Abstract: The present disclosure provides system 100, method 200 and anti-tampering device 300 for preventing tampering of ATM 101. The system 100 includes: fingerprint locking unit 108 to: scan fingerprints of user, generate first data based on scanning of the fingerprints, store the generated first data in database server 118, and unlock the door to allow the user to access ATM 101; iris scanning unit 110 to: scan iris of at least one eye of the user when the user tries to tamper with ATM 101, generate second data based on the scanning of the iris, and store the generated second data in database server 118; and control unit 106 to: generate non¬fatal electric shocks, lock the door when the user still tries to tamper with ATM 101, compare the first data and the second data with predefined unique identity data, and identify the user based on the comparison.
[001]The present disclosure relates to the field of anti-tampering systems and
devices. More particularly, the present disclosure relates to an anti-tampering system, device and method for enhancing security to automated teller machines.
BACKGROUND
[002]Background description includes information that may be useful in
understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[003] As well known in the art, automated banking machines (such as automated
teller machines (ATMs), cash depositing machines etc.) enable banking customers to access bank account information, deposit funds/money, withdraw funds etc. ATMs may often eliminate the need for banking customers to consult a human clerk. To prevent the risk of fraudulent access to a customer's banking account information, a typical ATM requires a customer to insert a plastic card containing a magnetic stripe or chip (such as debit card etc.). The card is typically issued by the customer's bank and/or other financial institution (collectively hereinafter, "bank"). The magnetic stripe or chip may store data including a unique card number and security information to withdraw/deposit money from ATMs. In addition to requiring the customer to insert the card, ATMs provide an additional level of protection. Following the receipt of the bankcard information, an ATM prompts the customer to input a personal identification number (PIN). Only if the PIN entered is properly associated with the card inserted by the banking customer, the ATM may allow access to cash and bank account information.
[004] Additionally, ATMs are located in a variety of diverse locations remote from
banking centers. For example, ATMs may be placed on street corners, in convenience stores, supermarkets, sports arenas or less populated areas. The wide variety of possible locations for an ATM provides banking customers with access to cash and banking account information at convenient public locations. Therefore, there is a risk of fraudulent access to the ATMs by thieves/burglars to steal money from cash dispensers of the ATMs. One of serious problems
in banking industry is loss of funds/money due to fraudulent ATM transactions, stealing of ATMs etc.
[005] As mentioned-above, the wide variety of locations associated with ATMs and
lack of close human supervision at the ATM increases the risk of unauthorized access to a customer's bank account information and to cash present in the ATMs. Some of the ATMs may not be configured properly such that any person can easily withdraw cash from the cash dispenser/locker of the ATM without using any desired transaction/ATM card. Multiple cameras can be placed in rooms where ATMs are placed. Due to unemployment and money requirements, some persons may become thieves and such persons, who come for withdrawing money in an unauthorized/unauthenticated manner, may easily break cameras placed in rooms. Then, it might be difficult to find the thieves or any other person who committed the theft of money from ATMs. Therefore, it is essential to enhance security and safety to ATMs and/or ATM rooms to prevent any kind of theft or stealing of money/bank account information from ATMs.
[006] Efforts have been made in the related art to provide systems, methods or
techniques for providing security and resistance to tampering of automated banking machines (ATMs etc.). However, most of the related art techniques implement automatic spraying systems that enable spraying of gases such as chloroforms, methane gas, tear gas, smoke gas etc. other gases when any person/thief tries to break/tamper the automated banking machines and cameras present in the ATM placed room. The use of gases at the right time and up to a sufficient time may make the persons unconscious. However, the spraying of gases for more than few minutes may be harmful to lives of the persons/thieves (as inhaling of these gases may cause cancer, tuberculosis etc. diseases) who try to steal the funds or any banking information from the automated banking machines. The destroying of cameras by the thieves or any other persons may lead to failure of getting evidence in order to catch the thieves associated with the theft of money/funds from ATMs. This inaccurate evidence provided to concerned authorities, such as bank officials, police officers etc., might not be helpful due to lack of clarity in identifying information of thieves.
[007] Sometimes, while stealing money from automated banking machines, many
thieves may wear masks etc. to cover/hide their faces and other body features in order to escape from secretly hidden cameras that are present in the ATM room. Then also, there might be a problem in capturing exact and accurate faces and other identification marks of the thieves in order to catch them. Hence, the related art techniques are not that much safe, secure, fast, simple and accurate in providing security/safety to banking machines and in
preventing unauthorized/unauthenticated access to ATMs. Some of the related art techniques
are harmful as well in preventing thieves from stealing money from ATMs, and some of the
related art techniques are difficult to implement and maintain in practical scenarios.
[008] Whereas there is certainly nothing wrong with traditional systems or methods,
nonetheless, there is a need in the art to provide a time-efficient, cost-effective, simple, safe and accurate system, device, and method to provide anti-tampering and security to automated banking machines (ABMs) in an intelligent manner. Further, there is a need in the art to provide an intelligent system, device and method to provide anti-tampering and security to automated banking machines without causing any harm/damage to lives of thieves or any other unauthorized person who fraudulently tries to access the ABMs.
[009] All publications herein are incorporated by reference to the same extent as if
each individual publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
[0010] In some embodiments, the numbers expressing quantities or dimensions of
items, and so forth, used to describe and claim certain embodiments of the invention are to be understood as being modified in some instances by the term "about." Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0011] As used in the description herein and throughout the claims that follow, the
meaning of "a," "an," and "the" includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of "in" includes "in" and "on" unless the context clearly dictates otherwise.
[0012] The recitation of ranges of values herein is merely intended to serve as a
shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. "such as") provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0013] Groupings of alternative elements or embodiments of the invention disclosed
herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.
