Sign In to Follow Application
View All Documents & Correspondence

“System For Detecting Impending Intrusion”

Abstract: [001] The present disclosure provides a method and a system (100) to detect impending intrusion. The system (100) includes the facility (102), a command control centre (104), a threat vector unit (106), data centre (108), a communication network (110), a security system (112), and one or more sensors (114). In addition, the system (100) includes one or more drones (116), a RADAR (118), one or more cameras (120), a server (122), and a database (124). The threat vector unit, through the command control centre (104), monitors the region beyond the boundary of the facility to determine impending threat towards the facility (102). In addition, the threat vector unit (106) uses the captured set of data from the security system (112). Further, the set of data is utilized by the threat vector unit (106) to determine potential impending threat towards the facility (102). The command control centre (104) enables the security system (112) to change sensing region periodically, to obtain set of data that is to be utilized by the threat vector unit.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 March 2020
Publication Number
13/2022
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
patent@ipmetrix.com
Parent Application

Applicants

Sterlite Technologies Limited
House No. IFFCO Tower, 3rd Floor, Plot No.3, Street Sector 29 City Gurgaon State Haryana Country India Pin code 122002

Inventors

1. Amit Kar
House No. IFFCO Tower, 3rd Floor, Plot No.3, Street Sector 29 City Gurgaon State Haryana Country India Pin code 122002

Specification

[0001] The present disclosure relates to the field of security system and, in particular, relates to a method and system for detecting impending intrusion. The present application is based on, and claims priority from an Indian Application Number IN202011009460 filed on 05-03-2020 the disclosure of which is hereby incorporated by reference herein.

BACKGROUND OF INVENTION
[0002] Of late, there has been rise in demands for security and surveillance systems for the purposes of detecting intrusions that may impose threat for an establishment or a facility. The facility refers to secured establishments such as banks, power grids, power plants, and the like. Conventionally, the security and surveillance systems integrated at perimeter areas give alarm based on intrusion or impending intrusion. However, the conventional security and surveillance systems are incapable to detect any change in one or more conditions outside the range of the security and surveillance systems that possesses threat to the facility. The one or more conditions include physical conditions, geographical conditions, civil conditions, and the like. Further, any change in the one or more conditions weakens security arrangements of the conventional security and surveillance systems and may delay response time when the threat is encountered. Furthermore, any change in the one or more conditions enables unlawful access to the facility. Moreover, the conventional security and surveillance systems are incapable to monitor upcoming threats towards the facility. Also, the conventional security and surveillance systems are inefficient to cater to upcoming threats over a span of period that is monitored from outside the facility.
[0003] In order to address aforementioned problems, various surveillance systems have been proposed that periodically changes sensing ranges. However, the periodical change in the sensing ranges is limited to additional area survey only. Changing sensing range of the surveillance system to record activities that could develop as a threat is not known. Further, the proposed surveillance systems fail to classify the one or more conditions or changes that can assist in intrusion or can cause harm to the establishment or area.
[0004] In light of the above stated discussion, there is a need to overcome the above-mentioned disadvantages and to provide a system for early detection of environmental developments that may mature as threat or cause harm.

OBJECT OF INVENTION
[0005] A primary object of the present disclosure is to provide a method and a system to detect impending intrusion using a threat vector unit.
[0006] Another objective of the present disclosure is to provide the system to monitor frequency and behavior of development in region near to any establishment to generate alert in a command control centre.
[0007] Another objective of the present disclosure is to provide the method and the system to enhance security arrangements of any establishment.

