Sign In to Follow Application
View All Documents & Correspondence

Video Surveillance System

Abstract: Abstract Disclosed herein an advanced video surveillance system, comprising a network of high-definition cameras with enhanced low-light capabilities and wide-angle lenses strategically interconnected to provide comprehensive coverage. A central processing unit is intelligently linked to said cameras, tasked with executing sophisticated real-time video analytics to evaluate the video feed continuously. The system includes a secure data storage unit, which is in communication with the central processing unit, to reliably store the resulting analyzed data and ensure the integrity for access and detailed examination. Integrated within the system are intrusion detection devices that work in unison with the cameras and the central unit to monitor and promptly identify any unauthorized entries within the protected area. Upon such detection, an integrated alarm system is triggered, issuing immediate alerts based on the analytical determinations made by the central processing unit, thereby enhancing the responsiveness and security efficacy of the system. Fig. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
24 December 2023
Publication Number
03/2024
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

MARWADI UNIVERSITY
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
DHRUV TRIVEDI
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
JEEL TALAVIYA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
DR. ANJALI DIWAN
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
DR. R.B. JADEJA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA

Inventors

1. DHRUV TRIVEDI
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
2. JEEL TALAVIYA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
3. DR. ANJALI DIWAN
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA
4. DR. R.B. JADEJA
MARWADI UNIVERSITY, RAJKOT- MORBI HIGHWAY, AT GAURIDAD, RAJKOT – 360003, GUJARAT, INDIA

