Sign In to Follow Application
View All Documents & Correspondence

System For Detecting Intrusion Of A Perimete

Abstract: A system and a method for detecting intrusion of a perimeter are disclosed. The method includes receiving, from Supporting Information Generators (SIGs) (104), a secondary information related to intrusion of the perimeter. A primary information related to intrusion of the perimeter is received from Primary Information Generators (PIGs) (102). The primary information is received based at least on a trigger by the SIGs (104). The primary information and the secondary information is processed using machine learning algorithms to determine an intrusion of the perimeter, and at least one user may be alerted about the intrusion.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 September 2018
Publication Number
40/2018
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
info@effectualservices.com
Parent Application
Patent Number
Legal Status
Grant Date
2023-07-24
Renewal Date

Applicants

CRON SYSTEMS
C 42, FREEDOM FIGHTER ENCLAVE, NEB SARAI, NEW DELHI, INDIA-110068

Inventors

1. SAURAV AGARWALA
C 42, FREEDOM FIGHTER ENCLAVE, NEB SARAI, NEW DELHI, INDIA-110068
2. TUSHAR CHHABRA
C 42, FREEDOM FIGHTER ENCLAVE, NEB SARAI, NEW DELHI, INDIA-110068

Specification

FIELD OF THE DISCLOSURE
[0001] The present disclosure is generally related to a Perimeter Intrusion Detection System (PIDS), and more particularly related to a perimeter intrusion detection system implemented using a plurality of sensors.
BACKGROUND
[0002] The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also correspond to implementations of the claimed technology.
[0003] Perimeter Intrusion Detection Systems (PIDS) are used to protect vulnerable perimeters like international borders, fragile perimeters, and strategic locations. Currently, various companies provide partial solutions to implement the PIDS. For example, a first company provides sensors, a second company provides communication amongst the sensors and between the sensors and an end user interface, a third company provides software for the end user interface, a fourth company acts as an integrator for all, a fifth company provides services for installation of entire system, and a sixth company takes care of maintenance and after sales services. All the above mentioned companies first through sixth are different and work independently.
[0004] However, the different components of the system result in various drawbacks such as the different components have different usage points and user interfaces. Further, the different
components of the system provided by different companies require different training of end users. Further, the different components of the system provided by the different companies have different Mean Time Between Failures (MTBF) and different failure rates. Further, the different components of the system provided by different companies need different kinds of service, diagnosis, and maintenance carried out by each company which is a hassle for the end users. Further, if one of the components of the solution fails, then the system may not work again. Thus, a single company or a solution provider fails to provide an end to end solution for the complete protection of the international borders, fragile perimeters, and strategic locations.
[0005] Currently, various other conventional PIDS solutions for protecting the international borders, fragile perimeters, and strategic locations, are generic and not tailored based on a requirement of a perimeter of the end user. Such solutions do not allow addition or deletion of the components such as sensors or software based on the requirement of the perimeter of the end user. Further, in such type of solutions, when an intrusion is detected, all the end users get to know that there is an alarm. However, the end users do not know any information such as whether the alarm is actually triggered or is it a system malfunction, where is the alarm raised on the entire perimeter, when is the alarm raised, whether the alarm is for an intrusion or some other event, whether the alarm is a false alarm, whether the intrusion is done by an animal or a human, how many humans intruded, or a future course of action.
[0006] Typically, a perimeter has three zones such as counter territory, reaction time zones, and protected perimeter. The counter territory lies beyond the perimeter and the size is infinite. Further, the reaction time zone is the territory of neutralization of the threat and lies inside the perimeter. Further, in such type of territory, an intruder or threat needs to be neutralized. Further, the protected perimeter is the territory where the intruder or the threat should not reach. In one case, if the intruder reaches such territory, then it marks a failure of the PIDS Solution. Thus,
current solutions provide an indication of an intrusion. However, there is no indication of threat level, pre-detection of threat, and prescriptions of post threat detection.
[0007] Further, the international borders, fragile perimeters, vulnerable areas, vulnerable posts, and strategic locations, suffer from bad communication networks. Further, cellular networks are blocked at the international borders, fragile perimeters, vulnerable areas, vulnerable posts, and strategic locations due to secure breach, system vulnerable to hacks, some areas have combinations of Ethernet, optical fibers, and twisted pair cables, and some areas have zero communication mediums or facilities. Further, it is a basic requirement for all armed forces protecting such perimeters to have a completely offline communication network to have a sense of security from hacking of information
[0008] Therefore, there is a need for an improved system for protecting the international borders, fragile perimeters, and strategic locations that may be efficient, customizable, flexible, cost effective, and reliable.
OBJECTIVES OF THE INVENTION
[0009] It is an objective of the invention to provide a method for detecting intrusion of a perimeter.
[0010] It is also an objective of the invention to utilize a plurality of sensors connected in a mesh network.
[0011] It is another objective of the invention to provide a method for detecting intrusion of a perimeter where sensitivity of sensors could be varied and hence the invention works like a swarm protecting the perimeter.