SUMMARY
[0008] In an aspect, the present disclosure provides a system to detect impending intrusion. The system includes the facility, a command control centre, a threat vector unit, data centre, a communication network, a security system, a satellite, and one or more sensors. In addition, the system includes one or more drones, a RADAR, one or more cameras, a server, a satellite, and a database. The threat vector unit, through the command control centre, monitors the region beyond the boundary of the facility to determine impending threat towards the facility. In addition, the threat vector unit uses the captured set of data from the security system. Further, the set of data is utilized by the threat vector unit to determine potential impending threat towards the facility. The one or more cameras are installed at perimeter area of the facility. The command control centre enables the security system to change sensing region periodically, to obtain set of data that is to be utilized by the threat vector unit. In addition, the security system monitors environmental development in vicinity of the facility to capture environmental developments that can be potentially utilized for causing harm to the facility.
[0009] The security system comprises a monitoring system configured to monitor developments outside the perimeter of the facility by periodically changing a monitoring range. The security system is communicatively coupled with a threat vector unit. The threat vector unit is configured to determine a threat value based on monitored developments outside the perimeter of the facility and issue an alert based on the threat value obtained from threat vector unit. The monitoring system is a fixed monitoring system that is configured to monitor developments outside the perimeter by periodically changing the monitoring range. The monitoring system is a movable monitoring system that is configured to monitor developments outside the perimeter by periodically changing the monitoring range. The monitoring system increases the monitoring range periodically to sense development outside the perimeter of the facility.
[0010] The present disclosure provides a method to detect impending intrusion. The method comprises steps of monitoring, by a fixed monitoring system, a perimeter of a facility by periodically changing a monitoring range and monitoring, by a movable monitoring system, the perimeter of the facility by changing a trajectory of motion to periodically change the monitoring range. The method further includes receiving, by a threat vector unit, a set of data from the fixed monitoring system and the movable monitoring system and comparing, by the threat vector unit, the set of data with a previously recorded set of data. The method further includes clustering, by the threat vector unit, the set of data based on comparison of the previously recorded set of data and the received set of data; assigning, by the threat vector unit, a threat value to the set of data clustered during comparison and notifying, by the threat vector unit, based on the threat value assigned to the set of data.
[0011] Alternatively, the present disclosure provides a method to detect impending intrusion. The method comprises steps of monitoring, by a fixed monitoring system, a perimeter of a facility by periodically changing a monitoring range and monitoring, by a movable monitoring system, the perimeter of the facility by changing a trajectory of motion to periodically change the monitoring range. Further, the method includes sensing, by the threat vector unit, nearby development, wherein the fixed monitoring system and the movable monitoring system increase the monitoring range periodically and altering, by a threat vector unit, a period of change of the monitoring range based on an alert.
[0012] The threat vector unit is configured to receive, from the security system, a set of data of a vicinity of the facility; compare the set of data with a previously recorded set of data; cluster the set of data based on comparison of the previously recorded set of data and the received set of data; assign a threat value to the set of data clustered during comparison, wherein the previously recorded set of data corresponds to the set of data recorded over a span of period; and alert based on the threat value assigned to the set of data.
[0013] The development may be any environmental development, civil work, natural occurrence, vehicle movements, and presence of individuals with possible acts of intrusion.
[0014] The threat vector unit analyzes pattern of an abnormal development that may be categorized as a potential threat and generates alert based on the abnormal development.
[0015] The fixed monitoring system may be one or more cameras, one or more sensors, RADAR mechanically attached to a wall or a pole and the movable monitoring system may be one or more drones. The one or more sensors include but may not be limited to PIDS (Perimeter Intrusion Detection System) OFC fence sensor, UVDS (Underground Vibration Detection System) OFC buried sensor, SONAR (sound navigation ranging) and hydrophone, unattended ground sensor, and wireless sensor. The one or more cameras include but may not be limited to PTZ camera, dome camera, IP camera, day/night camera, thermal camera, wireless IP camera, and the like. The one or more drones act as surveillance system for the facility. In addition, the one or more drones captures the set of data and transmits to the command control centre.
[0016] The fixed monitoring system and the movable monitoring system are configured to monitor different activities such as environmental development in a vicinity of a facility over a period of time or an act of intrusion.
[0017] The threat vector unit assigns different threat values to the different activities and combines the different threat values to categorize the set of data to generate notification. The notification is based on an intensity of threat value such as high, medium or low.
[0018] The facility includes but may not be limited to at least one of building, organization, institution, and skyscraper.
[0019] The set of data includes image data, video data, a combination of image data and video data, acoustic data, and the like.
[0020] The command control centre enables the security system to monitor frequency of recent development and generates alerts accordingly. In addition, the recent development corresponds to any civil work, natural occurrence, vehicle movements, and presence of individuals.
[0021] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.

STATEMENT OF THE DISCLOSURE
[0022] The present disclosure provides a system to detect impending intrusion. The system includes the facility, a command control centre, a threat vector unit, data centre, a communication network, a security system, and one or more sensors. In addition, the system includes one or more drones, a RADAR, one or more cameras, a server, and a database. The command control centre monitors and accesses the security system to determine impending threat towards the facility. In addition, the command control centre captures a set of data using the security system. Further, the set of data is utilized by the command control centre to determine potential impending threat towards the facility using the threat vector unit. The one or more cameras are installed at perimeter area of the facility. The command control centre enables the security system to change sensing region periodically. In addition, the security system monitors environmental development that is utilized to detect any intrusion in vicinity of the facility.

BRIEF DESCRIPTION OF FIGURES
[0023] The method and system are illustrated in the accompanying drawings, throughout which like reference letters indicate corresponding parts in the various figures. The embodiments herein will be better understood from the following description with reference to the drawings, in which:
[0024] FIG. 1 illustrates a system for detecting impending intrusion towards a facility;
[0025] FIG. 2 illustrates a hardware framework of the system;
[0026] FIG. 3 illustrates an example of a facility that is enabled with the system for detecting impending intrusion;
[0027] FIG. 4 is a flow chart depicting a method for determining a threat vector;
[0028] FIG. 5 is a flow chart depicting a method for detecting impending intrusion towards the facility; and
[0029] FIG. 6 is a flow chart depicting a method for categorizing temporal development and detecting impending intrusion towards the facility.
[0030] It should be noted that the accompanying figures are intended to present illustrations of exemplary embodiments of the present disclosure. These figures are not intended to limit the scope of the present disclosure. It should also be noted that accompanying figures are not necessarily drawn to scale.