Specification

Description:Video Surveillance System
Field of the Invention
[0001] The present disclosure relates to the field of electronic security and surveillance systems. Specifically, the disclosure encompasses an advanced video surveillance system designed to enhance the monitoring and security of a variety of environments ranging from residential to commercial and public spaces. The system integrates a network of high-definition cameras with superior low-light performance and wide-angle lenses, a central processing unit for real-time video analytics, and a secure data storage unit for the retention and retrieval of video footage. The surveillance system is further equipped with sophisticated intrusion detection devices and an integrated alarm system, all synergistically operating to detect unauthorized entries and prompt immediate alerts. The system stands out for the seamless interconnectivity, intelligent real-time processing capabilities, and robust security features, aiming to provide an efficient, user-friendly, and comprehensive surveillance solution.
Background
[0002] The background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] In the realm of security, video surveillance devices have become indispensable for monitoring and protecting property and people. Traditionally, said systems have relied on analog cameras connected to video cassette recorders or digital video recorders, offering limited resolution and storage capacity. The footage was often grainy, particularly in low-light conditions, making difficult to identify subjects or details accurately. Furthermore, said devices lacked the sophistication to analyze video content in real-time, which meant that security breaches could be reviewed only after they had occurred, significantly reducing the effectiveness of the surveillance.
[0004] The advancement of digital technology heralded the introduction of network video recorders (NVRs) and high-definition digital cameras, providing clearer images and greater storage capabilities. However, the integration of real-time analytics was still in its nascent stages, and the systems primarily relied on human operators to monitor live feeds, leading to inefficiencies and the possibility of human error.
[0005] A significant leap in technology came with the development of intelligent video surveillance systems, which could perform basic motion detection to alert operators of potential security breaches. While the intelligent video surveillance systems were a step forward, said early intelligent systems were often plagued by high rates of false alarms due to their inability to distinguish between relevant movements, like that of an intruder, and irrelevant movements, such as a pet or a moving tree branch.
[0006] Moreover, the rise of network-based surveillance systems introduced the possibility of integrating various types of cameras and sensors into a unified system. IP cameras allowed for higher resolution video and more flexible installation, but they also required more bandwidth and storage. Systems began to incorporate video compression techniques to address the requirement, but the challenge of balancing quality and storage remained.
[0007] In response to the limitations of motion detection, video analytics began to incorporate more advanced machine learning algorithms capable of recognizing and differentiating between human figures, vehicles, and other objects. Said systems provided more accurate alerts and reduced false positives. However, they were often complex and required significant processing power, which could be cost-prohibitive for smaller-scale operations.
[0008] Data security and integrity also became a growing concern with the advent of IP-based systems. Video data transmitted over networks could be intercepted, and stored data could be vulnerable to unauthorized access. Early efforts to secure the data involved basic encryption and password protection, but said measures were often insufficient against sophisticated cyber threats.
[0009] The surveillance industry has also seen the rise of cloud-based storage solutions, offering scalability and remote access to video data. While the cloud-based storage solutions solved the issue of physical storage limitations, said solutions introduced concerns about data privacy and reliance on third-party service providers.
[00010] Another emerging technology in video surveillance has been the use of artificial intelligence (AI) to enable real-time facial recognition and behavior analysis, which could potentially transform security monitoring by providing proactive threat detection and identification. However, the AI raised ethical concerns about privacy and the potential for misuse, leading to a debate on the balance between security and civil liberties.
[00011] The prior art in video surveillance has thus evolved from simple video capture and storage to complex networks capable of intelligent detection and alerting. Each advancement addressed certain limitations of the previous technologies but often introduced new challenges, indicating a need for a more integrated, secure, and intelligent surveillance system that could capitalize on the strengths of said developments while mitigating their weaknesses.
Summary
[00012] The present disclosure relates to the field of electronic security and surveillance systems. Specifically, the disclosure encompasses an advanced video surveillance system designed to enhance the monitoring and security of a variety of environments ranging from residential to commercial and public spaces. The system integrates a network of high-definition cameras with superior low-light performance and wide-angle lenses, a central processing unit for real-time video analytics, and a secure data storage unit for the retention and retrieval of video footage. The surveillance system is further equipped with sophisticated intrusion detection devices and an integrated alarm system, all synergistically operating to detect unauthorized entries and prompt immediate alerts. The system stands out for the seamless interconnectivity, intelligent real-time processing capabilities, and robust security features, aiming to provide an efficient, user-friendly, and comprehensive surveillance solution.
[00013] The following presents a simplified summary of various aspects of this disclosure in order to provide a basic understanding of such aspects. This summary is not an extensive overview of all contemplated aspects, and is intended to neither identify key or critical elements nor delineate the scope of such aspects. Its purpose is to present some concepts of this disclosure in a simplified form as a prelude to the more detailed description that is presented later.
[00014] The following paragraphs provide additional support for the claims of the subject application.
[00015] The disclosed video surveillance system represents a significant advancement in security technology, integrating multiple high-definition cameras with exceptional low-light performance and expansive wide-angle coverage. Said cameras are interconnected, creating a cohesive network for capturing comprehensive video data. At the heart of the system lies a central processing unit (CPU) that is not only connected to the cameras but is also specifically configured to carry out real-time analytics on the video feed CPU receives. The CPU enables immediate identification and response to potential security threats.
[00016] Secure data storage is a pivotal feature of the system. Video data, once analyzed, is stored in a unit that guarantees both the integrity and the availability of the data, making said data ready for any necessary post-event review or examination. The system’s storage capabilities are fortified with automated categorization protocols, robust encryption, and a multi-factor authentication process, ensuring that video data is accessible only to authorized personnel.
[00017] A network of intrusion detection devices works in concert with the cameras and the CPU. Said devices are crucial for the monitoring of designated areas and are adept at detecting any unauthorized entry attempts. Upon such detection, an integrated alarm system is activated. The system is intricately linked to the CPU, allowing said system to respond swiftly to real-time analytics and trigger alerts that include both visual and auditory warnings.
[00018] Further sophistication is added to the system with a suite of environmental sensing devices that bolster the intrusion detection by accounting for environmental anomalies. Said sensors, along with advanced motion detectors, contact sensors at potential entry points, and acoustic detectors for identifying the sounds of forced entry, form a comprehensive security apparatus.
[00019] The entire system is underpinned by a network interface that ensures seamless data transmission across the network and enables remote access for authorized users through a secure connection. The interface is integral to the system’s ability to distribute alarm notifications through various communication channels, maintaining a high level of vigilance and responsiveness.
[00020] Artificial intelligence algorithms within the CPU's video analytics module enhance the system’s discernment capabilities, distinguishing between authorized and unauthorized entities. The data management module maintains a chronological log of all video data, and an incident response module coordinates the system’s reaction to security breaches, including the dispatch of notifications to system administrators and security personnel.
