image
image
user-login
Patent search/

CRYPTOGRAPHY-ENABLED CCTV SECURITY SYSTEM

search

Patent Search in India

  • tick

    Extensive patent search conducted by a registered patent agent

  • tick

    Patent search done by experts in under 48hrs

₹999

₹399

Talk to expert

CRYPTOGRAPHY-ENABLED CCTV SECURITY SYSTEM

ORDINARY APPLICATION

Published

date

Filed on 15 November 2024

Abstract

A cryptography-enabled CCTV security system, comprises of plurality of imaging units 101 installed inside a premise for recording real time footage of activities taking place at the premise, a pair of sheets 102 arranged on each of imaging units 101 and connected with each other by means of a spring loaded roller 103 for establishing sheets 102 in front of imaging units 101, a thermal camera 104 coupled with imaging units 101 for detecting movement object in vicinity, a container 105 arranged with imaging units 101 and integrated with a nozzle 106 to dispense a tear gas stored in container 105, an anemometer installed on imaging units 101 for monitoring velocity of wind inside premise, and a motorized gripper 107 mounted on each of imaging units 101 for establishing a V-shaped flap 108 integrated with gripper 107 over imaging unit 101 to prevent any damage to imaging units 101.

Patent Information

Application ID202411088447
Invention FieldELECTRONICS
Date of Application15/11/2024
Publication Number48/2024

Inventors

NameAddressCountryNationality
Kawalpreet KaurGoswami Ganesh Dutta Sanatan Dharma College, Sector 32, Chandigarh-160030, India.IndiaIndia
Dr. Amanpreet KaurAssistant Professor, Chitkara University Research & Innovation Network (CURIN), Chitkara University, Chandigarh-Patiala National Highway, Village Jhansla, Rajpura, Punjab - 140401, India.IndiaIndia
Vidyotma GandhiGyancity Research Lab, House No-3, Road No-1, South City I, Enclave, Gurugram, Haryana 122001, India.IndiaIndia

Applicants

NameAddressCountryNationality
Chitkara UniversityChandigarh-Patiala National Highway, Village Jhansla, Rajpura, Punjab - 140401, India.IndiaIndia
Chitkara Innovation Incubator FoundationSCO: 160-161, Sector - 9c, Madhya Marg, Chandigarh- 160009, India.IndiaIndia

Specification

Description:FIELD OF THE INVENTION

[0001] The present invention pertains to the field of security systems, specifically to a cryptography-enabled CCTV security system that incorporates a range of cutting-edge features to enhance surveillance, protect assets, and ensure the security of a premises. Most particularly, the proposed system is aimed to offer a comprehensive solution for monitoring and securing premises against unauthorized access, damage, and tampering while maintaining the integrity and confidentiality of recorded footage.

BACKGROUND OF THE INVENTION

[0002] Traditional CCTV surveillance systems have long been used for monitoring and recording activities in and around premises for the purposes of security. These systems generally include cameras that provide visual footage which can be used to review incidents, detect unauthorized access, or serve as evidence in legal proceedings. However, these traditional systems often have limitations.

[0003] Conventional CCTV systems are vulnerable to tampering and vandalism. Attackers may attempt to disable or obstruct cameras, for example, by spraying paint on lenses or damaging cameras to prevent them from recording. Once damaged, these systems often fail to capture evidence of malicious activity or provide real-time alerts to authorities.

[0004] Another significant concern in traditional CCTV systems is the privacy and security of the recorded footage. Recorded data is susceptible to unauthorized access or tampering, and existing solutions lack robust encryption and data integrity mechanisms, which makes them vulnerable to breaches or alteration. Conventional CCTV systems often operate in fixed conditions and are not equipped to handle various environmental factors, such as fog, strong winds, or low visibility. This limits the effectiveness of the system during adverse conditions, when surveillance would be most critical.

[0005] Many traditional systems still rely heavily on manual intervention to handle or respond to security threats, such as damage to equipment, detecting suspicious activity, or initiating emergency measures like lockdowns or alerts. This increases the risk of delayed responses and human error. These shortcomings highlight the need for a more robust, intelligent, and adaptive surveillance system that can not only monitor activities in real-time but also self-protect, authenticate users, and securely store data while being resilient to tampering or environmental disruptions.