DETAILED DESCRIPTION OF INVENTION
[0031] In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present technology. It will be apparent, however, to one skilled in the art that the present technology can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form only in order to avoid obscuring the present technology.
[0032] Reference in this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present technology. The appearance of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but no other embodiments.
[0033] Moreover, although the following description contains many specifics for the purposes of illustration, anyone skilled in the art will appreciate that many variations and/or alterations to said details are within the scope of the present technology. Similarly, although many of the features of the present technology are described in terms of each other, or in conjunction with each other, one skilled in the art will appreciate that many of these features can be provided independently of other features. Accordingly, this description of the present technology is set forth without any loss of generality to, and without imposing limitations upon, the present technology.
[0034] Accordingly, the present disclosure provides a method and a system to detect impending intrusion. The system includes a facility or an establishment, a command control centre, a threat vector unit, a data centre, a communication network, a security system, and one or more sensors. The system further includes one or more drones, a RADAR, one or more cameras, a server, and a database. The threat vector unit, through the command control centre, monitors the region beyond the boundary of the facility to determine impending threat towards the facility. In addition, the threat vector unit uses the captured set of data from the security system. Further, the set of data is utilized by the threat vector unit to determine potential impending threat towards the facility. The command control centre enables the security system to change sensing region periodically, to obtain set of data that is to be utilized by the threat vector unit.
[0035] Unlike conventional methods and systems, the proposed disclosure can be used for early detection and warning of intrusion. Further, the proposed disclosure helps in early detection of environmental developments that may mature as threat or assist in causing harm to the establishment.
[0036] The key idea is to provide the surveillance system that records behavior and based on recorded data predicting whether the behavior is harmful or not while changing a sensing range of the surveillance system, recording and classifying environmental changes that can assist in intrusion. The key idea is to detect anomaly and to check the detected anomaly with possible intrusion/intrusion assistance scenarios by recording data (image/video) from a vicinity of the establishment. The key idea is to detect anomaly that may pose as a threat to the vicinity of the establishment or will mature as a threat over a period of time. Further, the key idea is to record the data (image/video) and compare the recorded data with previously recorded data and based on the comparison, categorizing the data into a group out of multiple groups, where every group is given a threat value.
[0037] Referring now to the drawings, and more particularly to FIGS. 1 through 6, there are shown preferred embodiments.
[0038] FIG. 1 illustrates a system 100 to detect impending intrusion towards a facility 102.
[0039] The system 100 includes the facility 102, a command control centre 104, a threat vector unit 106, a data centre 108, a communication network 110, a security system 112, and one or more sensors 114. In addition, the system 100 includes one or more drones 116, a RADAR 118, one or more cameras 120, a server 122, and a database 124.
[0040] Alternatively, the system 100 includes the facility 102. The facility 102 includes the command control centre 104. The facility 102 may be, but not limited to, at least one of building, organization, institution, and skyscraper. In an example, the facility 102 may be a financial institution such as banks, central banks, retail and commercial banks, credit unions, savings, and loans associations, investment banks, investment companies, brokerage firms, insurance companies, and mortgage companies. In another example, the facility 102 is a non-banking financial company. In yet another example, the facility 102 is any power plant or power distribution unit. In yet another example, the facility 102 is any organization or building that stores and protects the confidential information of one or more users. Thus, the facility 102 may be any type of establishment.
[0041] The system 100 includes the command control centre 104. The command control centre 104 is installed at the facility 102. In general, the command control centre is nerve centre for any organization. The command control centre 104 controls various operations performed in any organization. Further, the command control centre accesses and monitors smart applications and systems installed in any organization. The smart applications include but may not be limited to surveillance system, environmental monitoring system, GIS system, and Wi-Fi management system. The command control centre 104 monitors and accesses the security system 112 to determine impending threat towards the facility 102. The command control centre 104 captures a set of data using the security system 112. The set of data includes image data, video data, a combination of image data and video data, and the like. The set of data is utilized by the threat vector unit present with the command control centre 104 to determine potential impending threat towards the facility 102. The command control centre 104 determines potential impending threat towards the facility 102 with utilization of the threat vector unit 106. The threat vector unit 106 is associated with the command control centre 104. The command control centre 104 is communicatively coupled with the data centre 108. In general, data centre includes computing and networking equipment to collect, store, process, distribute, and allow access to data. The data centre 108 enables the command control centre 104 to access data and services.
[0042] The system 100 includes the communication network 110. The communication network 110 provides medium to the command control centre 104 to connect with the security system 112. The communication network 110 uses protocols to connect the command control centre 104 with the security system 112. The communication network 110 facilitates transmission of the set of data from the security system 112 to the command control centre 104. The communication network 110 is used to provide internet or intranet access to the command control centre 104.
[0043] Alternatively, the communication network 110 is any type of network that provides internet connectivity to the command control centre 104. In an example, the communication network 110 is a wireless mobile network. In another example, the communication network 110 is a wired network with a finite bandwidth. In yet another example, the communication network 110 is a combination of the wireless and the wired network for optimum throughput of data transmission. In yet another example, the communication network 110 is an optical fiber high bandwidth network that enables high data rate with negligible connection drops.