[00021] The result is a comprehensive, integrated security system capable of sophisticated surveillance and real-time response, designed to meet the high demands of modern security and provide a proactive approach to incident prevention and management.
[00022] The method for detecting unauthorized entries through a video surveillance system incorporates a multi-layered approach that begins with the deployment of a network of high-definition cameras. Said cameras are strategically fitted with low-light sensitivity and wide-angle lenses, ensuring that clear video data is captured across a broad field of view, even under suboptimal lighting conditions. Upon capture, the video data is transmitted seamlessly to a central processing unit (CPU), which stands as the analytical brain of the operation.
[00023] Within the CPU, the incoming video data is subjected to real-time analysis. Leveraging sophisticated algorithms, the CPU meticulously scans the footage for anomalies that may indicate an unauthorized entry, such as unexpected movements or the presence of unknown individuals within secured zones. The proactive analysis allows for the immediate detection of security breaches as they occur.
[00024] Following analysis, the video data is securely stored in a dedicated data storage unit. The component of the system is crucial, as said data storage unit not only ensures the preservation of video evidence for review but also maintains the integrity and confidentiality of the data, safeguarding against unauthorized access and potential data breaches.
[00025] Complementing the camera network and analytical CPU, a suite of intrusion detection devices remains vigilant, continuously monitoring the environment. Said devices extend the system's sensory capabilities, detecting potential intruders through motion sensors, contact sensors, and other environmental assessment tools. Together, they create a comprehensive surveillance net that is sensitive to any irregular activity.
[00026] The culmination of the method is the activation of an integrated alarm system, which is a direct response to unauthorized entry alerts generated by the CPU. Upon detection of a breach, the system swiftly triggers a series of alarms both auditory and visual, to notify security personnel and administrators in real time. The immediate response capability is crucial for thwarting security threats and mitigating potential damage or loss.
[00027] The method is characterized by the holistic surveillance strategy, which integrates technology and advanced analytical techniques. The method enables not only the detection of unauthorized entries but also allows for the rapid response of security measures, effectively bridging the gap between detection and action. The systematic and intelligent approach to security represents a significant advancement in surveillance methodology, providing enhanced protection for assets and individuals alike.
Brief Description of the Drawings
[00028] The features and advantages of the present disclosure would be more clearly understood from the following description taken in conjunction with the accompanying drawings in which:
[00029] FIG. 1 pictorially portrays an architectural paradigm of a video surveillance system for detecting unauthorized entries, according to some embodiments of the present disclosure.
[00030] FIG. 2 figuratively illustrates an exemplary schematic flow diagram of a method for detecting unauthorized entries using a video surveillance system, according to some embodiments of the present disclosure.
Detailed Description
[00031] In the following detailed description of the invention, reference is made to the accompanying drawings that form a part hereof, and in which is shown, by way of illustration, specific embodiments in which the invention may be practiced. In the drawings, like numerals describe substantially similar components throughout the several views. These embodiments are described in sufficient detail to claim those skilled in the art to practice the invention. Other embodiments may be utilized and structural, logical, and electrical changes may be made without departing from the scope of the present invention. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present invention is defined only by the appended claims and equivalents thereof.
[00032] The use of the terms “a” and “an” and “the” and “at least one” and similar referents in the context of describing the invention (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. The use of the term “at least one” followed by a list of one or more items (for example, “at least one of A and B”) is to be construed to mean one item selected from the listed items (A or B) or any combination of two or more of the listed items (A and B), unless otherwise indicated herein or clearly contradicted by context. The terms “comprising,” “having,” “including,” and “containing” are to be construed as open-ended terms (i.e., meaning “including, but not limited to,”) unless otherwise noted. Recitation of ranges of values herein are merely intended to serve as a shorthand method of referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g., “such as”) provided herein, is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention unless otherwise claimed. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
[00033] The present disclosure relates to the field of electronic security and surveillance systems. Specifically, the disclosure encompasses an advanced video surveillance system designed to enhance the monitoring and security of a variety of environments ranging from residential to commercial and public spaces. The system integrates a network of high-definition cameras with superior low-light performance and wide-angle lenses, a central processing unit for real-time video analytics, and a secure data storage unit for the retention and retrieval of video footage. The surveillance system is further equipped with sophisticated intrusion detection devices and an integrated alarm system, all synergistically operating to detect unauthorized entries and prompt immediate alerts. The system stands out for the seamless interconnectivity, intelligent real-time processing capabilities, and robust security features, aiming to provide an efficient, user-friendly, and comprehensive surveillance solution.
[00034] Pursuant to the "Detailed Description" section herein, whenever an element is explicitly associated with a specific numeral for the first time, such association shall be deemed consistent and applicable throughout the entirety of the "Detailed Description" section, unless otherwise expressly stated or contradicted by the context.
[00035] Outlined herein a proposed video surveillance system 100 that is a sophisticated security solution designed to provide comprehensive monitoring and protection for various environments, such as residential areas, commercial buildings, and public spaces. The system 100 integrates several advanced technological components to create a cohesive and effective surveillance network.
[00036] According to a figurative elucidation of FIG. 1, showcasing an architectural setup of the system 100 that can comprise functional elements, yet not limited to a plurality of interconnected high-definition cameras 102, a central processing unit (CPU) 104, a secure data storage unit 106, the intrusion detection devices 108, and an integrated alarm system 110. A person ordinarily skilled in art would prefer those elements or components of the system 100, to be functionally or operationally coupled with each other, in accordance with the embodiments of present disclosure.
[00037] In yet another embodiment, the system includes a series of high-definition cameras, each equipped with low-light sensitivity and wide-angle lenses. Said cameras are capable of capturing high-quality video data even in poorly lit conditions, ensuring continuous surveillance regardless of the time of day or weather conditions. The wide-angle lenses provide expansive coverage, reducing the number of cameras needed to monitor a given area. For example, a camera installed at the entrance of a building can capture a wide view of the area, including the faces of individuals entering and exiting, as well as any vehicles. In a parking lot scenario, fewer cameras can cover a larger area while still providing detailed imagery, essential for identifying license plates or recognizing individuals.
[00038] In yet another embodiment, the Central Processing Unit (CPU) is the core of the surveillance system, tasked with processing the video data transmitted by the cameras. The Central Processing Unit (CPU) performs real-time analytics, identifying potential security breaches or unauthorized entries. The processing includes advanced features like motion detection, facial recognition, and object identification. In practical terms, if an unauthorized individual enters a restricted area, the CPU can quickly identify the breach by analyzing the person's face or behavior and comparing face or behavior with a database of authorized personnel.
[00039] In yet another embodiment, the analyzed video data is stored in a secure data storage unit. The unit not only protects the integrity of the data but also categorizes and archives the data for easy retrieval. Said data storage unit employs encryption mechanisms to safeguard the data against unauthorized access. For instance, video