[0006] While several advancements in CCTV security systems have been made, the existing solutions have often focused on individual aspects of surveillance, such as basic video recording, motion detection, or manual security measures. Some modern CCTV systems employ artificial intelligence (AI) for facial recognition and identifying suspicious activities, yet many of these systems still lack a secure method for storing and transmitting video data or protecting equipment from tampering.

[0007] Certain systems have been designed to shield cameras from physical threats, such as protective covers or anti-vandal enclosures. However, these solutions are generally static and do not automatically deploy in response to a detected threat, leaving gaps in security. Conventional CCTV systems do not typically use advanced cryptography methods to secure video data. As a result, there is a growing concern regarding the security of stored video footage, especially in cases where evidence integrity is crucial for law enforcement or legal purposes.

[0008] In order to overcome the aforementioned drawbacks, there exists a need in the art to develop a system addresses the requires for a more comprehensive and intelligent security system by combining artificial intelligence (AI) for facial recognition and user authentication, environmental sensors for detecting adverse conditions, automated protective features for cameras, and advanced cryptography to secure the recorded data. Furthermore, the developed system also needs to be adapted in addressing the limitations of traditional CCTV systems, providing a modern solution for maintaining security, protecting assets, and ensuring data integrity in real-time surveillance applications.

OBJECTS OF THE INVENTION

[0009] The principal object of the present invention is to overcome the disadvantages of the prior art.

[0010] An object of the present invention is to provide an advanced security system that enables real-time monitoring of activities on a premises, ensuring continuous protection against unauthorized access and tampering.

[0011] Another object of the present invention is to develop a system that accurately authenticates individuals based on their unique features and proximity to the system, ensuring that only authorized users can interact with or access the secured data.

[0012] Another object of the present invention is to offer an automated means of protecting critical surveillance equipment from potential damage or interference, especially from deliberate acts of vandalism or environmental hazards.

[0013] Another object of the present invention is to ensure the system functions effectively under varying environmental conditions by detecting and responding to factors such as weather or obstacles that could impair the system's performance.

[0014] Another object of the present invention is to develop a system that automatically detects suspicious activity, even in compromised or challenging conditions, providing additional insights and triggering appropriate responses.

[0015] Another object of the present invention is to establish a secure framework for storing surveillance footage and related data, ensuring that recorded information is tamper-proof, protected from unauthorized access, and easily accessible to authorized users only.

[0016] Another object of the present invention is to reduce reliance on manual interventions by automating key security functions, enhancing the overall effectiveness and efficiency of the security system, while reducing the potential for human error or oversight.

[0017] Another object of the present invention is to enable authorized users to monitor and control the system remotely, ensuring that security measures can be adapted quickly in response to real-time threats or changing conditions.

[0018] Yet another object of the present invention is to create a security solution that can be easily scaled and adapted to various premises of different sizes and configurations, providing a versatile solution for residential, commercial, or industrial applications.

[0019] The foregoing and other objects, features, and advantages of the present invention will become readily apparent upon further review of the following detailed description of the preferred embodiment as illustrated in the accompanying drawings.

SUMMARY OF THE INVENTION

[0020] The present invention pertains to the broader field of security systems, specifically within the domains of surveillance, privacy protection, and data integrity. More specifically, the proposed system relates to a cryptography-enabled CCTV security system touches upon multiple intersecting fields, providing improvements in video surveillance, user authentication, physical security, and environmental adaptation to enhance situational awareness.

[0021] According to an embodiment of the present invention, a cryptography-enabled CCTV security system, comprises of plurality of artificial intelligence-based imaging units installed inside a premise for recording real time footage of activities taking place at the premise, an ultrasonic sensor mounted with each of imaging units for monitoring distance of users from each imaging units, a pair of sheets arranged on each of imaging units and connected with each other by means of a spring loaded roller for establishing sheets in front of imaging units, a fog detection sensor integrated on imaging units for detecting presence of fog, a thermal camera coupled with imaging units for detecting movement of any object in vicinity of imaging units, a container arranged with imaging units and integrated with an electronically controlled nozzle to dispense a tear gas stored in container, an anemometer installed on imaging units for monitoring velocity of wind inside premise, a motorized gripper mounted on each of imaging units for establishing a V-shaped flap integrated with gripper over imaging unit in order to prevent any damage to imaging units.