[0012] It is another objective of the invention to provide a system for detecting intrusion of a perimeter where the system is manufactured, installed, maintained, serviced and operated by a single operator.
BRIEF DESCRIPTION OF THE DRAWINGS
[0013] The accompanying drawings illustrate various embodiments of systems, methods, and embodiments of various other aspects of the disclosure. Any person with ordinary skills in the art will appreciate that the illustrated element boundaries (e.g. boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. It may be noted that in some examples one element may be designed as multiple elements or that multiple elements may be designed as one element. In some examples, an element shown as an internal component of one element may be implemented as an external component in another, and vice versa. Furthermore, elements may not be drawn to scale. Non-limiting and non-exhaustive descriptions are described with reference to the following drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating principles.
[0014] FIG. 1 illustrates a layered architecture 100 of a system for collecting and processing information for detecting intrusion of a perimeter, in an embodiment.
[0015] FIG. 2 illustrates a flow diagram 200 illustrating different modes of data transmission for detecting intrusion of a perimeter, in an embodiment.
[0016] FIG. 3 illustrates a connection diagram of a system 300 for collecting and processing information for detecting intrusion of a perimeter, in an embodiment.
[0017] FIG. 4 illustrates a distributed architecture 400 for collecting and processing information for detecting intrusion of a perimeter, in an embodiment.
[0018] FIG. 5 illustrates a flowchart 500 of a method for collecting and processing information for detecting intrusion of a perimeter, in an embodiment.
DETAILED DESCRIPTION
[0019] Some embodiments of this disclosure, illustrating all its features, will now be discussed in detail. The words "comprising," "having," "containing," and "including," and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items.
[0020] It must also be noted that as used herein and in the appended claims, the singular forms "a," "an," and "the" include plural references unless the context clearly dictates otherwise. Although any systems and methods similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present disclosure, the preferred, systems and methods are now described.
[0021] Embodiments of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings in which like numerals represent like elements throughout the several figures, and in which example embodiments are shown. Embodiments of the claims may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. The examples set forth herein are non-limiting examples and are merely examples among other possible examples.
[0022] A layered architecture 100 of a system for collecting and processing information for detecting intrusion of a perimeter is henceforth explained with reference to FIG. 1. The system may include Primary Information Generators (PIGs) 102 and Supporting Information Generators (SIGs) 104. The PIGs 102 may generate a primary information related to intrusion of the perimeter. It should be noted that the PIG 102 may be always active. The SIGs 104 may generate a secondary information related to intrusion of the perimeter. The primary information and the
secondary information may include intrusion information generated by proprietary sensors, Quick Reaction Tool (QRT) data, diagnosis data, performance data, descriptive track record, or other data generated by the PIGs 102 and the SIGs 104 respectively. It should be noted that the primary information generated by the PIGs 102 may have higher weights than the secondary information generated by the SIGs 104. Higher weights may correspond to higher priorities or higher precedence of information generated by the PIGs 102. For example, information generated by a camera (a PIG) may have higher weight than information generated by a trip sensor (an SIG).
[0023] In one embodiment, the secondary information generated by the SIGs 104 may be used to either trigger or augment the primary information generated by the PIGs 102. In one case, the SIGs 104 may be activated while the PIGs 102 detect some vital information. For example, while the trip sensor detects movement across the perimeter, the camera may be activated to identify if an intruding object such as an animal or a human has passed across the perimeter. All the sensors detect threat based on size and shape of an intruding object. For example, at a particular perimeter, the customer might want to detect birds as an intrusion while for another the customer might want the birds to not raise an alarm. In another case, the secondary information produced by the SIGs 104 may supplement the primary information produced by the PIGs 102. For example, a vibration sensor may supplement the detection performed by a LiDAR. During such case, the primary information and the secondary information may be used altogether to determine intrusion and identifying an individual intruding the perimeter.
[0024] The PIGs 102 and the SIGs 104 may create a swarm of detection units along the perimeter. Instead of working in a master-slave configuration, the PIGs 102 and the SIGs 104 may work together by increasing or decreasing sensitivity of all the proprietary sensors. Even when a single detection unit detects intrusion, information regarding such intrusion is immediately shared with neighboring detection units and sensitivity of all the detection units is
increased. Further, the PIGs 102 of all the detection units in the swarm may become more active and triggering of the SIGs 104 may not be required. Thus sensitivity of different sensors may be changed using machine learning algorithms, based on detection information collected by all the sensors of a particular perimeter.
[0025] Number of the PIGs 102 and the SIGs 104 installed in an area could vary as per the terrain conditions. For an instance, a particular terrain may require 2 to 3 sensors of one type while another terrain might not require any such sensors. Further, a particular sensor may act as a PIG on one terrain or perimeter, and may act as an SIG on another terrain or perimeter. Detection criterion using the PIGs 102 and the SIGs 104 can be changed via algorithms based on requirements of the perimeter.