footage of a week can be automatically categorized by date and time, and in the event of an incident, the relevant footage can be quickly retrieved and reviewed.
[00040] Integrated with the CPU and cameras are various intrusion detection devices. Said devices include motion sensors, contact sensors on doors and windows, and glass break detectors. When said sensors detect a potential intrusion, the CPU evaluates the threat and, if necessary, activates an integrated alarm system.
[00041] In yet another embodiment, the alarm system not only alerts the security personnel on-site but can also send notifications to off-site administrators or emergency services. For example, if glass break sensors detect the sound of a window breaking, the alarm system can immediately notify security, who can then assess the situation through the camera feed.
[00042] In yet another embodiment, the system features a network interface that enables the transmission of real-time and stored video data over a network. The interface facilitates remote access to the system, allowing authorized users to view live feeds or stored footage from anywhere, using secure connections. Suppose a business owner is on vacation. They can still monitor their store remotely, reviewing live feeds or accessing stored footage in case of an incident.
[00043] Each camera includes sensor modules that detect motion within their field of view. Additionally, the system can include environmental sensing devices connected to the CPU. Said devices can detect environmental anomalies, such as smoke or unusual temperatures, and integrate said detections into the video analytics. For instance, in an industrial setting, if a machine starts overheating, the environmental sensors can detect the temperature change, and the system can alert the maintenance team before a fire breaks out.
[00044] In yet another embodiment, the CPU's incident response module coordinates the response to security breaches, including the activation of the alarm system and dispatching notifications. The module ensures that any threat is immediately addressed and that the proper personnel are informed for a quick response. A critical component of the system is the advanced video analytics capabilities, powered by AI algorithms. Said algorithms enable the system to perform tasks such as facial recognition, license plate reading, and unusual behavior detection. The AI integration allows for a more nuanced understanding of the surveillance environment. For example, the system can differentiate between a person loitering suspiciously and someone merely waiting, reducing false alarms and enhancing security response accuracy.
[00045] In yet another embodiment, the alert system in the surveillance setup is highly customizable. Users can set specific parameters for alerts, such as triggering alarms only during certain hours or when certain types of movements (like running or crowding) are detected. The customization ensures that the surveillance system is tailored to the specific security needs of the location. For instance, a high-traffic retail store might set alerts for crowd formation after hours, indicating a possible unauthorized gathering or break-in attempt.
[00046] In an exemplary embodiment, the data management module of the CPU plays a vital role in organizing and managing the vast amount of video data captured. The data management module uses sophisticated algorithms to tag and categorize footage based on various parameters such as time, date, location, and identified individuals or objects. The organization is crucial for quick retrieval of relevant footage during investigations or reviews. For example, in a scenario involving a missing item in a warehouse, the system can quickly sift through hours of footage to identify when and where the item was last seen, greatly aiding in the investigation process.
[00047] In an exemplary embodiment, the surveillance system is designed to integrate seamlessly with other existing security systems, such as access control systems and fire alarms. The integration ensures a unified security approach, where all systems can communicate and respond to each other. For instance, if the fire alarm is triggered, the surveillance system can automatically redirect camera focus to the area of concern, while simultaneously alerting emergency services and building management.
[00048] In an exemplary embodiment, the system is also designed with energy efficiency in mind. Cameras and sensors enter a low-energy mode during periods of inactivity, reducing power consumption without compromising security. The feature not only makes the system more sustainable but also reduces operational costs.
[00049] In an exemplary embodiment, the user interface for the surveillance system is designed for accessibility and ease of use. The user interface includes features like drag-and-drop video timelines, easy-access archives, and intuitive controls for camera manipulation. The interface can be accessed via desktop or mobile devices, ensuring that authorized personnel can monitor and control the system from anywhere. Scalability is a key aspect of the system. The system can be expanded with additional cameras, sensors, and storage capacity to meet the growing needs of the user. The system's modular design allows for easy customization, enabling users to add or modify components as needed.
[00050] In the event of a security breach or emergency, the system is designed to facilitate rapid emergency response coordination. The system can automatically contact local law enforcement or emergency services, providing them with real-time video feeds and crucial information to aid in their response. Data security is a top priority in the system design. All video data transmitted and stored is encrypted, and strict access controls are in place to prevent unauthorized access. The system is compliant with relevant privacy laws and regulations, ensuring that all surveillance activities are conducted ethically and legally.
[00051] Referring to one or more preceding embodiments, the advanced video surveillance system 100 represents a comprehensive solution for modern security needs, combining high-quality video capture, sophisticated analytics, and seamless integration with other security measures. The intelligent design and customizable features make the system adaptable for a wide range of applications, from small businesses to large-scale industrial complexes. The proposed video surveillance system offers a comprehensive and integrated approach to security, combining advanced video analytics, secure data storage, and effective incident response mechanisms. The system is a versatile system adaptable to a range of environments, providing enhanced security and peace of mind.
[00052] The method 200 for detecting unauthorized entries using a video surveillance system is a multi-faceted approach that combines technology with advanced analytics to provide a comprehensive security solution. The method involves several stages, each critical to ensuring the effectiveness of the surveillance system.
[00053] Referring to a pictorial depiction put forth in FIG. 2, representing a flow chart of the method 200 that can comprise steps of, yet not restricted to, (at step 202) capturing video data, (at step 204) transmitting the captured video data, (at step 206) analyzing the transmitted video data, (at step 208) storing the analyzed video data, (at step 210) monitoring the environment and (at step 212) activating an integrated alarm system in response to the CPU detecting an unauthorized entry. Said steps of the method 200 can be performed or executed, collectively or selectively, randomly or sequentially or in a combination thereof, in accordance with the embodiments of current disclosure.
[00054] In an embodiment, the surveillance system employs a network of interconnected high-definition cameras. Said cameras are equipped with low-light sensitivity and wide-angle lenses, making them ideal for a wide range of environments and lighting conditions. Cameras with low-light sensitivity can capture clear video footage in environments with minimal lighting, such as parking lots at night or dimly lit corridors in office buildings. For example, in a retail store after closing hours, said cameras can clearly capture the presence of an intruder, despite the limited lighting.
[00055] In an embodiment, the wide-angle lenses provide a broader field of view, allowing a single camera to cover a larger area. The broader field of view is particularly beneficial in open spaces, such as public parks or large commercial complexes, where installing numerous cameras might be impractical or cost-prohibitive. Once captured, the video data is transmitted to a central processing unit (CPU). The transmission can occur over wired or wireless networks, depending on the infrastructure and requirements of the surveillance system. In a large industrial complex, a wired network might be used for more stable and secure transmission. In contrast, a small boutique store may employ a wireless system for ease of installation and flexibility.
[00056] In an embodiment, the CPU, which forms the heart of the surveillance system, is responsible for analyzing the video data in real time. The analysis is crucial for the early detection of potential security breaches or unauthorized entries. The CPU uses advanced algorithms and machine learning techniques to analyze video footage as captured. In a residential complex, for instance, the CPU can detect an unfamiliar individual trying to access restricted areas, triggering an immediate examination of the situation.