OBJECTS OF THE PRESENT DISCLOSURE
[0014] Some of the objects of the present disclosure, which at least one embodiment
herein satisfies are as listed herein below.
[0015] It is an object of the present disclosure to provide a system, device and method
for preventing tampering of an automated teller machine (ATM).
[0016] It is another object of the present disclosure to provide an anti-tampering
system and device for enhancing security to ATMs.
[0017] It is another object of the present disclosure to provide a simple, secure and
cost-effective system, device and method for preventing tampering of an ATM.
[0018] It is another object of the present disclosure to provide a precise and time-
efficient system, device and method for preventing tampering of an ATM with enhanced safety and intelligence.
[0019] It is another object of the present disclosure to provide an automatic system
and device for preventing tampering/fraudulent-access and for providing security to an ATM without causing any fatalities and with easy maintenance.
SUMMARY
[0020] The present disclosure relates to the field of anti-tampering systems and
devices. More particularly, the present disclosure relates to an anti-tampering system, device and method for enhancing security to automated teller machines.
[0021] This summary is provided to introduce simplified concepts of a system for
time bound availability check of an entity, which are further described below in the detailed description. This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended for use in determining/limiting the scope of the claimed subject matter.
[0022] An aspect of the present disclosure pertains to a system for preventing
tampering of an automated teller machine (ATM) and for enhancing security to the ATM. The system can include: a fingerprint locking unit that can be operatively coupled or connected to a door of an ATM room; an iris scanning unit operatively coupled to the ATM and to the fingerprint locking unit; and a control unit operatively coupled to the fingerprint locking unit and to the iris scanning unit. The fingerprint locking unit can be configured to: scan fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit in order to have an access to the ATM; generate first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server operatively coupled to the fingerprint locking unit; and unlock the door in order to allow the user to access the ATM for banking purposes.
[0023] In an aspect, the iris scanning unit can be configured to: scan, by using at least
one iris sensor of the iris scanning unit, iris of at least one eye of the user when the user tries to tamper with the ATM; generate second data based on the scanning of the iris; and store the generated second data in the at least one predefined database server.
[0024] In another aspect, the control unit can include one or more processors and a
memory operatively coupled to the one or more processors. The control unit can be configured to: generate, by using at least one electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when the user tries to tamper with the ATM; lock, by using the fingerprint locking unit, the door when the user still tries to tamper with the ATM; compare the first data and the second data with a predefined unique identity data stored in the at least one predefined database server; and identify the user who tried to tamper with the ATM based on the comparison.
6
[0025] In another aspect, the system can include a touch sensor that can be attached to
the ATM and can be operatively coupled to the control unit. The touch sensor can be
configured to detect any tampering of the ATM when the user tries to tamper with the ATM.
[0026] In another aspect, the control unit can be configured to send, by using a
communication unit, at least one alert message to corresponding either bank officials or police officers based on the identification of the user to enable catching of the user. The alert message can include data that can be selected from any or a combination of an address of the user, an image of the user and other features of the user.
[0027] In another aspect, the control unit can be configured to send, by using an
application programmable interface (API), details of the user to the corresponding either bank officials or police officers based on the identification of the user to enable catching of the user.
[0028] Another aspect of the present disclosure pertains to an anti-tampering
automated teller machine (ATM) device. The device can include a fingerprint locking unit that can be operatively coupled to a door of an ATM room. The fingerprint locking unit can be configured to: scan fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit to have an access to the ATM; generate first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server that can be operatively coupled to the fingerprint locking unit; and unlock the door, and allow the user to access the ATM for banking. The device can include an iris scanning unit that can be operatively coupled to the ATM and to the fingerprint locking unit.
[0029] In an aspect, the iris scanning unit configured to: scan, by using at least one
iris sensor of the iris scanning unit, iris of at least one eye of the user when the user tries to tamper with the ATM; generate second data based on the scanning of the iris; and store the generated second data in the at least one predefined database server.
[0030] In another aspect, the device can include a control unit that can be operatively
coupled to the fingerprint locking unit and to the iris scanning unit. The control unit can include one or more processors and a memory operatively coupled to the one or more processors. The memory storing computer-implemented instructions which when executable by the one or more processors to: generate, by using at least one electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when the user tries to tamper with the ATM; lock, by using the fingerprint locking unit, the door when the user still tries to tamper with the ATM; compare the first data and the second data with a predefined unique
7
identity data stored in the at least one predefined database server; and identify the user who
tried to tamper with the ATM based on the comparison.
[0031] In an aspect, the device can include a touch sensor that can be attached to the
ATM. The touch sensor can be operatively coupled to the control unit, and the touch sensor
can be configured to detect any tampering of the ATM when the user tries to tamper with the
ATM.
[0032] Another aspect of the present disclosure pertains to a method for preventing
tampering of an automated teller machine (ATM). The method can include steps of:
scanning, by using a fingerprint locking unit operatively coupled to a door of an ATM room,
fingerprints of a user when the user places a finger on at least one fingerprint scanner of the
fingerprint locking unit to have an access to the ATM; generating, by using the fingerprint
locking unit, first data based on the scanning of the fingerprints, and store the generated first
data in at least one predefined database server; unlocking, by using the fingerprint locking
unit, the door to allow the user to access the ATM for banking; scanning, by using an iris
scanning unit, iris of at least one eye of the user when the user tries to tamper with the ATM;
and generating, by using the iris scanning unit, second data based on the scanning of the iris,
and store the generated second data in the at least one predefined database server.