[0044] The system 100 includes the security system 112. The security system 112 may include, but not limited to, the one or more sensors 114, the one or more drones 116, the RADAR 118, the one or more ultrasonic sensors and the one or more cameras 120. The security system 112 is utilized by the command control centre 104 to capture the set of data related to perimeter intrusion threat of the facility. In an example, perimeter intrusion threat includes one or more types of threats. In addition, the one or more types of threats include but may not be limited to personal movements, vehicle movement, and digging or drilling.
[0045] The security system 112 includes the one or more sensors 114. The one or more sensors 114 include but may not be limited to PIDS (Perimeter Intrusion Detection System), OFC fence sensor, UVDS (Underground Vibration Detection System) OFC (optical fibre cable) buried sensor, SONAR (sound navigation ranging) and hydrophone, unattended ground sensor, and wireless sensor. In an example, perimeter intrusion detection system (PIDS) is installed in conjunction with OFC fence sensor over fence to sense any movement nearby fence. In an example, UVDS (Underground Vibration Detection System) is capable of detecting vibration generated by human intruders while walking, crawling and tunnelling across perimeter. In addition, UVDS includes vibration sensors that are buried underground and integrated with IPSS (intelligent pipeline surveillance system) through OFC. In an example, SONAR corresponds to sound navigation ranging. In addition, SONAR is a technique that utilizes systems and methods to detect objects underwater using sound waves. In an example, hydrophone is a listening device that is utilized to detect sound of any object. In an example, unattended ground sensor is used to detect, track, and identify humans and vehicles.
[0046] The security system 112 includes the one or more drones 116. In general, drone corresponds to unmanned aerial vehicle. In an example, the one or more drones 116 are equipped with cameras to record videos and images of areas surrounding the facility 102. Alternatively, the one or more drones 116 act as surveillance system of the facility 102. In addition, the one or more drones 116 captures the set of data and transmits to the command control centre 104. The one or more drones 116 are movable in nature and changes trajectory of motion to periodically change the range of monitoring (i.e. monitoring range).
[0047] In an embodiment of the present disclosure, the security system 112 includes the RADAR 118. In addition, the RADAR 118 corresponds to Radio Detection and Ranging. In general, RADAR utilizes radio waves to determine one or more parameters. In addition, the one or more parameters include range, angle, and velocity. Further, the RADAR is utilized to detect aircraft, ships, spacecraft, guided missiles, motor vehicles, weather formations, terrain, and the like.
[0048] The security system 112 includes the one or more cameras 120. The one or more cameras 120 include but may not be limited to PTZ camera, dome camera, IP camera, day/night camera, thermal camera, wireless IP camera, and the like. The one or more cameras 120 are installed at perimeter area of the facility 102. Alternatively, the one or more cameras 120 are installed inside the facility 102. Alternatively, the one or more cameras 120 are installed at any location of the facility 102. The one or more cameras 120 are used to capture the set of data in any light conditions. In addition, the set of data captured by the one or more cameras 120 are transmitted to the command control centre 104 through the communication network 110.
[0049] The security system 112 is used as a monitoring system and may be a fixed (also called as a fixed monitoring system 112a) or a movable (also called as a movable monitoring system 116) in nature or combination thereof. The fixed monitoring system 112a and the movable monitoring system 116 may combinedly be called as the monitoring system (112a, 116). The monitoring system (112a, 116) is configured to monitor developments outside the perimeter of the facility 102 by periodically changing the monitoring range. The fixed monitoring system may be the one or more cameras 120 mounted on a pole or mechanically attached to a suitable location/object such as wall, pole or the like and rotate to periodically change the range of monitoring or the one or more sensors 114 or the RADAR 118. The fixed monitoring system 112a may be either of the one or more cameras 120, the one or more sensors 114, the RADAR 118 or combination thereof. The fixed monitoring system 112a may be any suitable data capturing device, wherein data capturing may be related to capturing signals, vibrations, images, video or the like. Similarly, the movable monitoring system may include the one or more drones 116 that change trajectory of motion to periodically change the range of monitoring. The terms one or more drones 116 and the movable monitoring system may interchangeably be used throughout the disclosure. The fixed monitoring system 112a and the movable monitoring system 116 may be any suitable data capturing and monitoring systems.
[0050] The range of monitoring is user-defined. Alternatively, the range of monitoring may be set by the security system 112. The period for change in range of monitoring may be user-defined or based on timer. The period for change in range of monitoring may be, but not limited to, an hour, a day, a week, a year.
[0051] The command control centre 104 enables the security system 112 to change their sensing region periodically. In addition, the sensing region covers area present outside perimeter of the facility 102. In an embodiment of the present disclosure, the security system 112 records the set of data from vicinity of establishment of the facility 102 to detect any upcoming threat. In addition, the security system 112 monitors environmental development in vicinity of the facility 102 that can be utilized to cause harm to the facility 102. The command control centre 104 utilizes the security system 112 to sense combination of potential threat and environmental development to determine potential incremental change in threat using the threat vector unit 106. The threat vector unit 106 is based on artificial intelligence such as, but not limited to, machine learning, deep learning, neural network, computer vision. In an example, the threat vector unit 106 is trained with image learning techniques. The threat vector unit 106 compares the previously recorded set of data with the current set of data. In addition, the threat vector unit 106 clusters the set of data based on comparison of the previously recorded set of data and the current set of data. Further, the threat vector unit 106 assigns a threat value to the set of data clustered during comparison. In an example, the previously recorded set of data corresponds to last recorded images or videos collected over a span of period. The threat vector unit 106 notifies relevant authority of the facility 102 through alarm or notification based on the threat value assigned to the set of data. In an example, the command control centre 104 performs survey of recent development in region near to the facility 102 with the security system 112. In addition, the command control centre 104 categorizes the recent developments in low threat categories with the threat vector unit 106. Further, the command control centre 104 enables the security system 112 to monitor frequency of recent development and generates alerts accordingly. Furthermore, the recent developments correspond to any civil work, natural occurrence, vehicle movements, and presence of individuals.