[00057] Post-analysis, the video data is stored in a secure data storage unit. The unit ensures the integrity and accessibility of the data for review or investigation. In the event of a burglary at a jewelry store, the stored video data can be crucial for law enforcement to identify the perpetrators and understand the sequence of events.
[00058] In an embodiment, the surveillance system is not solely reliant on video data. The surveillance system also incorporates intrusion detection devices that monitor the environment and provide additional layers of security. Intrusion detection devices can include motion sensors, glass break detectors, and door/window sensors. In a home security scenario, said sensors can detect the breaking of a window or the opening of a door, immediately alerting the system to a possible intrusion.
[00059] Upon detecting an unauthorized entry, the system activates an integrated alarm system. The system is designed to immediately alert security personnel and, if necessary, law enforcement. For example, in a bank, if an unauthorized individual enters a restricted area, the alarm system can be triggered, alerting security guards and locking down sensitive areas to prevent further access.
[00060] In an embodiment, applicability wise, in a retail store, the surveillance system can monitor customer and staff movements. If someone attempts to access the store outside of business hours, the cameras will capture the activity, and the CPU will analyze the activity to determine if the activity is an authorized entry (like a staff member) or a potential burglary. Simultaneously, motion sensors placed at entry points will provide an additional layer of detection, ensuring no unauthorized entry goes unnoticed.
[00061] Referring to the preceding embodiment, in continuation of applicability of the surveillance system, a warehouse setting, especially in large storage facilities, the system can help in monitoring both internal and external threats. Cameras positioned at strategic points can track movements of goods, helping to prevent internal theft. At the same time, perimeter cameras and intrusion detection devices can guard against external break-ins. In an office building, especially after business hours, the system can ensure that only authorized personnel have access to specific areas.
[00062] Referring to the preceding embodiment, the system can be programmed to recognize staff members and allow them access to certain areas while restricting entry to more sensitive locations like server rooms or executive offices. In a parking lot, the system's wide-angle cameras can oversee a large area, capturing incidents like car thefts or vandalism. The low-light capability ensures that the footage is clear even at night, which is crucial as parking lots are often targeted during the time. In public spaces like parks or city streets, the system can help in ensuring public safety by detecting suspicious activities or unattended packages, which could pose security threats.
[00063] Referring to one or more preceding embodiments, the method 200 of using a video surveillance system for detecting unauthorized entries incorporates a blend of advanced technologies and analytical methods to provide a robust security solution. By utilizing high-definition cameras, real-time data processing, secure data storage, and integrated alarm systems, the method offers a comprehensive approach to surveillance, suitable for a wide range of settings from personal properties to public spaces and commercial establishments.
[00064] Referring to the preceding embodiment, the prospect in question is a video surveillance and security system, designed to elevate the standards of image quality, data storage and retrieval, usability, security, and versatility. The system aims to enhance security and monitoring capabilities across a diverse range of applications, from home security to industrial monitoring. The core objectives of the system include development of an efficient and scalable data storage and retrieval system to significantly improve data management. Further, crafting a user-friendly and intuitive control interface that allows for effortless operation and remote access, implementing advanced security measures to protect sensitive data against unauthorized access, and designing a flexible system suitable for various applications, adapting to different security needs, could also be integral objectives.
[00065] Referring to the preceding embodiment, the video surveillance system uniquely integrates sophisticated hardware and software components. The video surveillance system features high-definition cameras and a robust central processing unit, ensuring the capture of sharp, detailed video footage in real-time. The system's efficient data storage and retrieval mechanisms are central to the operation, ensuring the integrity and accessibility of video data for analysis and review. An aspect of the system is the ability to define virtual boundaries within the monitored area, using fixed frames. When said boundaries are breached without authorization, an intelligent alarm system is triggered, sending immediate alerts to system administrators and security personnel.
[00066] Referring to the preceding embodiment, the benefits of the surveillance system are manifold. The provision of clear video footage, which is crucial for accurate subject identification and analysis of incidents. The implementation of mechanisms that ensure efficient data storage and easy access, catering to the needs of various monitoring scenarios. A user-friendly interface that simplifies the system's operation, making the system accessible to users regardless of their technical expertise. The interface also supports remote access, offering flexibility and convenience. Modern security features that protect the stored data, an essential aspect in the current landscape where data security is paramount.
[00067] Referring to the preceding embodiment, the video surveillance system 100 represents a significant aspect in surveillance technology, offering a comprehensive, adaptable, and secure solution suitable for a wide array of applications. The system is a combination of high-quality imaging, efficient data management, user-centric design, and robust security measures makes said system a valuable tool for enhancing safety and monitoring in various environments.
[00068] Example embodiments herein have been described above with reference to block diagrams and flowchart illustrations of methods and apparatuses. It will be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by various means including hardware, software, firmware, and a combination thereof. For example, in one embodiment, each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations can be implemented by computer program instructions. These computer program instructions may be loaded onto a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions which execute on the computer or other programmable data processing apparatus create means for implementing the functions specified in the flowchart block or blocks.
[00069] Throughout the present disclosure, the term ‘processing means’ or ‘microprocessor’ or ‘processor’ or ‘processors’ includes, but is not limited to, a general purpose processor (such as, for example, a complex instruction set computing (CISC) microprocessor, a reduced instruction set computing (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, a microprocessor implementing other types of instruction sets, or a microprocessor implementing a combination of types of instruction sets) or a specialized processor (such as, for example, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), or a network processor).
[00070] The term “non-transitory storage device” or “storage” or “memory,” as used herein relates to a random access memory, read only memory and variants thereof, in which a computer can store data or software for any duration.
[00071] Operations in accordance with a variety of aspects of the disclosure is described above would not have to be performed in the precise order described. Rather, various steps can be handled in reverse order or simultaneously or not at all.
[00072] While several implementations have been described and illustrated herein, a variety of other means and/or structures for performing the function and/or obtaining the results and/or one or more of the advantages described herein may be utilized, and each of such variations and/or modifications is deemed to be within the scope of the implementations described herein. More generally, all parameters, dimensions, materials, and configurations described herein are meant to be exemplary and that the actual parameters, dimensions, materials, and/or configurations will depend upon the specific application or applications for which the teachings is/are used. Those skilled in the art will recognize, or be able to ascertain using no more than routine experimentation, many equivalents to the specific implementations described herein. It is, therefore, to be understood that the foregoing implementations are presented by way of example only and that, within the scope of the appended claims and equivalents thereto, implementations may be practiced otherwise than as specifically described and claimed. Implementations of the present disclosure are directed to each individual feature, system, article, material, kit, and/or method described herein. In addition, any combination of two or more such features, systems, articles, materials, kits, and/or methods, if such features, systems, articles, materials, kits, and/or methods are not mutually inconsistent, is included within the scope of the present disclosure.