[0033] In an aspect, the method can include steps of: generating, by using at least one
electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when
the user tries to tamper with the ATM; locking, by using the fingerprint locking unit, the door
when the user still tries to tamper with the ATM; comparing, by a control unit having one or
more processors, the first data and the second data with a predefined unique identity data that
can be stored in the at least one predefined database server; and identifying, by the control
unit, the user who tried to tamper with the ATM based on the comparison.
[0034] In another aspect, the method can further include a step of detecting, by using
a touch sensor attached to the ATM, any tampering of the ATM when the user tries to tamper
with the ATM.
[0035] In another aspect, the method can further include a step of sending, by using a
communication unit, at least one alert message to corresponding either bank officials or
police officers based on the identification of the user to enable catching of the user. The alert
message can include data selected from any or a combination of an address of the user, an
image of the user and other features of the user.
[0036] In another aspect, the method can include a step of sending, by using an
application programmable interface (API), details of the user to corresponding either bank
8
officials or police officers based on the identification of the user to enable catching of the user.
[0037] In an embodiment, the system within the scope of this application it is
expressly envisaged that the various aspects, embodiments, examples and alternatives set out in the preceding paragraphs, in the claims and/or in the following description and drawings, and in particular the individual features thereof, may be taken independently or in any combination. Features described in connection with one embodiment are applicable to all embodiments, unless such features are incompatible.
[0038] Various objects, features, aspects and advantages of the inventive subject
matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components
BRIEF DESCRIPTION OF THE DRAWINGS
[0039] The diagrams are for illustration only, which thus is not a limitation of the
present disclosure, and wherein:
[0040] FIG. 1 illustrates an exemplary module representation of system for preventing
tampering of an automated teller machine (ATM) in accordance with an embodiment of the
present disclosure.
[0041] FIG. 2 illustrates an exemplary flow diagram representation of method for
preventing tampering of an automated teller machine (ATM) in accordance with an
embodiment of the present disclosure.
[0042] FIG. 3 illustrates an exemplary block diagram representation of anti-tampering
automated teller machine (ATM) device in accordance with an embodiment of the present
disclosure.
[0043] FIG. 4 illustrates an exemplary flow diagram representation of method for
providing security and for preventing tampering with an ATM in accordance with an
embodiment of the present disclosure
[0044] FIG. 5 illustrates a computer system in which or with which embodiments of
the present invention can be utilized in accordance with embodiments of the present
disclosure.
9
DETAILED DESCRIPTION
[0045] The following is a detailed description of embodiments of the disclosure
depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0046] In the following description, numerous specific details are set forth in order to
provide a thorough understanding of embodiments of the present invention. It will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[0047] Embodiments of the present invention include various steps, which will be
described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, and firmware and/or by human operators.
[0048] Various methods described herein may be practiced by combining one or more
machine-readable storage media containing the code according to the present invention with
appropriate standard computer hardware to execute the code contained therein. An apparatus
for practicing various embodiments of the present invention may involve one or more
computers (or one or more processors within a single computer) and storage systems
containing or having network access to computer program(s) coded in accordance with
various methods described herein, and the method steps of the invention could be
accomplished by modules, routines, subroutines, or subparts of a computer program product.
[0049] If the specification states a component or feature “may”, “can”, “could”, or
“might” be included or have a characteristic, that particular component or feature is not required to be included or have the characteristic.
[0050] As used in the description herein and throughout the claims that follow, the
meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0051] Exemplary embodiments will now be described more fully hereinafter with
reference to the accompanying drawings, in which exemplary embodiments are shown. These
10
exemplary embodiments are provided only for illustrative purposes and so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. The invention disclosed may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Various modifications will be readily apparent to persons skilled in the art. The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure). Also, the terminology and phraseology used is for the purpose of describing exemplary embodiments and should not be considered limiting. Thus, the present invention is to be accorded the widest scope encompassing numerous alternatives, modifications and equivalents consistent with the principles and features disclosed. For purpose of clarity, details relating to technical material that is known in the technical fields related to the invention have not been described in detail so as not to unnecessarily obscure the present invention.
[0052] Thus, for example, it will be appreciated by those of ordinary skill in the art
that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named element.
[0053] Embodiments of the present invention may be provided as a computer program
product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The term “machine-readable storage medium” or “computer-readable
11
storage medium” includes, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).A machine-readable medium may include a non-transitory medium in which data may be stored and that does not include carrier waves and/or transitory electronic signals propagating wirelessly or over wired connections. Examples of a non-transitory medium may include, but are not limited to, a magnetic disk or tape, optical storage media such as compact disk (CD) or digital versatile disk (DVD), flash memory, memory or memory devices. A computer-program product may include code and/or machine-executable instructions that may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.
[0054] Furthermore, embodiments may be implemented by hardware, software,
firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks (e.g., a computer-program product) may be stored in a machine-readable medium. A processor(s) may perform the necessary tasks.
[0055] Systems depicted in some of the figures may be provided in various
configurations. In some embodiments, the systems may be configured as a distributed system where one or more components of the system are distributed across one or more networks in a cloud computing system.
[0056] Each of the appended claims defines a separate invention, which for
infringement purposes is recognized as including equivalents to the various elements or limitations specified in the claims. Depending on the context, all references below to the "invention" may in some cases refer to certain specific embodiments only. In other cases, it
12
will be recognized that references to the "invention" will refer to subject matter recited in one
or more, but not necessarily all, of the claims.
[0057] All methods described herein may be performed in any suitable order unless
otherwise indicated herein or otherwise clearly contradicted by context. The use of any and
all examples, or exemplary language (e.g., “such as”) provided with respect to certain
embodiments herein is intended merely to better illuminate the invention and does not pose a
limitation on the scope of the invention otherwise claimed. No language in the specification
should be construed as indicating any non-claimed element essential to the practice of the
invention.