[0026] Subsequent to collection, the primary information may be processed by complex machine learning algorithms. Further, the secondary information may be processed by simple machine learning algorithms. Upon processing, the primary data and the secondary data may be gathered at an information layer 106. Such data gathered at the information layer 106 may be analyzed using software algorithms to make a decision and action plan, at layer 108.
[0027] Referring to FIG. 2, a flow diagram 200 illustrating different modes of data transmission for detecting intrusion of the perimeter are described henceforth. In an example, the PIGs 102 may comprise Light Detection and Ranging (LIDAR) systems 202, thermal cameras 204, and Radio Detecting and Ranging (RADAR) systems206. On the other hand, the SIGs 104 may comprise active or passive Infrared (IR) sensors 208, microwave or Doppler sensors 210, day and night cameras 212, taut wired or vibration sensor 214, and IR curtains 216. It should be noted that the PIGs 102 may be limited and less in number. On the other hand, the SIGs 104 may be numerous and may vary in design based on an ambient environment and one or more use cases of products. It will be apparent to one skilled in the art that above-mentioned PIGs 102 and the SIGs
104 have been provided only for illustration purposes, without departing from the scope of the disclosure. In one case, the mentioned information generators may be partnership information generators, third party information generators, and/or legacy information generators.
[0028] In one case i.e. case 1, the primary information may be available and may have a high probability of accuracy. In such case, the secondary information may be discarded and the primary information may only be collected. In another case i.e. case 2, the primary information may be available and may have a high probability of accuracy. In such case, the secondary information may augment the primary information. Further, the secondary information may be used for verification of the primary information to be used for further processing. In yet another case i.e. case 3, the primary information may be available but a probability of accuracy of the primary information may be below a predefined threshold. During such case, the secondary information may only be collected. Alternatively, while the primary information is not available, the secondary information may only be collected.
[0029] Successively, any collected information may be stored in the data information layer 106. Such collected information may be processed using one or more software algorithms and data analytics techniques. Thereafter, processed information may be displayed to the user for making a decision and action. It should be noted that the decisions and actions may be taken by the user at decision and action stage 108, for protecting international borders, fragile perimeters, and strategic locations.
[0030] As shown in FIG. 3, the system 300 may include a plurality of entities such as existing third party solutions 302, one or more partnership information generators 304, a Quick Reaction Tool (QRT) 306, proprietary sensors 308, and detection units and information generators 310. The plurality of entities may be interconnected with each other in a closed mesh configuration to form a communication network 312. The existing third party solutions 302 may comprise at least
one of existing Perimeter Intrusion Detection System (PIDS) solutions, existing sensors, and existing cameras, such as High Sensitivity Thermal Imaging (HSTI) cameras, IP cameras, thermal cameras, and Closed-circuit television (CCTV) cameras. The one or more partnership information generators 304 may comprise autonomous assets such as drones and rovers. The QRT 306 may be a device comprising alert mechanism that is easy to understand by an individual. In one case, the proprietary sensors 308 may include different types of sensors. The different types of sensors may communicate with each other for collecting intrusion information. The one or more detection units and information generators 310 may include the PIGs 102 and the SIGs 104. A Command and Control (C&C) platform 314 may be connected to the communication network 312. The C&C platform 314 may be alternatively referred as miCRON.
[0031] The communication network 312 may be a closed mesh network. A closed communication network means that data is not exchanged over any other available network such as 3G, 4G, Global System for Mobile communication (GSM), and Code-Division Multiple Access (CDMA) networks, internet, or a cloud network, and thus the communication network 312 is completely offline and standalone. The closed mesh network may be implemented as a wired network using at least one of optical cables, twisted pair cables, and Ethernet. Further, the closed mesh network may alternatively or additionally be implemented wirelessly using a proprietary radio network.
[0032] In one case, the closed mesh network may utilize a 2x2 Multiple-Input and Multiple-Output (MIMO) technique and a Direct-Sequence Spread Spectrum (DSSS). It is generally not possible to establish a wired communication over riverine areas and a wireless communication through thick foliage. Thus, the communication network 312 may be a wired, wireless, or a hybrid network based on physical conditions of an area of implementation. Handover between
wired and wireless communication may be seamless and the network may retain all its features at different parts of the network on different physical layers.
[0033] The communication network 312 may be a closed, encrypted, secured, and stealth based network. All messages transmitted within the communication network 312 may be encrypted using proprietary algorithms and private keys for maintaining confidentiality and authenticity. Such encryption assures that no messages transmitted between two entities present in the communication network 312 are identified, listened, or decrypted by a trojan entity. Moreover, such encryption makes the communication network 312 immune to trojan spam messages.