[0052] In an example, the set of data recorded by the security system 112 includes sewage system status located in vicinity of the facility 102. In another example, the set of data includes presence or development of civil infrastructure in vicinity of the facility 102. In yet another example, the set of data includes presence of abnormal growth of flora and fauna in vicinity of the facility 102. In yet another example, the set of data includes presence of vehicles in vicinity of the facility 102. In yet another example, the set of data includes data associated with geographical changes in vicinity of the facility 102.
[0053] In other words, the security system 112 records the set of data from the vicinity of the facility 102 to detect anomaly and checks it with possible intrusion/intrusion assistance scenarios. The anomaly may be any type of abnormal development near the facility 102 that may pose as a threat or will mature as a threat over the period of time.
[0054] The set of data recorded is stored on the threat vector unit 106. The threat vector unit also acts an analytical platform. The term threat vector unit and the analytical platform may interchangeably be used throughout the present disclosure and can be indicated by same reference numeral 106. The analytical platform is utilized to compare series of images or videos collected over the span of time. Further, the analytical platform analyses pattern of abnormal development or temporal development or behavior that is categorized as potential threat. Further, the analytical platform categorizes any changes in environment as assistance to intrusion or other illicit activities. Furthermore, the analytical platform maps the changes in environment against activities assisted by change in environment. Moreover, the change in environment is marked as threat based on mapping. In an example, the change in environment includes any damage in sewage pipe and grown tree near the boundary of the facility 102. In addition, these kind of change in environment is consider as an attempt to gain entrance in the facility 102.
[0055] The set of data is marked by the analytical platform in one or more categories. In addition, the one or more categories include but may not be limited to low threat, medium threat, and high threat. Alternatively, the one or more categories represent intensity of the threat as high, medium, or low. In an example, presence of flora and fauna near the facility 102 is categorized as low threat. In another example, presence of abnormal growth of flora and fauna is categorized as high threat. In an example, presence of person or vehicle near the facility 102 is categorized as low threat. In another example, repeated presence of same person or same vehicle near the facility 102 is categorized as high threat. The analytical platform strengthens potential threat value through satellite surveillance data. The analytical platform generates alert in the command control centre 104 based on threat value.
[0056] The threat vector unit 106 alters a period of change in sensing or monitoring range based on the alert, wherein the alert is based on the threat value related to nearby developments. In other words, the threat vector unit 106 is configured to determine the threat value based on the monitored developments outside the perimeter of the facility 102 and issue an alert based on the threat value obtained from the threat vector unit 106.
[0057] The system 100 includes the server 122. The system 100 is associated with the server 122. The server 122 may be a part of the command control centre 104. The server 122 handles each operation and task performed by the command control centre 104. The server 122 stores one or more instructions and one or more processes for performing various operations of the command control centre 104. The server 122 may be a cloud server. In general, cloud server is built, hosted and delivered through a cloud computing platform. In general, cloud computing is a process of using remote network server that are hosted on the internet to store, manage, and process data. The server 122 includes the database 124.
[0058] The database 124 is used for storage purposes. The database 124 is communicatively coupled with the server 122. In general, database is a collection of information that is organized so that it can be easily accessed, managed and updated. The database 124 provides storage location to all data and information required by the command control centre 104. The database 124 provides storage to the set of data recorded with facilitation of the command control centre 104. The database 124 may be, but not limited to, at least one of hierarchical database, network database, relational database, object-oriented database and the like.
[0059] FIG. 2 illustrates a hardware framework 200 of the system 100. The system 100 is a non-transitory computer-readable storage medium. The system 100 includes a bus 202 that directly or indirectly couples the following devices: memory 204, one or more processors 206, one or more presentation components 208, one or more input/output (I/O) ports 210, one or more input/output components 212, and an illustrative power supply 214. The bus 202 represents what may be one or more busses (such as an address bus, data bus, or combination thereof). Although the various blocks of FIG. 2 are shown with lines for the sake of clarity, in reality, delineating various components is not so clear, and metaphorically, the lines would more accurately be grey and fuzzy. For example, one may consider a presentation component such as a display device to be an I/O component. Also, processors have memory. The inventors recognize that such is the nature of the art and reiterate that the diagram of FIG. 2 is merely illustrative of an exemplary device that can be used in connection with one or more embodiments of the present invention. Distinction is not made between such categories as “workstation,” “server,” “laptop,” “hand-held device,” etc., as all are contemplated within the scope of FIG. 2 and reference to “computing device.”
[0060] The system 100 typically includes a variety of computer-readable media. The computer-readable media can be any available media that can be accessed by the system 100 and includes both volatile and non-volatile media, removable and non-removable media. By way of example, and not limitation, the computer-readable media may comprise computer storage media and communication media. The computer storage media includes volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. The computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by the system 100. The communication media typically embodies computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term “modulated data signal” means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, RF, infrared and other wireless media. Combinations of any of the above should also be included within the scope of computer-readable media.
[0061] Memory 204 includes computer-storage media in the form of volatile and/or non-volatile memory. The memory 204 may be removable, non-removable, or a combination thereof. Exemplary hardware devices include solid-state memory, hard drives, optical-disc drives, etc. The system 100 includes the one or more processors 206 that read data from various entities such as memory 204 or I/O components 212. The one or more presentation components 208 present data indications to a user or other device. Exemplary presentation components include a display device, speaker, printing component, vibrating component, etc. The one or more I/O ports 210 allow the system 100 to be logically coupled to other devices including the one or more I/O components 212, some of which may be built in. Illustrative components include a microphone, joystick, game pad, satellite dish, scanner, printer, wireless device, etc.
