302, the system 100 may monitor the exterior of the edifice to detect the human intrusion using the infrared transmitter 102.
[0040] At step 304, the system 100 may provide the micro-chip array 104 that may be configured with the infrared transmitter 102 and may be adapted to cluster data of the human intrusion.
[0041] At step 306, the system 100 may activate the infrared receiver 106 after receiving the signal from the micro-chip array 104.
[0042] At step 308, the system 100 may capture the images and/or the video of the edifice using the camera 108.
[0043] At step 310, the system 100 may fetch the cluster data of the human intrusion using the safety application 110 and may send the security alerts to the point of interest for the threat of the human instruction.
[0044] At step 312, the system 100 may activate the responsive unit 112 to prevent the human intrusion.
[0045] Embodiments of the invention are described above with reference to block diagrams and schematic illustrations of methods and systems according to embodiments of the invention. It will be understood that each block of the diagrams and combinations of blocks in the diagrams can be implemented by computer program instructions. These computer program instructions may be loaded onto one or more general purpose computers, special purpose computers, or other programmable data processing apparatus to produce machines, such that the instructions which execute on the computers or other programmable data processing apparatus create means for implementing the functions specified in the block or blocks. Such computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means that implement the function specified in the block or blocks.
[0046] While the invention has been described in connection with what is presently considered to be the most practical and various embodiments, it is to be understood that the invention is not to be limited to the disclosed embodiments, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
[0047] This written description uses examples to disclose the invention, including the best mode, and also to enable any person skilled in the art to practice the invention, including making and using any devices or systems and performing any incorporated methods. The patentable scope the invention is defined in the claims, and may include other examples that occur to those skilled in the art. Such other examples are intended to be within the scope of the claims if they have structural elements that do not differ from the literal language of the claims, or if they include equivalent structural elements within substantial differences from the literal languages of the claims.

Documents

Application Documents

# Name Date
1 202141015491-STATEMENT OF UNDERTAKING (FORM 3) [31-03-2021(online)].pdf 2021-03-31
2 202141015491-FORM 1 [31-03-2021(online)].pdf 2021-03-31
3 202141015491-FIGURE OF ABSTRACT [31-03-2021(online)].pdf 2021-03-31
4 202141015491-DRAWINGS [31-03-2021(online)].pdf 2021-03-31
5 202141015491-DECLARATION OF INVENTORSHIP (FORM 5) [31-03-2021(online)].pdf 2021-03-31
6 202141015491-COMPLETE SPECIFICATION [31-03-2021(online)].pdf 2021-03-31
7 202141015491-PA [20-12-2021(online)].pdf 2021-12-20
8 202141015491-FORM28 [20-12-2021(online)].pdf 2021-12-20
9 202141015491-ASSIGNMENT DOCUMENTS [20-12-2021(online)].pdf 2021-12-20
10 202141015491-8(i)-Substitution-Change Of Applicant - Form 6 [20-12-2021(online)].pdf 2021-12-20