Claims
I/We Claim:
1. A video surveillance system, comprising:
a plurality of interconnected high-definition cameras equipped with low-light sensitivity and wide-angle lenses for capturing video data;
a central processing unit (CPU) operationally connected to the cameras and configured to perform real-time video analytics on the captured video data;
a secure data storage unit communicatively coupled to the CPU for storing the analyzed video data, ensuring data integrity and facilitating subsequent access and examination;
the intrusion detection devices integrated with the CPU, the cameras, and the secure data storage unit for monitoring and detecting unauthorized entries; and
an integrated alarm system operatively connected to the CPU and the intrusion detection devices, wherein the alarm system is activated in response to detected unauthorized entries signaled by the CPU based on the analytics.
2. The system of claim 1, wherein the central processing unit is further configured to:
synchronize the operation of the high-definition cameras for simultaneous video data capture;
process the synchronized video data to identify potential security breaches;
command the secure data storage unit to archive incident-specific video data upon detection of a potential security breach; and
manage the operation of the intrusion detection devices to monitor predefined virtual boundaries within the surveillance area.
3. The system of claim 1, wherein the secure data storage unit enable:
automation data handling protocols to categorize and store video data based on predefined criteria;
encryption mechanisms for protecting the integrity of the stored video data; and
multi-factor authentication to retrieve or manipulate the stored video data.
4. The system of claim 1, wherein the integrated alarm system is configured to:
receive intrusion notifications from the CPU based on the real-time video analytics;
activate visual and auditory alarm signals; and
transmit electronic alerts to designated system administrators and security personnel.
5. The system of claim 1, further comprising a network interface to facilitate:
transmission of real-time and stored video data over a network;
remote access to the system by authorized users through a secure connection; and
distribution of alarm notifications through various communication channels as per the configured settings.
6. The system of claim 1, wherein each of the high-definition cameras includes:
sensor modules for detecting motion within their field of view;
image stabilization module to maintain video clarity under varied environmental conditions; and
network connectivity modules to transmit video data to the central processing unit in real time.
7. The system of claim 1, wherein the central processing unit comprises:
a video analytics module employing artificial intelligence algorithms to differentiate between authorized and unauthorized entities within the monitored area;
a data management module to oversee the chronological logging of video data in the secure data storage unit; and
an incident response module to coordinate the activation of the integrated alarm system and notification dispatch.
8. The system of claim 1, wherein the intrusion detection devices are selected from a group consisting of:
passive infrared sensors for detecting motion based on heat signatures;
contact sensors placed on potential entry points; and
glass break detectors for identifying sounds associated with forced entry.
9. The system of claim 1, further comprising environmental sensing devices operationally connected to the central processing unit, the devices configured to detect environmental anomalies and integrate such detections into the video analytics for enhanced intrusion detection.
10. A method for detecting unauthorized entries using a video surveillance system, the method comprising:
capturing video data using a plurality of interconnected high-definition cameras with low-light sensitivity and wide-angle lenses;
transmitting the captured video data to a central processing unit (CPU);
analyzing the transmitted video data in real-time using the CPU to detect potential unauthorized entries;
storing the analyzed video data in a secure data storage unit;
monitoring the environment using intrusion detection devices; and
activating an integrated alarm system in response to the CPU detecting an unauthorized entry.