[0034] Stealth architecture could be integrated to the communication network 312. In one case, usage of spread spectrum and Orthogonal Frequency-Division Multiple Access (OFDMA) could provide for stealth architecture of the communication network 312. While a trojan entity listens to such communication network 312, noise could only be heard a communication in progress would not be identified by the trojan entity.
[0035] Frequency hopping is yet another stealth technique that could be employed in the communication network 312, along with spread spectrum and OFDMA. Frequency hopping involves continuous changing of channels on which communication occurs between different entities. Frequency hopping allows for avoiding interception of messages by an intruder, as by the time an intruder breaks into the network, an existing frequency channel of transmission gets changed.
[0036] The communication network 312 is implemented as an adaptive hybrid mesh where all entities could communicate with each other, directly or through a route. Within the communication network 312, masters and slaves are decided on the fly i.e. an information sender becomes a master and an information receiver becomes a slave.
[0037] Each entity added to the communication network 312 could act as a repeater of information, in both wireless and wired configuration. The communication network 312 keeps increasing in size as more entities are added to the communication network 312. For example, in one case, an entity A present distantly from an entity Z may need to send a message to the entity Z. In such case, all the entities present between the entity A and the entity Z would start acting as a repeater or a hopping station for the message. In a real-time, distances are mapped between different entities present in the communication network 312, and messages are routed between the different entities, based on distances. For example, a message may be routed from the entity A to the entity Z through a shortest and strongest path. Further, a new path may be automatically selected for data transmission while strength of a currently used path decreases, resulting into self healing of the communication network 312.
[0038] The communication network 312 may perform self diagnosis, both in wired and wireless configurations. Network health of the communication network 312 may be continuously monitored, and the C&C platform 314 may be immediately updated while communication with a particular entity is completely blocked. The C&C platform 314 may be updated by ping pong messages sent by peers in the communication network 312.
[0039] The third party solutions 302 that are autonomous i.e. autonomous third party assets such as drones and rovers could be integrated with the C&C platform 314 through the communication network 312. An end user could control such drones or rovers through the communication network 312. Upon detection of intrusion, the C&C platform 314 could send location of the intrusion to these autonomous third party assets for surveillance of the location. While conducting surveillance of harsh perimeters where connectivity is a major problem, such autonomous third party assets can communicate with the C&C platform 314 via soft handover between the detection units connected to the communication network 312.
[0040] In one embodiment, the C&C platform 314 may be implemented over a closed central server which secures data and may not have internet connectivity. Further, the C&C platform 314 may include a middleware that communicates with the one or more detection units and information generators 310. The C&C platform 314 may further include immutable logs of all events (i.e., TRUTH) reported by the one or more detection units and information generators 310. All the events, irrespective of their identification or non-identification as intrusions, are stored. Thus, a timeline of events could be created that may help in training of swarm for increasing or decreasing sensitivity of the sensors.
[0041] Further, the C&C platform 314 may include backend for processing of information generated by the one or more detection units and information generators 310. Further, the C&C platform 314 may include a frontend i.e., a real time user interface for threat assessments and/or providing intrusion indications. The C&C platform 314 may further include a data layer for descriptive analysis, predictive analysis, and prescriptive analysis of the data. It should be noted that complex processing techniques such as image processing, artificial intelligence, computer vision, and/or machine learning algorithms may be utilized for process data at the C&C platform 314.
[0042] Thereafter, the C&C platform 314 may provide the user with perimeter vulnerability analysis, threat level analysis, early warning of suspicious activity (i.e., detection, classification, and tracking), suspicious activity and threat verification, force deployment recommendations, real time autonomous assets deployment, and threat neutralization recommendation.
[0043] FIG. 4 illustrates a distributed architecture 400 for collecting and processing information for detecting intrusion of a perimeter, in an embodiment. The distributed architecture 400 illustrates a first information generator 402, a second information generator 404, C&C platform 406, and a frontend user interface 408. The first information generator 402 may include one or
more sensors 410, one or more Central Processing Units (CPUs) 412, and information generator CPU1 414. Similarly, the second information generator 404 may include one or more sensors 416, one or more Central Processing Units (CPUs) 418, and information generator CPU2 420. It should be noted that the first information generator 402 may correspond to a black box CPU.