[0058] Various terms as used herein are shown below. To the extent a term used in a
claim is not defined below, it should be given the broadest definition persons in the pertinent
art have given that term as reflected in printed publications and issued patents at the time of
filing.
[0059] The present disclosure relates to the field of anti-tampering systems and
devices. More particularly, the present disclosure relates to an anti-tampering system, device
and method for enhancing security to automated teller machines.
[0060] An aspect of the present disclosure pertains to a system for preventing
tampering of an automated teller machine (ATM) and for enhancing security to the ATM.
The system can include: a fingerprint locking unit that can be operatively coupled or
connected to a door of an ATM room; an iris scanning unit operatively coupled to the ATM
and to the fingerprint locking unit; and a control unit operatively coupled to the fingerprint
locking unit and to the iris scanning unit. The fingerprint locking unit can be configured to:
scan fingerprints of a user when the user places a finger on at least one fingerprint scanner of
the fingerprint locking unit to have an access to the ATM; generate first data based on the
scanning of the fingerprints, and store the generated first data in at least one predefined
database server operatively coupled to the fingerprint locking unit; and unlock the door to
allow the user to access the ATM for banking purposes.
[0061] In an aspect, the iris scanning unit can be configured to: scan, by using at least
one iris sensor of the iris scanning unit, iris of at least one eye of the user when the user tries
to tamper with the ATM; generate second data based on the scanning of the iris; and store the
generated second data in the at least one predefined database server.
[0062] In another aspect, the control unit can include one or more processors and a
memory operatively coupled to the one or more processors. The control unit can be
configured to: generate, by using at least one electrode attached to the ATM, non-fatal
13
electric shocks, a predefined number of times, when the user tries to tamper with the ATM; lock, by using the fingerprint locking unit, the door when the user still tries to tamper with the ATM; compare the first data and the second data with a predefined unique identity data stored in the at least one predefined database server; and identify the user who tried to tamper with the ATM based on the comparison.
[0063] FIG. 1 illustrates an exemplary module representation of system for preventing
tampering of an automated teller machine (ATM) in accordance with an embodiment of the present disclosure.
[0064] According to an embodiment, the system 100 can include one or more
processor(s) 102. The one or more processor(s) 102 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) 102 are configured to fetch and execute computer-readable instructions stored in a memory 104 of the system 100. The memory 104 can store one or more computer-readable instructions or routines, which can be fetched and executed to create or share the data units over a network service. The memory 104 can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0065] Various components /units of the proposed system 100 can be implemented as
a combination of hardware and programming (for example, programmable instructions) to implement their one or more functionalities as elaborated further themselves or using processors 102. In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the units may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for units may include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implements the various units. In such examples, the system 100 may include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the system 100 and the processing resource. In other examples, the units may be implemented by electronic circuitry. A database server 118 may include data
14
that is either stored or generated as a result of functionalities implemented by any of the other components /units of the proposed system 100.
[0066] In an embodiment, the system 100 for preventing tampering of an automated
teller machine (ATM) 101 and for enhancing security to the ATM 101. The system 100 can include: a fingerprint locking unit 108 that can be operatively coupled or connected to a door of an ATM room; an iris scanning unit 110 operatively coupled to the ATM 101 and to the fingerprint locking unit 108; and a control unit 106 operatively coupled to the fingerprint locking unit 108 and to the iris scanning unit 110. The fingerprint locking unit 108 can be configured to: scan fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit 108 to have an access to the ATM 101; generate first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server 118 that can be operatively coupled to the fingerprint locking unit 108; and unlock the door to allow the user to access the ATM 101 for banking purposes.
[0067] In an embodiment, the iris scanning unit 110 can be configured to: scan, by
using at least one iris sensor of the iris scanning unit 110, iris of at least one eye of the user when the user tries to tamper with the ATM 101; generate second data based on the scanning of the iris; and store the generated second data in the at least one predefined database server 118.
[0068] In an embodiment, the control unit 106 can include the one or more processors
102 and the memory 104 operatively coupled to the one or more processors 102. The control
unit 106 can be configured to: generate, by using at least one electrode attached to the ATM
101, non-fatal electric shocks, a predefined number of times, when the user tries to tamper
with the ATM 101; lock, by using the fingerprint locking unit 108, the door when the user
still tries to tamper with the ATM 101; compare the first data and the second data with a
predefined unique identity data stored in the at least one predefined database server 118; and
identify the user who tried to tamper with the ATM 101 based on the comparison.
[0069] In an exemplary embodiment, the control unit 106 can be configured to
generate electric shocks by using any other electric means as well but not restricting to the only use of electrodes.
[0070] In an embodiment, the system 100 can include a touch sensor 112 that can be
attached to the ATM 101 and can be operatively coupled to the control unit 106. The touch sensor 112 can be configured to detect any tampering of the ATM 101 when the user tries to tamper with the ATM 101.
15
[0071] In an embodiment, the control unit 106 can be configured to send, by using a
communication unit 114, at least one alert message to corresponding either bank officials or
police officers based on the identification of the user to enable catching of the user. The alert
message can include data that can be selected from any or a combination of an address of the
user, an image of the user and other features of the user.
[0072] In an exemplary embodiment, the communication unit 114 can implement any
of wired or wireless long range/short range communication technologies to broadcast alert
messages. For example, the communication unit 114 can be implemented with any of
wired/wireless modules such as Wi-Fi module, Bluetooth module, GSM module etc.
[0073] In an embodiment, the control unit 106 can be configured to send, by using an
application programmable interface (API) 116, details of the user to the corresponding either
bank officials or police officers based on the identification of the user to enable catching of
the user. In an exemplary embodiment, the API 116 can installed in any of computing devices
associated with the corresponding either bank officials or police officers.