Abstract
Disclosed herein an advanced video surveillance system, comprising a network of high-definition cameras with enhanced low-light capabilities and wide-angle lenses strategically interconnected to provide comprehensive coverage. A central processing unit is intelligently linked to said cameras, tasked with executing sophisticated real-time video analytics to evaluate the video feed continuously. The system includes a secure data storage unit, which is in communication with the central processing unit, to reliably store the resulting analyzed data and ensure the integrity for access and detailed examination. Integrated within the system are intrusion detection devices that work in unison with the cameras and the central unit to monitor and promptly identify any unauthorized entries within the protected area. Upon such detection, an integrated alarm system is triggered, issuing immediate alerts based on the analytical determinations made by the central processing unit, thereby enhancing the responsiveness and security efficacy of the system.
Fig. 1 , Claims:Claims
I/We Claim:
1. A video surveillance system, comprising:
a plurality of interconnected high-definition cameras equipped with low-light sensitivity and wide-angle lenses for capturing video data;
a central processing unit (CPU) operationally connected to the cameras and configured to perform real-time video analytics on the captured video data;
a secure data storage unit communicatively coupled to the CPU for storing the analyzed video data, ensuring data integrity and facilitating subsequent access and examination;
the intrusion detection devices integrated with the CPU, the cameras, and the secure data storage unit for monitoring and detecting unauthorized entries; and
an integrated alarm system operatively connected to the CPU and the intrusion detection devices, wherein the alarm system is activated in response to detected unauthorized entries signaled by the CPU based on the analytics.
2. The system of claim 1, wherein the central processing unit is further configured to:
synchronize the operation of the high-definition cameras for simultaneous video data capture;
process the synchronized video data to identify potential security breaches;
command the secure data storage unit to archive incident-specific video data upon detection of a potential security breach; and
manage the operation of the intrusion detection devices to monitor predefined virtual boundaries within the surveillance area.
3. The system of claim 1, wherein the secure data storage unit enable:
automation data handling protocols to categorize and store video data based on predefined criteria;
encryption mechanisms for protecting the integrity of the stored video data; and
multi-factor authentication to retrieve or manipulate the stored video data.
4. The system of claim 1, wherein the integrated alarm system is configured to:
receive intrusion notifications from the CPU based on the real-time video analytics;
activate visual and auditory alarm signals; and
transmit electronic alerts to designated system administrators and security personnel.
5. The system of claim 1, further comprising a network interface to facilitate:
transmission of real-time and stored video data over a network;
remote access to the system by authorized users through a secure connection; and
distribution of alarm notifications through various communication channels as per the configured settings.
6. The system of claim 1, wherein each of the high-definition cameras includes:
sensor modules for detecting motion within their field of view;
image stabilization module to maintain video clarity under varied environmental conditions; and
network connectivity modules to transmit video data to the central processing unit in real time.
7. The system of claim 1, wherein the central processing unit comprises:
a video analytics module employing artificial intelligence algorithms to differentiate between authorized and unauthorized entities within the monitored area;
a data management module to oversee the chronological logging of video data in the secure data storage unit; and
an incident response module to coordinate the activation of the integrated alarm system and notification dispatch.
8. The system of claim 1, wherein the intrusion detection devices are selected from a group consisting of:
passive infrared sensors for detecting motion based on heat signatures;
contact sensors placed on potential entry points; and
glass break detectors for identifying sounds associated with forced entry.
9. The system of claim 1, further comprising environmental sensing devices operationally connected to the central processing unit, the devices configured to detect environmental anomalies and integrate such detections into the video analytics for enhanced intrusion detection.
10. A method for detecting unauthorized entries using a video surveillance system, the method comprising:
capturing video data using a plurality of interconnected high-definition cameras with low-light sensitivity and wide-angle lenses;
transmitting the captured video data to a central processing unit (CPU);
analyzing the transmitted video data in real-time using the CPU to detect potential unauthorized entries;
storing the analyzed video data in a secure data storage unit;
monitoring the environment using intrusion detection devices; and
activating an integrated alarm system in response to the CPU detecting an unauthorized entry.