[0044] The one or more sensors 410, 416 may sense raw data from the field and environment. Successively, the raw data may be sent to the CPUs 412, 418 (i.e., a controller). Successively, the CPUs 412, 418 may process the raw data for generating relevant information (i.e., TRUTH) and a probability of accuracy. It should be noted that the processing of the raw data may be done by the CPUs 412, 418. Successively, the information generator CPU1 414 and the information generator CPU2 420 may receive the information and the probability of accuracy from each of the one or more sensors 410, 416. Successively, the information generator CPU1 414and the information generator CPU2 420 may process the information for generating data information. Successively, the information generator CPU1 414 and the information generator CPU2 420 may send the data information to the C&C platform 406. Successively, the C&C platform 406 may process the data information. Thereafter, the processed data information may be sent to the frontend user interface 410 for taking decisions and actions in order to protect the international borders, fragile perimeters, and strategic locations.
[0045] The disclosed embodiments encompass numerous advantages. The system may provide an end to end solution for protecting international borders, fragile perimeters, and strategic locations. Further, the system may provide a three-dimensional situational awareness of any perimeter giving an analysis of counter territory, reaction time area and the protected area. Further, the system may be tailored based on customer requirements and site requirements. The system may not require infrastructure requirements from an end user and reuses the infrastructure already available with the end user.
[0046] Further, the system may act as an operating system for all existing security and surveillance systems. The existing security and surveillance systems may be integrated with the C&C platform 314 and may get hooked onto the communication network 312 i.e. CRONet. Further, autonomous assets such as rovers and drones may be integrated to the C&C platform 314 (i.e., miCRON) and may be controlled via the C&C platform 314. Further, all PIDS solution may start acting as information generators for the C&C platform 314 i.e., miCRON.
[0047] The system may further analyze perimeter data to provide descriptive analytics, predictive analytics, and prescriptive analytics. In the descriptive analytics, end users may get to know what actually happened versus what is verbally reported. In the predictive analytics, history as well as sensor capabilities of the information generators may give vulnerability analysis and threat analysis. On the other hand, the prescriptive analytics may include force deployment recommendations and threat neutralization recommendations.
[0048] The system for Perimeter Intrusion Detection Systems (PIDS) may provide new additions/modifications to any verticals of technology such as mechanical systems and design of hardware, electrical and electronics hardware, power systems, processing stations, sensors and information generators, software systems and firmware embedded stack, artificial intelligence and machine learning stack, big data stack, and communication systems. Such additions/modification to any verticals of the technology is easy like plug and play. In one case, chassis dimensions and height may be modified based on a requirement of terrains and customers. In another case, new sensors may be integrated or number of sensors may be increased or decreased based on the requirement of the terrains and customers.
[0049] Further, algorithms of software and firmware may be configured based on the requirement of site and customers. Further, architecture of the communication system 312 may be built or modified based on the requirement of the site of deployment. The communication system 312
may be closed and may have no connectivity to any cloud/cellular platform, and therefore no data may be shared onto internet, cellular network, or cloud. Further, existing solutions, third party solutions, and the information generators may be integrated to the C&C platform 314 i.e., the miCRON. Further, existing third party solutions such as security equipments and autonomous surveillance assets may be integrated with the C&C platform 314. Thus, the system for protecting the international borders, fragile perimeters, and strategic locations is cost effective, efficient, flexible, and reliable.
[0050] FIG. 5 illustrates a flowchart 500 of a method for detecting intrusion of a perimeter, in an embodiment. The flowchart of FIG. 5 shows the method steps executed according to one or more embodiments of the present disclosure. In this regard, each block may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the drawings. For example, two blocks shown in succession in FIG. 5 may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. Any process descriptions or blocks in flow charts should be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps in the process, and alternate implementations are included within the scope of the example embodiments in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved. In addition, the process descriptions or blocks in flow charts should be understood as representing decisions made by a hardware structure such as a state machine. The flowchart 500 starts at the step 502 and proceeds to step 508.
[0051] At step 502, secondary information may be received from Supporting Information Generators (SIGs) 104. The secondary information may be related to intrusion of a perimeter.
[0052] At step 504, primary information may be received from a Primary Information Generators (PIGs) 102. The primary information may be related to intrusion of the perimeter. Further, the primary information may be received based at least on a trigger by the SIGs 104.
[0053] At step 506, the primary information and the secondary information may be processed using machine learning algorithms to determine an intrusion of the perimeter.
[0054] At step 508, a user may be alerted about the perimeter intrusion.
[0055] It has thus been seen that the method for detecting intrusion of a perimeter according to the present invention achieves the purposes highlighted earlier. The method for detecting intrusion of a perimeter in any case could undergo numerous modifications and variants, all of which are covered by the same innovative concept; moreover, all of the details can be replaced by technically equivalent elements. In practice, the materials used, as well as the shapes and sizes, can be whatever according to the technical requirements. The scope of protection of the invention is therefore defined by the attached claims.