[0062] FIG. 3 illustrates an example of a facility that is enabled with the system for detecting impending intrusion. FIG. 3 illustrates the secured establishment, such as banks, power grids, power plants, and the like that is enabled with various embodiments of the present invention for detecting and/or predicting impending intrusion or threat to the facility 102.
[0063] FIG. 4 is a flow chart depicting a method for determining a threat vector. The method 400 includes receiving a set of data of vicinity of the facility 102 to detect any upcoming threat at 402.
[0064] The security system 112 records the set of data and forwards it to the command control centre 104. The command control centre 104 feeds the set of data to the threat vector unit 106. The set of data is a multimedia data such as video, images or the like. The set of data may be a recorded data, a real-time data or the like. The set of data may be related to the pattern of environmental development or temporal development. The threat vector unit 106 monitors a pattern of environmental development over a period of time. The set of data may be related an act of intrusion such as repeated presence of person or vehicle near the facility 102.
[0065] At 404, the threat vector unit compares the previously recorded set of data with the received (latest) set of data.
[0066] At 406, the threat vector unit 106 clusters the set of data based on comparison of the previously recorded set of data and the current set of data. At 408, the threat vector unit 106 assigns a threat value to the clustered set of data obtained from 408. In an example, the previously recorded set of data corresponds to last recorded images or videos collected over a span of period.
[0067] A different threat value will be assigned to different types of clusters. The different threat value may be combined to determine the final threat value.
[0068] At 410, the threat vector unit 106 notifies relevant authority of the facility 102 through alarm or notification based on the threat value assigned to the set of data.
[0069] The method 400 is an iterative process that identifies threats based on the threat value, which is already disclosed in FIG. 1.
[0070] FIG. 5 is a flow chart depicting a method 500 for detecting impending intrusion towards the facility 102. The method 500 includes recording the set of data by the security system 112 at 502. The security system 112 combines the set of data of the one or more sensors 114, the one or more drones 116, the RADAR 118 and the one or more cameras 120. Alternatively, the security system 112 may not combine the set of data and may record using either of the one or more sensors 114, the one or more drones 116, the RADAR 118 and the one or more cameras 120.
[0071] At 504, the recorded set of data is sent to the command control centre 104 in the facility 102.
[0072] At 506, the threat vector unit 106, that is communicatively coupled with the command control centre 104, receives the set of data from the command control centre 104. Further, the threat vector unit 106 determines the threat value with respect to the recorded set of data. The detailed functionality of the threat vector unit 106 is already explained in FIGS. 1 and 4.
[0073] At 508, the method includes notifying the command control centre 104 through alarm or notification based on the threat value assigned to the set of data.
[0074] The method 500 can be performed either for a fixed monitoring range or by changing the monitoring range for the facility 102.
[0075] FIG. 6 is a flow chart depicting a method 600 for categorizing temporal development and detecting impending intrusion towards the facility 102.
[0076] At 602, the method includes monitoring temporal activity, by capturing the set of data using the security system 112 installed at a perimeter of the facility. The set of data is the data of nearby area (vicinity) of the facility.
[0077] At 604, the method includes receiving the set of data with respect to the temporal activity.
[0078] At 606, the method includes assigning different threat values to different activities. The different activities may be, but not limited to, an environmental development, any act of intrusion, any civil work or the like.
[0079] At 608, the method includes combining the different threat values of the different activities to generate result. The result may be a final threat value.
[0080] At 608, the method includes combining the different threat values of the different activities to generate result. The result may be a final threat value. The threat value may represent a potential threat for the facility.
[0081] At 610, the method includes categorizing the result obtained at 608 in one or more categories.
[0082] The one or more categories include but may not be limited to low threat, medium threat, and high threat. Alternatively, the one or more categories represent intensity of the threat as high, medium, or low. In an example, presence of flora and fauna near the facility 102 is categorized as low threat. In another example, presence of abnormal growth of flora and fauna is categorized as high threat. In an example, presence of person or vehicle near the facility 102 is categorized as low threat. In another example, repeated presence of same person or same vehicle near the facility 102 is categorized as high threat.
[0083] At 612, the method generates alert in the command control centre 104 based on threat value.
[0084] The method 600 can be performed either for a fixed monitoring range or by changing the monitoring range for the facility 102.
[0085] The present invention has various advantages over the prior art. The present invention relates to the system to detect impending intrusion using a threat vector unit. In addition, the system monitors frequency of development in region near to any building or organization to generate alert in the command control centre. Further, the system enhances security arrangements of any building or organization.
[0086] The various actions, acts, blocks, steps, or the like in the flow chart may be performed in the order presented, in a different order or simultaneously. Further, in some embodiments, some of the actions, acts, blocks, steps, or the like may be omitted, added, modified, skipped, or the like without departing from the scope of the invention.
[0087] The embodiments disclosed herein can be implemented using at least one software program running on at least one hardware device and performing network management functions to control the elements.
[0088] The foregoing descriptions of specific embodiments of the present technology have been presented for purposes of illustration and description. They are not intended to be exhaustive or to limit the present technology to the precise forms disclosed, and obviously many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, to thereby enable others skilled in the art to best utilize the present technology and various embodiments with various modifications as are suited to the particular use contemplated. It is understood that various omissions and substitutions of equivalents are contemplated as circumstance may suggest or render expedient, but such are intended to cover the application or implementation without departing from the spirit or scope of the claims of the present technology.
[0089] While several possible embodiments of the invention have been described above and illustrated in some cases, it should be interpreted and understood as to have been presented only by way of illustration and example, but not by limitation. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments.