Documents

Application Documents

# Name Date
1 202321088541-REQUEST FOR EARLY PUBLICATION(FORM-9) [24-12-2023(online)].pdf 2023-12-24
2 202321088541-POWER OF AUTHORITY [24-12-2023(online)].pdf 2023-12-24
3 202321088541-OTHERS [24-12-2023(online)].pdf 2023-12-24
4 202321088541-FORM-9 [24-12-2023(online)].pdf 2023-12-24
5 202321088541-FORM FOR SMALL ENTITY(FORM-28) [24-12-2023(online)].pdf 2023-12-24
6 202321088541-FORM 1 [24-12-2023(online)].pdf 2023-12-24
7 202321088541-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [24-12-2023(online)].pdf 2023-12-24
8 202321088541-EDUCATIONAL INSTITUTION(S) [24-12-2023(online)].pdf 2023-12-24
9 202321088541-DRAWINGS [24-12-2023(online)].pdf 2023-12-24
10 202321088541-DECLARATION OF INVENTORSHIP (FORM 5) [24-12-2023(online)].pdf 2023-12-24
11 202321088541-COMPLETE SPECIFICATION [24-12-2023(online)].pdf 2023-12-24
12 202321088541-FORM 18 [29-12-2023(online)].pdf 2023-12-29
13 Abstact.jpg 2024-01-15
14 202321088541-RELEVANT DOCUMENTS [01-10-2024(online)].pdf 2024-10-01
15 202321088541-POA [01-10-2024(online)].pdf 2024-10-01
16 202321088541-FORM 13 [01-10-2024(online)].pdf 2024-10-01
17 202321088541-FER.pdf 2025-05-05
18 202321088541-FORM 3 [02-07-2025(online)].pdf 2025-07-02
19 202321088541-FORM-8 [09-07-2025(online)].pdf 2025-07-09
20 202321088541-FER_SER_REPLY [09-07-2025(online)].pdf 2025-07-09
21 202321088541-DRAWING [09-07-2025(online)].pdf 2025-07-09
22 202321088541-CORRESPONDENCE [09-07-2025(online)].pdf 2025-07-09
23 202321088541-CLAIMS [09-07-2025(online)].pdf 2025-07-09

Search Strategy

1 template_search_mergedE_19-06-2024.pdf