[0022] While the invention has been described and shown with particular reference to the preferred embodiment, it will be apparent that variations might be possible that would fall within the scope of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

[0023] These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
Figure 1 illustrates an isometric view of a cryptography-enabled CCTV security system; and
Figure 2 illustrates a flow chart focusing on the full process from video capture to encryption and authentication of the system.

DETAILED DESCRIPTION OF THE INVENTION

[0024] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention as defined in the claims.

[0025] In any embodiment described herein, the open-ended terms "comprising," "comprises," and the like (which are synonymous with "including," "having" and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of," consists essentially of," and the like or the respective closed phrases "consisting of," "consists of, the like.

[0026] As used herein, the singular forms "a," "an," and "the" designate both the singular and the plural, unless expressly stated to designate the singular only.

[0027] The present invention relates to a cryptography-enabled CCTV security system that addresses the field of vandalism-resistant surveillance systems by introducing automatic protective measures that shield surveillance equipment from physical threats such as spray paint or deliberate tampering.

[0028] Referring to Figure 1, an isometric view of a premises installed with plurality of artificial intelligence-based imaging units associated with a cryptography-enabled CCTV security system is illustrated, comprising plurality of artificial intelligence-based imaging units 101 installed inside a premise, a pair of sheets 102 arranged on each of imaging units 101 and connected with each other by means of a spring loaded roller 103 , a thermal camera 104 coupled with imaging units 101, a container 105 arranged with imaging units 101 and integrated with an electronically controlled nozzle 106, an anemometer installed on imaging units 101, a motorized gripper 107 mounted on each of imaging units 101, and a V-shaped flap 108 integrated with gripper 107.

[0029] The security system disclosed is designed to provide enhanced surveillance and data protection, incorporating multiple artificial intelligence-based imaging units 101 that serve as CCTV (closed-circuit television) cameras, each installed strategically within a premise to monitor and record real-time activities.

[0030] The imaging units 101 are equipped with advanced vision units capable of capturing high-resolution footage of the environment, whether in daylight or low-light conditions. The imaging units 101 use a combination of optical sensors, infrared capabilities, and specialized AI modules to detect and record everything happening in their field of view. The imaging units 101 are distributed throughout the premise to ensure comprehensive coverage of both indoor and outdoor areas.

[0031] The imaging units 101 starts recording video footage within the premises. A microcontroller linked with the imaging unit 101 continuously collects real-time video data, which is vital for ensuring the ongoing surveillance of the environment. Once the imaging units 101 are initialized, the imaging units 101 begins the process of video recording using its high-definition camera or multiple cameras, depending on the system configuration. The cameras are designed to continuously monitor the environment, capturing video data at a high frame rate (often 30 frames per second, or higher for real-time applications).

[0032] The footage can be captured in raw format, which consists of continuous video streams (sequences of images), and the microcontroller prepares to process these raw frames in subsequent steps. The real-time images and footages captured by the imaging units 101 are sequentially processed and stored using blockchain technology for preventing any unauthorized access of said recorded footages. The captured video stream is then divided into frames, which is essentially the process of turning the continuous video into discrete, still images. These frames are the fundamental units of video that are to be processed, analyzed, and encrypted. The frame rate ranges from 15 fps to 60 fps, depending on the system requirements and the use case, such as surveillance or live streaming.

[0033] Each frame represents a snapshot of the visual information at a given moment, and this segmentation allows for easier compression, encryption, and efficient storage. Once the video has been segmented into frames, the next step is video compression. In this case, H.264/AVC (Advanced Video Coding) is used as the compression standard. H.264 is one of the most widely used formats due to its ability to deliver high-quality video at relatively low bit rates, making it ideal for real-time surveillance systems.

[0034] H.264 uses a combination of spatial and temporal compression techniques to reduce the size of the video files while preserving as much visual detail as possible. Quantization is applied to the frames, which reduces the amount of information per frame by discarding less critical data, such as subtle color variations that are not easily noticed by the human eye. This ensures that the video quality is balanced against the need for efficient compression, allowing it to be stored and transmitted without excessive bandwidth usage.

[0035] With the video frames ready, the encryption process begins. The unit generates a unique encryption key specifically designed for securing each video frame. This key generation process is critical because the security of the entire system relies on the strength and secrecy of the encryption keys. The encryption key is generated based on an AI modules (often derived from symmetric cryptography like AES) that ensures that only authorized users with the correct decryption key can access the footage. The encryption key is generated randomly or using a pseudo-random number generator, and is securely stored within the unit to ensure that unauthorized users cannot retrieve it.