We claim:

1.A system (100) to detect impending intrusion comprising a security system (112) for monitoring perimeter of a facility (102), the security system (112) comprises:
a monitoring system (112a, 116) configured to monitor developments outside the perimeter of the facility (102) by periodically changing a monitoring range;
wherein the security system (112) is communicatively coupled with a threat vector unit (106), wherein the threat vector unit (106) is configured to determine a threat value based on the monitored developments outside the perimeter of the facility (102) and issue an alert based on the threat value obtained from the threat vector unit (106).
2. The security system (112) as claimed in claim 1, wherein the monitoring system is a fixed monitoring system (112a) that is configured to monitor the developments outside the perimeter by periodically changing the monitoring range.
3. The security system (112) as claimed in claim 1, wherein the monitoring system is a movable monitoring system (116) that is configured to monitor the developments outside the perimeter by periodically changing the monitoring range.
4. The security system (112) as claimed in claim 1, wherein the monitoring system (112a, 116) increases the monitoring range periodically to sense the developments outside the perimeter of the facility.
5. The security system (112) as claimed in claim 1, wherein the development may be any environmental development, civil work, natural occurrence, vehicle movements, and presence of individuals with possible acts of intrusion.
6. The security system (112) as claimed in claim 1, wherein the threat vector unit (106) analyzes pattern of an abnormal development that may be categorized as a potential threat and generates alert based on the abnormal development.
7. The security system (112) as claimed in claim 1, wherein the threat vector unit (106) is configured to:
receive, from the security system (112), a set of data of a vicinity of the facility (102);
compare the set of data with a previously recorded set of data;
cluster the set of data based on comparison of the previously recorded set of data and the received set of data;
assign a threat value to the set of data clustered during comparison, wherein the previously recorded set of data corresponds to the set of data recorded over a span of period; and
issue the alert based on the threat value assigned to the set of data.
8. The security system (112) as claimed in claim 7, wherein the set of data is a multimedia data such as video or images.
9. The security system (112) as claimed in claim 1, wherein the fixed monitoring system (112a) may be one or more cameras (120), one or more sensors (114), RADAR (118) mechanically attached to a wall or a pole and the movable monitoring system (116) may be one or more drones.
10. A method to detect impending intrusion, the method comprising:
monitoring, by a fixed monitoring system (112a), a perimeter of a facility (102) by periodically changing a monitoring range;
monitoring, by a movable monitoring system (116), the perimeter of the facility (102) by changing a trajectory of motion to periodically change the monitoring range;
receiving, by a threat vector unit (106), a set of data from the fixed monitoring system (112a) and the movable monitoring system (116);
comparing, by the threat vector unit (106), the set of data with a previously recorded set of data;
clustering, by the threat vector unit (106), the set of data based on comparison of the previously recorded set of data and the received set of data;
assigning, by the threat vector unit (106), a threat value to the set of data clustered during comparison; and
notifying, by the threat vector unit (106), based on the threat value assigned to the set of data.
11. The method as claimed in claim 10, wherein the fixed monitoring system (112a) and the movable monitoring system (116) are configured to monitor different activities such as environmental development in a vicinity of a facility (102) over a period of time or an act of intrusion.
12. The method as claimed in claim 11, wherein the threat vector unit (106) assigns different threat values to the different activities and combines the different threat values to categorize the set of data to generate notification.
13. The method as claimed in claim 10, wherein the notification is based on an intensity of threat value such as high, medium or low.
14. The method as claimed in claim 10, wherein the set of data is a multimedia data such as video or images.
15. The method as claimed in claim 10, wherein the fixed monitoring system (112a) may be one or more cameras (120), one or more sensors (114), RADAR (118) mechanically attached to a wall or a pole and the movable monitoring system (116) may be one or more drones.
16. A method to detect impending intrusion, the method comprising:
monitoring, by a fixed monitoring system (112a), a perimeter of a facility (102) by periodically changing a monitoring range;
monitoring, by a movable monitoring system (116), the perimeter of the facility (102) by changing a trajectory of motion to periodically change the monitoring range;
sensing, by the threat vector unit (106), nearby development, wherein the fixed monitoring system (112a) and the movable monitoring system (116) increase the monitoring range periodically; and
altering, by a threat vector unit (106), a period of change of the monitoring range based on an alert.
17. The method as claimed in claim 16, wherein the development may be any environmental development, civil work, natural occurrence, vehicle movements, and presence of individuals with possible acts of intrusion.
18. The method as claimed in claim 16, wherein the threat vector unit (106) analyzes pattern of an abnormal development that may be categorized as a potential threat and generates alert based on the abnormal development.
19. The method as claimed in claim 16, wherein the threat vector unit (106) is configured to:
receive, from the security system (112), a set of data of a vicinity of the facility (102);
compare the set of data with a previously recorded set of data;
cluster the set of data based on comparison of the previously recorded set of data and the received set of data;
assign a threat value to the set of data clustered during comparison, wherein the previously recorded set of data corresponds to the set of data recorded over a span of period; and
alert based on the threat value assigned to the set of data.
20. The method as claimed in claim 16, wherein the set of data is a multimedia data such as video or images.
21. The method as claimed in claim 16, wherein the fixed monitoring system (112a) may be one or more cameras (120), one or more sensors (114), RADAR (118) mechanically attached to a wall or a pole and the movable monitoring system (116) may be one or more drones.
22. The method as claimed in claim 16, wherein the fixed monitoring system (112a) and the movable monitoring system (116) are configured to monitor different activities such as environmental development in a vicinity of a facility (102) over a period of time or an act of intrusion.
23. The method as claimed in claim 22, wherein the threat vector unit (106) assigns different threat values to the different activities and combines the different threat values to categorize the set of data to generate notification.
24. The method as claimed in claim 16, wherein the notification is based on an intensity of threat value such as high, medium or low.