[0074] In an exemplary embodiment, the system 100 can be configured to implement
a machine learning/deep learning algorithm (such as Naive Bayes algorithm) in the control
unit 106 for repeating the above steps of preventing tampering of the ATM 101. The system
100 can learn about the situations dynamically by using the machine-learning algorithm and
with the help of pre-stored training datasets in order to improve the prevention of tampering
of the ATM 101.
[0075] In an exemplary embodiment, the at least one fingerprint scanner of the
fingerprint locking unit 108 can be coupled or connected directly to the door of the ATM
room in order to lock and/or unlock the door.
[0076] In an exemplary embodiment, the at least one iris sensor can be placed
anywhere in the ATM room. In an exemplary embodiment, the at least one iris sensor can be
attached to the ATM 101 at appropriate position in order to scan the iris of the user/thief
when he/she tries to tamper with the ATM 101.
[0077] In an exemplary embodiment, the at least one predefined database server 118
can be a national or an international database server that can include the data of each person.
For example, the at least one predefined database server 118 can be Unique Identification
Authority (UID) of any particular country where the ATM is placed.
[0078] In an exemplary embodiment, the first data and the second data can be images
of the scanned fingerprints and images of the scanned irises respectively. The comparison of
first and second data with the predefined unique identity data (biometric data of all persons)
16
can be done by using any of image processing techniques such as correlation, template matching, image recognition etc.
[0079] It would be appreciated that although the proposed system 100 has been
elaborated as above to include all the main units, it is conceivable that actual implementations are well within the scope of the present disclosure, which can include without any limitation, only a part of the proposed units or a combination of those or a division of those into sub-units in various combinations across multiple devices that can be operatively coupled with each other, including in the cloud. Further, the units can be configured in any sequence to achieve objectives elaborated. Also, it can be appreciated that proposed system 100 can be configured in a computing device or across a plurality of computing devices operatively connected with each other, wherein the computing devices can be any of a computer, a laptop, a smart phone, an Internet enabled mobile device and the like. Therefore, all possible modifications, implementations and embodiments of where and how the proposed system 100 is configured are well within the scope of the present invention.
[0080] FIG. 2 illustrates an exemplary flow diagram representation of method for
preventing tampering of an automated teller machine (ATM) in accordance with an embodiment of the present disclosure.
[0081] In an aspect, the method 200 as elaborated hereunder can be described in
general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, etc., that perform particular functions or implement particular abstract data types. The method 200 can also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[0082] According to an embodiment, the method 200 can include at a step 202,
scanning, by using a fingerprint locking unit operatively coupled to a door of an ATM room, fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit to have an access to the ATM.
[0083] In an embodiment, the method 200 can include steps of: at a step 204,
generating, by using the fingerprint locking unit, first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server; and
17
at a step 206, unlocking, by using the fingerprint locking unit, the door to allow the user to
access the ATM for banking.
[0084] In an embodiment, the method 200 can include steps of: at a step 208,
scanning, by using an iris scanning unit, iris of at least one eye of the user when the user tries
to tamper with the ATM; and at a step 210, generating, by using the iris scanning unit, second
data based on the scanning of the iris, and store the generated second data in the at least one
predefined database server.
[0085] In an embodiment, the method 200 can further include steps of: at a step 212,
generating, by using at least one electrode attached to the ATM, non-fatal electric shocks, a
predefined number of times, when the user tries to tamper with the ATM; at a step 214,
locking, by using the fingerprint locking unit, the door when the user still tries to tamper with
the ATM; at a step 216, comparing, by a control unit having one or more processors, the first
data and the second data with a predefined unique identity data stored in the at least one
predefined database server; at a step 218, identifying, by the control unit, the user who tried
to tamper with the ATM based on the comparison.
[0086] In an embodiment, the method 200 can include a step of detecting, by using a
touch sensor attached to the ATM, any tampering of the ATM when the user tries to tamper
with the ATM.
[0087] In an embodiment, the method 200 can include a step of sending, by using a
communication unit, at least one alert message to corresponding either bank officials or
police officers based on the identification of the user to enable catching of the user. The alert
message can include data selected from any or a combination of an address of the user, an
image of the user and other features of the user.
[0088] In an embodiment, the method 200 can include a step of sending, by using an
application programmable interface (API), details of the user to corresponding either bank
officials or police officers based on the identification of the user to enable catching of the
user.
[0089] FIG. 3 illustrates an exemplary block diagram representation of anti-tampering
automated teller machine (ATM) device in accordance with an embodiment of the present
disclosure.
[0090] In an embodiment, the anti-tampering ATM device 300 can include a
fingerprint locking unit 302 that can be operatively coupled to a door of an ATM room. The
fingerprint locking unit 302 can be configured to: scan fingerprints of a user when the user
places a finger on at least one fingerprint scanner of the fingerprint locking unit 302 to have
18
an access to the ATM; generate first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server that can be operatively coupled to the fingerprint locking unit 302; and unlock the door to allow the user to access the ATM for banking. The device 300 can include an iris scanning unit 304 that can be operatively coupled to the ATM and to the fingerprint locking unit 302.
[0091] In an embodiment, the iris scanning unit 304 configured to: scan, by using at
least one iris sensor of the iris scanning unit 304, iris of at least one eye of the user when the
user tries to tamper with the ATM; generate second data based on the scanning of the iris;
and store the generated second data in the at least one predefined database server.