CLAIMS
We Claim:
1. A method for detecting intrusion of a perimeter, the method comprising:
receiving, from Supporting Information Generators (SIGs) (104), a secondary information related to intrusion of the perimeter;
receiving, from Primary Information Generators (PIGs) (102), a primary information related to intrusion of the perimeter, wherein the primary information is received based at least on a trigger by the SIGs (104);
processing the primary information and the secondary information using machine learning algorithms to determine an intrusion of the perimeter; and
alerting at least one user about the intrusion.
2. The method as claimed in claim 1, wherein the secondary information is used to augment or verify the primary information.
3. The method as claimed in claim 1, wherein the primary information has higher weight than the secondary information.
4. The method as claimed in claim 1, wherein the PIGs (102) and the SIGs (104) are connected in a mesh communication network (312) where all the PIGs (102) and the SIGs (104) interact with each other, wherein the mesh communication network (312) is encrypted.
5. The method as claimed in claim 4, wherein the mesh communication network (312) is closed to access from external networks.
6. The method as claimed in claim 1, further comprising increasing or decreasing sensitivity of the PIGs (102) and the SIGs (104) using the machine learning algorithms while occurrence of an event is detected.
7. A system for detecting intrusion of a perimeter, the system comprising:
Supporting Information Generators (SIGs) (104) for providing a secondary information related to intrusion of the perimeter;
Primary Information Generators (PIGs) (102) for providing a primary information related to intrusion of the perimeter, wherein the primary information is received based at least on a trigger by the SIGs (104);
at least one processor (412, 418) for processing the primary information and the secondary information using machine learning algorithms to determine an intrusion of the perimeter; and
a user interface for alerting at least one user about the intrusion.
8. The system as claimed in claim 7, wherein the secondary information is used to augment or verify the primary information.
9. The system as claimed in claim 7, wherein the primary information has higher weight than the secondary information.
10. The system as claimed in claim 7, wherein the PIGs (102) comprise at least one of Light Detection and Ranging (LIDAR) systems (202), cameras (204), and Radio Detecting and Ranging (RADAR) systems (206).
11. The system as claimed in claim 7, wherein the SIGs (104) comprise at least one of Infrared (IR) sensors (208), Doppler sensors and microwave sensors (210), cameras 212, taut wire sensors and ground vibration sensors (214), and IR curtains (216).
12. The system as claimed in claim 7, wherein the PIGs (102) and the SIGs are (104) connected in a mesh communication network (312) where all the PIGs (102) and the SIGs (104) interact with each other, wherein the mesh communication network (312) is closed and encrypted.
13. The system as claimed in claim 12, wherein the mesh communication network (312) is closed to access from external networks.
14. The system as claimed in claim 12, wherein the mesh communication network (312) is implemented as a wired network using at least one of optical cables, twisted pair cables, and Ethernet.
15. The system as claimed in claim 12, wherein the mesh communication network (312) is implemented wirelessly using a proprietary radio network.