Documents

Application Documents

# Name Date
1 202011009460-STATEMENT OF UNDERTAKING (FORM 3) [05-03-2020(online)].pdf 2020-03-05
2 202011009460-PROVISIONAL SPECIFICATION [05-03-2020(online)].pdf 2020-03-05
3 202011009460-POWER OF AUTHORITY [05-03-2020(online)].pdf 2020-03-05
4 202011009460-FORM 1 [05-03-2020(online)].pdf 2020-03-05
5 202011009460-DRAWINGS [05-03-2020(online)].pdf 2020-03-05
6 202011009460-DECLARATION OF INVENTORSHIP (FORM 5) [05-03-2020(online)].pdf 2020-03-05
7 202011009460-FORM 3 [21-09-2020(online)].pdf 2020-09-21
8 202011009460-ENDORSEMENT BY INVENTORS [21-09-2020(online)].pdf 2020-09-21
9 202011009460-DRAWING [21-09-2020(online)].pdf 2020-09-21
10 202011009460-COMPLETE SPECIFICATION [21-09-2020(online)].pdf 2020-09-21
11 abstract.jpg 2021-10-18
12 202011009460-LETTER TO (DRDO).pdf 2021-10-18
13 DRDO REPLY-(25-03-2022).pdf 2022-03-25
14 202011009460-FORM 18 [07-03-2024(online)].pdf 2024-03-07