[0092] In an embodiment, the device 300 can include a control unit 306 that can be
operatively coupled to the fingerprint locking unit 302 and to the iris scanning unit 304. The control unit 306 can include one or more processors and a memory operatively coupled to the one or more processors. The memory storing computer-implemented instructions which when executable by the one or more processors to: generate, by using at least one electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when the user tries to tamper with the ATM; lock, by using the fingerprint locking unit 302, the door when the user still tries to tamper with the ATM; compare the first data and the second data with a predefined unique identity data stored in the at least one predefined database server; and identify the user who tried to tamper with the ATM based on the comparison.
[0093] In an exemplary embodiment, the device 300 can include a touch sensor 308
that can be attached to the ATM. The touch sensor 308 can be operatively coupled to the control unit 306, and the touch sensor 308 can be configured to detect any tampering of the ATM when the user tries to tamper with the ATM.
[0094] In an exemplary embodiment, the device 300 can be operatively coupled with
a communication unit, and the control unit can be configured to send, by using the communication unit, at least one alert message to corresponding either bank officials or police officers based on the identification of the user to enable catching of the user. The alert message can include data that can be selected from any or a combination of an address of the user/thief, an image of the user and other features of the user/thief.
[0095] In an exemplary embodiment, the device 300 can be operatively coupled to an
application programmable interface (API). The control unit 306 can be configured to send, by using the application programmable interface (API), details of the user to the corresponding either bank officials or police officers based on the identification of the user to enable catching of the user.
19
[0096] In an exemplary embodiment, the device 300 can be configured to implement
a machine learning/deep learning algorithm (such as Naive Bayes algorithm) in the control unit 306 for repeating the above steps of preventing tampering of the ATM. The device 300 can learn about the situations dynamically by using the machine-learning algorithm and with the help of pre-stored training datasets in order to improve the prevention of tampering of the ATM.
[0097] In an exemplary embodiment, the device 300 can be attached to the ATM. The
device 300 can be operatively coupled to the ATM. The device 300 can be configured in the ATM as well. In an exemplary embodiment, the control unit 306 can be configured to generate electric shocks by another means as well (instead of using electrodes).
[0098] FIG. 4 illustrates an exemplary flow diagram representation of method for
providing security and for preventing tampering with an ATM in accordance with an embodiment of the present disclosure.
[0099] In an embodiment, any user can enter the room with a door where the ATM is
placed by using fingerprint lock. The fingerprint lock can be adapted to store the fingerprints of the user in a database server. The fingerprint lock can lock or unlock the room door/gate of the ATM room. If the user comes for normal authorized transactions from the ATM, then door will not be locked. If the user tries to misuse/break/tamper with the ATM or tries to have fraudulent access of the ATM in order to steal money or any other sensitive banking information, then the ATM can be configured to give non-fatal electric shocks to the user at least up to three times automatically. Even after, if the user still tries to break the cash dispenser of the ATM or to have the unauthorized/unauthenticated access to the ATM, the door of the ATM room will be closed automatically.
[00100] In an embodiment, there is an iris scanner attached to the ATM or to any side
of the ATM room. The iris scanner captures irises of the user, and stores the corresponding data in the database server. A control unit can be configured to compare the stored fingerprint data and the captured iris data with the predefined unique data of each person present in the database server. It is helpful to identify the person/user/thief by obtaining his/her details based on the comparison of data.
[00101] In an embodiment, the control unit can be operatively coupled with a
communication module such as WI-FI, Bluetooth, GSM module or any other wired/wireless communication module. The control unit then sends all the details of the user/thief to concerned authorities such as bank officials, police officers etc. through notifications in application programmable interfaces installed in computing devices of the respective
20
concerned authorities. This can enable catching of the thief easily and in less time without causing any harm to the thief.
[00102] FIG. 5 illustrates a computer system in which or with which embodiments of
the present invention can be utilized in accordance with embodiments of the present disclosure
[00103] As shown in FIG. 5, computer system includes an external storage device 510,
a bus 520, a main memory 530, a read only memory 540, a mass storage device 550, communication port 560, and a processor 570. A person skilled in the art will appreciate that computer system may include more than one processor and communication ports. Examples of processor 570 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on a chip processors or other future processors. Processor 570 may include various modules associated with embodiments of the present invention. Communication port 560 can be any of an RS-232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fibre, a serial port, a parallel port, or other existing or future ports. Communication port 560 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[00104] Memory 530 can be Random Access Memory (RAM), or any other dynamic
storage device commonly known in the art. Read only memory 540 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 570. Mass storage 550 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7200 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[00105] Bus 520 communicatively couples processor(s) 570 with the other memory,
storage and communication blocks. Bus 520 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI),
21
USB or the like, for connecting expansion cards, drives and other subsystems as well as other
buses, such a front side bus (FSB), which connects processor 570 to software system.
[00106] Optionally, operator and administrative interfaces, e.g. a display, keyboard,
and a cursor control device, may also be coupled to bus 520 to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 560. External storage device 510 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[00107] Thus, it will be appreciated by those of ordinary skill in the art that the
diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named.
[00108] While embodiments of the present invention have been illustrated and
described, it will be clear that the invention is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the spirit and scope of the invention, as described in the claim.
[00109] In the foregoing description, numerous details are set forth. It will be apparent,
however, to one of ordinary skill in the art having the benefit of this disclosure, that the present invention may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, to avoid obscuring the present invention.
22
[00110] As used herein, and unless the context dictates otherwise, the term "coupled
to" is intended to include both direct coupling (in which two elements that are coupled to each other contact each other)and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean “communicatively coupled with” over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[00111] It should be apparent to those skilled in the art that many more modifications
besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C …. and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[00112] While the foregoing describes various embodiments of the invention, other and
further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[00113] The present disclosure provides a system, device and method for preventing
tampering of an automated teller machine (ATM).