Documents

Application Documents

# Name Date
1 201811034185-ASSIGNMENT WITH VERIFIED COPY [23-10-2024(online)].pdf 2024-10-23
1 201811034185-Correspondence-171224.pdf 2024-12-20
1 201811034185-STATEMENT OF UNDERTAKING (FORM 3) [11-09-2018(online)].pdf 2018-09-11
2 201811034185-FORM-16 [23-10-2024(online)].pdf 2024-10-23
2 201811034185-GPA-171224.pdf 2024-12-20
2 201811034185-POWER OF AUTHORITY [11-09-2018(online)].pdf 2018-09-11
3 201811034185-ASSIGNMENT WITH VERIFIED COPY [23-10-2024(online)].pdf 2024-10-23
3 201811034185-FORM FOR STARTUP [11-09-2018(online)].pdf 2018-09-11
3 201811034185-POWER OF AUTHORITY [23-10-2024(online)].pdf 2024-10-23
4 201811034185-IntimationOfGrant24-07-2023.pdf 2023-07-24
4 201811034185-FORM-16 [23-10-2024(online)].pdf 2024-10-23
4 201811034185-FORM FOR SMALL ENTITY(FORM-28) [11-09-2018(online)].pdf 2018-09-11
5 201811034185-POWER OF AUTHORITY [23-10-2024(online)].pdf 2024-10-23
5 201811034185-PatentCertificate24-07-2023.pdf 2023-07-24
5 201811034185-FORM 1 [11-09-2018(online)].pdf 2018-09-11
6 201811034185-IntimationOfGrant24-07-2023.pdf 2023-07-24
6 201811034185-FIGURE OF ABSTRACT [11-09-2018(online)].pdf 2018-09-11
6 201811034185-Annexure [03-07-2023(online)].pdf 2023-07-03
7 201811034185-Written submissions and relevant documents [03-07-2023(online)].pdf 2023-07-03
7 201811034185-PatentCertificate24-07-2023.pdf 2023-07-24
7 201811034185-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-09-2018(online)].pdf 2018-09-11
8 201811034185-Annexure [03-07-2023(online)].pdf 2023-07-03
8 201811034185-Correspondence to notify the Controller [16-06-2023(online)].pdf 2023-06-16
8 201811034185-EVIDENCE FOR REGISTRATION UNDER SSI [11-09-2018(online)].pdf 2018-09-11
9 201811034185-DRAWINGS [11-09-2018(online)].pdf 2018-09-11
9 201811034185-US(14)-HearingNotice-(HearingDate-20-06-2023).pdf 2023-05-22
9 201811034185-Written submissions and relevant documents [03-07-2023(online)].pdf 2023-07-03
10 201811034185-Correspondence to notify the Controller [16-06-2023(online)].pdf 2023-06-16
10 201811034185-DECLARATION OF INVENTORSHIP (FORM 5) [11-09-2018(online)].pdf 2018-09-11
10 201811034185-FORM 13 [27-03-2023(online)].pdf 2023-03-27
11 201811034185-COMPLETE SPECIFICATION [11-09-2018(online)].pdf 2018-09-11
11 201811034185-PETITION UNDER RULE 137 [27-03-2023(online)]-1.pdf 2023-03-27
11 201811034185-US(14)-HearingNotice-(HearingDate-20-06-2023).pdf 2023-05-22
12 201811034185-FORM 13 [27-03-2023(online)].pdf 2023-03-27
12 201811034185-PETITION UNDER RULE 137 [27-03-2023(online)].pdf 2023-03-27
12 201811034185-SSI REGISTRATION-130918.pdf 2018-09-18
13 201811034185-RELEVANT DOCUMENTS [27-03-2023(online)].pdf 2023-03-27
13 201811034185-Power of Attorney-130918.pdf 2018-09-18
13 201811034185-PETITION UNDER RULE 137 [27-03-2023(online)]-1.pdf 2023-03-27
14 201811034185-OTHERS-130918.pdf 2018-09-18
14 201811034185-PETITION UNDER RULE 137 [27-03-2023(online)].pdf 2023-03-27
14 201811034185-US(14)-HearingNotice-(HearingDate-17-02-2023).pdf 2023-01-23
15 201811034185-CLAIMS [16-12-2022(online)].pdf 2022-12-16
15 201811034185-FORM28-130918.pdf 2018-09-18
15 201811034185-RELEVANT DOCUMENTS [27-03-2023(online)].pdf 2023-03-27
16 201811034185-FER_SER_REPLY [16-12-2022(online)].pdf 2022-12-16
16 201811034185-FORM-9 [18-09-2018(online)].pdf 2018-09-18
16 201811034185-US(14)-HearingNotice-(HearingDate-17-02-2023).pdf 2023-01-23
17 201811034185-CLAIMS [16-12-2022(online)].pdf 2022-12-16
17 201811034185-Correspondence-050922.pdf 2022-09-12
17 201811034185-Form 5-130918.pdf 2018-09-18
18 201811034185-FER_SER_REPLY [16-12-2022(online)].pdf 2022-12-16
18 201811034185-FORM 18A [18-09-2018(online)].pdf 2018-09-18
18 201811034185-GPA-050922.pdf 2022-09-12
19 201811034185-Correspondence-050922.pdf 2022-09-12
19 201811034185-Correspondence-130918.pdf 2018-09-18
19 201811034185-FORM-26 [17-08-2022(online)].pdf 2022-08-17
20 201811034185-FER.pdf 2022-06-17
20 201811034185-GPA-050922.pdf 2022-09-12
20 abstract.jpg 2018-10-09
21 abstract.jpg 2018-10-09
21 201811034185-FORM-26 [17-08-2022(online)].pdf 2022-08-17
21 201811034185-FER.pdf 2022-06-17
22 201811034185-Correspondence-130918.pdf 2018-09-18
22 201811034185-FER.pdf 2022-06-17
22 201811034185-FORM-26 [17-08-2022(online)].pdf 2022-08-17