[00114] The present disclosure provides an anti-tampering system and device for
enhancing security to ATMs.
[00115] The present disclosure provides a simple, secure and cost-effective system,
device and method for preventing tampering of an ATM.
23
[00116] The present disclosure provides a precise and time-efficient system, device and
method for preventing tampering of an ATM with enhanced safety and intelligence.
[00117] The present disclosure provides an automatic system and device for preventing
tampering/fraudulent-access and for providing security to an ATM without causing any fatalities and with easy maintenance.
We Claim:
A system for preventing tampering of an automated teller machine (ATM), the system comprising:
a fingerprint locking unit operatively coupled to a door of an ATM room, the fingerprint locking unit configured to:
scan fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit to have an access to the ATM;
generate first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server operatively coupled to the fingerprint locking unit; and
unlock the door, and allow the user to access the ATM for banking; an iris scanning unit operatively coupled to the ATM and to the fingerprint locking unit, the iris scanning unit configured to:
scan, by using at least one iris sensor of the iris scanning unit, iris of at least one eye of the user when the user tries to tamper with the ATM; generate second data based on the scanning of the iris; and store the generated second data in the at least one predefined database server; and a control unit operatively coupled to the fingerprint locking unit and to the iris scanning unit, the control unit comprising one or more processors and a memory operatively coupled to the one or more processors, the memory storing instructions executable by the one or more processors to:
generate, by using at least one electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when the user tries to tamper with the ATM;
lock, by using the fingerprint locking unit, the door when the user still tries to tamper with the ATM;
compare the first data and the second data with a predefined unique identity data stored in the at least one predefined database server; and
identify the user, who tried to tamper with the ATM, based on the comparison.
The system as claimed in claim 1, wherein the system comprises a touch sensor attached
to the ATM, and operatively coupled to the control unit, the touch sensor is configured to
detect any tampering of the ATM when the user tries to tamper with the ATM.
The system as claimed in claim 1, wherein the control unit is configured to send, by
using a communication unit, at least one alert message to corresponding either bank
officials or police officers based on the identification of the user to enable catching of the
user, and wherein the alert message comprises data selected from any or a combination
of an address of the user, an image of the user and other features of the user.
The system as claimed in claim 1, wherein the control unit is configured to send, by
using an application programmable interface (API), details of the user to corresponding
either bank officials or police officers based on the identification of the user to enable
catching of the user.
An anti-tampering automated teller machine (ATM) device, the device comprising:
a fingerprint locking unit operatively coupled to a door of an ATM room, the fingerprint locking unit configured to:
scan fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit to have an access to the ATM;
generate first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server operatively coupled to the fingerprint locking unit; and
unlock the door, and allow the user to access the ATM for banking; an iris scanning unit operatively coupled to the ATM and to the fingerprint locking unit, the iris scanning unit configured to:
scan, by using at least one iris sensor of the iris scanning unit, iris of at least one eye of the user when the user tries to tamper with the ATM; generate second data based on the scanning of the iris; and store the generated second data in the at least one predefined database server; and a control unit operatively coupled to the fingerprint locking unit and to the iris scanning unit, the control unit comprising one or more processors and a memory operatively coupled to the one or more processors, the memory storing instructions executable by the one or more processors to:
generate, by using at least one electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when the user tries to tamper with the ATM;
lock, by using the fingerprint locking unit, the door when the user still tries to tamper with the ATM;
compare the first data and the second data with a predefined unique identity data stored in the at least one predefined database server; and
identify the user, who tried to tamper with the ATM, based on the comparison. The anti-tampering ATM device as claimed in claim 5, wherein the device comprises a touch sensor attached to the ATM, and operatively coupled to the control unit, the touch sensor is configured to detect any tampering of the ATM when the user tries to tamper with the ATM.
A method for preventing tampering of an automated teller machine (ATM), the method comprising steps of:
scanning, by using a fingerprint locking unit operatively coupled to a door of an ATM room, fingerprints of a user when the user places a finger on at least one fingerprint scanner of the fingerprint locking unit to have an access to the ATM;
generating, by using the fingerprint locking unit, first data based on the scanning of the fingerprints, and store the generated first data in at least one predefined database server;
unlocking, by using the fingerprint locking unit, the door, and allow the user to access the ATM for banking;
scanning, by using an iris scanning unit, iris of at least one eye of the user when the user tries to tamper with the ATM;
generating, by using the iris scanning unit, second data based on the scanning of the iris, and store the generated second data in the at least one predefined database server;
generating, by using at least one electrode attached to the ATM, non-fatal electric shocks, a predefined number of times, when the user tries to tamper with the ATM;
locking, by using the fingerprint locking unit, the door when the user still tries to tamper with the ATM;
comparing, by a control unit comprising one or more processors, the first data and the second data with a predefined unique identity data stored in the at least one predefined database server; and
identifying, by the control unit, the user who tried to tamper with the ATM based on the comparison. The method as claimed in claim 7, wherein the method comprises a step of detecting, by using a touch sensor attached to the ATM, any tampering of the ATM when the user tries to tamper with the ATM.