23 201811034185-FORM 18A [18-09-2018(online)].pdf 2018-09-18
23 201811034185-GPA-050922.pdf 2022-09-12
23 abstract.jpg 2018-10-09
24 201811034185-Form 5-130918.pdf 2018-09-18
24 201811034185-Correspondence-130918.pdf 2018-09-18
24 201811034185-Correspondence-050922.pdf 2022-09-12
25 201811034185-FER_SER_REPLY [16-12-2022(online)].pdf 2022-12-16
25 201811034185-FORM 18A [18-09-2018(online)].pdf 2018-09-18
25 201811034185-FORM-9 [18-09-2018(online)].pdf 2018-09-18
26 201811034185-CLAIMS [16-12-2022(online)].pdf 2022-12-16
26 201811034185-Form 5-130918.pdf 2018-09-18
26 201811034185-FORM28-130918.pdf 2018-09-18
27 201811034185-FORM-9 [18-09-2018(online)].pdf 2018-09-18
27 201811034185-OTHERS-130918.pdf 2018-09-18
27 201811034185-US(14)-HearingNotice-(HearingDate-17-02-2023).pdf 2023-01-23
28 201811034185-RELEVANT DOCUMENTS [27-03-2023(online)].pdf 2023-03-27
28 201811034185-Power of Attorney-130918.pdf 2018-09-18
28 201811034185-FORM28-130918.pdf 2018-09-18
29 201811034185-OTHERS-130918.pdf 2018-09-18
29 201811034185-PETITION UNDER RULE 137 [27-03-2023(online)].pdf 2023-03-27
29 201811034185-SSI REGISTRATION-130918.pdf 2018-09-18
30 201811034185-COMPLETE SPECIFICATION [11-09-2018(online)].pdf 2018-09-11
30 201811034185-PETITION UNDER RULE 137 [27-03-2023(online)]-1.pdf 2023-03-27
30 201811034185-Power of Attorney-130918.pdf 2018-09-18
31 201811034185-DECLARATION OF INVENTORSHIP (FORM 5) [11-09-2018(online)].pdf 2018-09-11
31 201811034185-FORM 13 [27-03-2023(online)].pdf 2023-03-27
31 201811034185-SSI REGISTRATION-130918.pdf 2018-09-18
32 201811034185-COMPLETE SPECIFICATION [11-09-2018(online)].pdf 2018-09-11
32 201811034185-DRAWINGS [11-09-2018(online)].pdf 2018-09-11
32 201811034185-US(14)-HearingNotice-(HearingDate-20-06-2023).pdf 2023-05-22
33 201811034185-Correspondence to notify the Controller [16-06-2023(online)].pdf 2023-06-16
33 201811034185-DECLARATION OF INVENTORSHIP (FORM 5) [11-09-2018(online)].pdf 2018-09-11
33 201811034185-EVIDENCE FOR REGISTRATION UNDER SSI [11-09-2018(online)].pdf 2018-09-11
34 201811034185-DRAWINGS [11-09-2018(online)].pdf 2018-09-11
34 201811034185-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-09-2018(online)].pdf 2018-09-11
34 201811034185-Written submissions and relevant documents [03-07-2023(online)].pdf 2023-07-03
35 201811034185-FIGURE OF ABSTRACT [11-09-2018(online)].pdf 2018-09-11
35 201811034185-EVIDENCE FOR REGISTRATION UNDER SSI [11-09-2018(online)].pdf 2018-09-11
35 201811034185-Annexure [03-07-2023(online)].pdf 2023-07-03
36 201811034185-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-09-2018(online)].pdf 2018-09-11
36 201811034185-FORM 1 [11-09-2018(online)].pdf 2018-09-11
36 201811034185-PatentCertificate24-07-2023.pdf 2023-07-24
37 201811034185-FIGURE OF ABSTRACT [11-09-2018(online)].pdf 2018-09-11
37 201811034185-FORM FOR SMALL ENTITY(FORM-28) [11-09-2018(online)].pdf 2018-09-11
37 201811034185-IntimationOfGrant24-07-2023.pdf 2023-07-24
38 201811034185-FORM 1 [11-09-2018(online)].pdf 2018-09-11
38 201811034185-FORM FOR STARTUP [11-09-2018(online)].pdf 2018-09-11
38 201811034185-POWER OF AUTHORITY [23-10-2024(online)].pdf 2024-10-23
39 201811034185-FORM FOR SMALL ENTITY(FORM-28) [11-09-2018(online)].pdf 2018-09-11
39 201811034185-FORM-16 [23-10-2024(online)].pdf 2024-10-23
39 201811034185-POWER OF AUTHORITY [11-09-2018(online)].pdf 2018-09-11
40 201811034185-ASSIGNMENT WITH VERIFIED COPY [23-10-2024(online)].pdf 2024-10-23
40 201811034185-FORM FOR STARTUP [11-09-2018(online)].pdf 2018-09-11
40 201811034185-STATEMENT OF UNDERTAKING (FORM 3) [11-09-2018(online)].pdf 2018-09-11
41 201811034185-GPA-171224.pdf 2024-12-20
41 201811034185-POWER OF AUTHORITY [11-09-2018(online)].pdf 2018-09-11
42 201811034185-Correspondence-171224.pdf 2024-12-20
42 201811034185-STATEMENT OF UNDERTAKING (FORM 3) [11-09-2018(online)].pdf 2018-09-11
43 201811034185-FORM 4 [18-09-2025(online)].pdf 2025-09-18

Search Strategy

1 201811034185E_17-06-2022.pdf

ERegister / Renewals

3rd: 07 Oct 2023

From 11/09/2020 - To 11/09/2021

4th: 07 Oct 2023

From 11/09/2021 - To 11/09/2022

5th: 07 Oct 2023

From 11/09/2022 - To 11/09/2023

6th: 07 Oct 2023

From 11/09/2023 - To 11/09/2024

7th: 07 Oct 2023

From 11/09/2024 - To 11/09/2025

8th: 19 Sep 2025

From 11/09/2025 - To 11/09/2026