The method as claimed in claim 7, wherein the method comprises a step of sending, by using a communication unit, at least one alert message to corresponding either bank officials or police officers based on the identification of the user to enable catching of the user, and wherein the alert message comprises data selected from any or a combination of an address of the user, an image of the user and other features of the user. The method as claimed in claim 7, wherein the method comprises a step of sending, by using an application programmable interface (API), details of the user to corresponding either bank officials or police officers based on the identification of the user to enable catching of the user.
| # | Name | Date |
|---|---|---|
| 1 | 201911027731-IntimationOfGrant07-03-2024.pdf | 2024-03-07 |
| 1 | 201911027731-STATEMENT OF UNDERTAKING (FORM 3) [10-07-2019(online)].pdf | 2019-07-10 |
| 2 | 201911027731-FORM FOR STARTUP [10-07-2019(online)].pdf | 2019-07-10 |
| 2 | 201911027731-PatentCertificate07-03-2024.pdf | 2024-03-07 |
| 3 | 201911027731-FORM FOR SMALL ENTITY(FORM-28) [10-07-2019(online)].pdf | 2019-07-10 |
| 3 | 201911027731-ABSTRACT [12-09-2022(online)].pdf | 2022-09-12 |
| 4 | 201911027731-FORM 1 [10-07-2019(online)].pdf | 2019-07-10 |
| 4 | 201911027731-CLAIMS [12-09-2022(online)].pdf | 2022-09-12 |
| 5 | 201911027731-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [10-07-2019(online)].pdf | 2019-07-10 |
| 5 | 201911027731-COMPLETE SPECIFICATION [12-09-2022(online)].pdf | 2022-09-12 |
| 6 | 201911027731-EVIDENCE FOR REGISTRATION UNDER SSI [10-07-2019(online)].pdf | 2019-07-10 |
| 6 | 201911027731-CORRESPONDENCE [12-09-2022(online)].pdf | 2022-09-12 |
| 7 | 201911027731-DRAWINGS [10-07-2019(online)].pdf | 2019-07-10 |
| 7 | 201911027731-DRAWING [12-09-2022(online)].pdf | 2022-09-12 |
| 8 | 201911027731-FER_SER_REPLY [12-09-2022(online)].pdf | 2022-09-12 |
| 8 | 201911027731-DECLARATION OF INVENTORSHIP (FORM 5) [10-07-2019(online)].pdf | 2019-07-10 |
| 9 | 201911027731-COMPLETE SPECIFICATION [10-07-2019(online)].pdf | 2019-07-10 |
| 9 | 201911027731-FORM-26 [12-09-2022(online)].pdf | 2022-09-12 |
| 10 | 201911027731-FER.pdf | 2022-03-24 |
| 10 | 201911027731-Proof of Right (MANDATORY) [16-07-2019(online)].pdf | 2019-07-16 |
| 11 | 201911027731-FORM 18 [11-06-2021(online)].pdf | 2021-06-11 |
| 11 | 201911027731-FORM-26 [16-07-2019(online)].pdf | 2019-07-16 |
| 12 | 201911027731-Power of Attorney-180719.pdf | 2019-07-26 |
| 12 | abstract.jpg | 2019-08-17 |
| 13 | 201911027731-Correspondence-180719.pdf | 2019-07-26 |
| 13 | 201911027731-OTHERS-180719.pdf | 2019-07-26 |
| 14 | 201911027731-Correspondence-180719.pdf | 2019-07-26 |
| 14 | 201911027731-OTHERS-180719.pdf | 2019-07-26 |
| 15 | 201911027731-Power of Attorney-180719.pdf | 2019-07-26 |
| 15 | abstract.jpg | 2019-08-17 |
| 16 | 201911027731-FORM 18 [11-06-2021(online)].pdf | 2021-06-11 |
| 16 | 201911027731-FORM-26 [16-07-2019(online)].pdf | 2019-07-16 |
| 17 | 201911027731-Proof of Right (MANDATORY) [16-07-2019(online)].pdf | 2019-07-16 |
| 17 | 201911027731-FER.pdf | 2022-03-24 |
| 18 | 201911027731-COMPLETE SPECIFICATION [10-07-2019(online)].pdf | 2019-07-10 |
| 18 | 201911027731-FORM-26 [12-09-2022(online)].pdf | 2022-09-12 |
| 19 | 201911027731-DECLARATION OF INVENTORSHIP (FORM 5) [10-07-2019(online)].pdf | 2019-07-10 |
| 19 | 201911027731-FER_SER_REPLY [12-09-2022(online)].pdf | 2022-09-12 |
| 20 | 201911027731-DRAWING [12-09-2022(online)].pdf | 2022-09-12 |
| 20 | 201911027731-DRAWINGS [10-07-2019(online)].pdf | 2019-07-10 |
| 21 | 201911027731-CORRESPONDENCE [12-09-2022(online)].pdf | 2022-09-12 |
| 21 | 201911027731-EVIDENCE FOR REGISTRATION UNDER SSI [10-07-2019(online)].pdf | 2019-07-10 |
| 22 | 201911027731-COMPLETE SPECIFICATION [12-09-2022(online)].pdf | 2022-09-12 |
| 22 | 201911027731-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [10-07-2019(online)].pdf | 2019-07-10 |
| 23 | 201911027731-CLAIMS [12-09-2022(online)].pdf | 2022-09-12 |
| 23 | 201911027731-FORM 1 [10-07-2019(online)].pdf | 2019-07-10 |
| 24 | 201911027731-ABSTRACT [12-09-2022(online)].pdf | 2022-09-12 |
| 24 | 201911027731-FORM FOR SMALL ENTITY(FORM-28) [10-07-2019(online)].pdf | 2019-07-10 |
| 25 | 201911027731-PatentCertificate07-03-2024.pdf | 2024-03-07 |
| 25 | 201911027731-FORM FOR STARTUP [10-07-2019(online)].pdf | 2019-07-10 |
| 26 | 201911027731-STATEMENT OF UNDERTAKING (FORM 3) [10-07-2019(online)].pdf | 2019-07-10 |
| 26 | 201911027731-IntimationOfGrant07-03-2024.pdf | 2024-03-07 |
| 1 | atm_fingerprint_irisE_23-03-2022.pdf |