[0036] Next, a selective encryption protocol is applied to the frames of video. Rather than encrypting the entire frame as a whole, the video frame is divided into sections or blocks, and encryption is applied to those parts using the generated key. This technique is known as Selective Encryption, and it ensures that only critical portions of the video are encrypted, optimizing both performance and encryption time.

[0037] In addition to encrypting individual frames, an interval update is performed, where the encryption key is periodically refreshed to prevent long-term key exposure. This is crucial for real-time video surveillance because it ensures that encryption does not introduce significant delays or performance degradation. The encryption time is minimized so that the microcontroller continues to process video in real-time, ensuring that no latency occurs in the video feed or playback.

[0038] To ensure that the encrypted video frames have not been tampered with, each frame is authenticated using a timestamp and an authentication tag. The timestamp is unique to each frame and serves as a reference to ensure that the footage is genuine and has not been altered.

[0039] The authentication tags are generated using cryptographic hash functions (such as SHA-256) to create a signature for each encrypted frame. These tags are attached to each encrypted frame, and they provide a way for the microcontroller to verify that the frames have not been modified. The timestamp of each frame is critical because it prevents replay attacks or tampering, ensuring that any manipulation of video data will be easily detectable.

[0040] When the video is later accessed for viewing, the system retrieves the encrypted frames and begins the decryption process. The key used for encryption is applied to the frames in reverse. In this case, the decryption operation involves multiplying the encrypted frame by the same encryption key that was used to encrypt it initially.

The decryption formula applied is:
D[X, Y] = E[X, Y] * Key [X, Y]

This ensures that the encrypted frame is returned to its original state. The decrypted frames can now be reconstructed into the video stream, which will be viewed by the user.

[0041] Once the frames have been decrypted, they are stored in the capturing unit's memory. The decrypted video is temporarily held in the internal storage until the user is ready to view it. The decrypted footage can be stored in high-capacity internal memory or on a secure external drive. The decrypted video is now ready for playback or analysis, with the assurance that it has been securely decrypted and remains authentic.

[0042] The user can then access the decrypted CCTV footage via the capturing unit's user interface. The user interface may be a local display, or the video feed could be transmitted over a network to a remote unit, such as a computer or mobile phone. The system ensures that only authenticated users can view the footage. As the internal memory fills up with live video footage, older recordings are transferred to cloud storage. This process ensures that there is always sufficient space for the most recent video feeds. The cloud storage is securely managed and also encrypted, ensuring that archived footage remains protected. In the cloud, encryption and authentication are still in place, allowing users to access historical footage securely. Even if an attacker were to gain access to the cloud, they would be unable to decrypt the footage without the proper keys.

Key features of the authenticated cryptography system:

• Authenticated Encryption: Each frame undergoes authenticated encryption by generating a unique key for each frame. This encryption ensures that the footage is protected from unauthorized access while maintaining its integrity through the use of timestamps.

• Selective Encryption Protocol: Selective encryption ensures that video frames are securely encrypted while optimizing processing power for real-time video surveillance.

• Timestamp-Based Authentication: Frames are authenticated by associating them with a timestamp, ensuring that the video has not been altered or tampered with.

• Decryption with Key Verification: Decryption is performed only by multiplying encrypted frames with the original key, ensuring that only authorized users can decrypt and view the video data.

[0043] By combining real-time video processing, robust encryption, and authentication, this capturing unit provides an enhanced security for IoT-based CCTV networks, ensuring that video surveillance is not only effective but also resistant to hacking and tampering (refer to Fig 2).

A) Authentication Encryption:
1. Initialization
• Read the original frame.
• Generate the key matrix Key[X] of the same size as the input frame.
2. Calculate
• X1 = Input frame / (X+3)
3. Authentication
• Authenticate frames by associating them with a timestamp as associated data
4. Encryption
• E[X, Y] = O[X, Y] / Key[X, Y]
5. Update
X2 = X2 + 15
6. Repeat
• Repeat steps 2-6 for each video frame.
7. Output
• Output the encrypted video frame.

B) Authentication Decryption:
1. Initialization
• Initialize variables.
• Read each encrypted video frame.
2. Authentication
Authenticate each frame with the timestamp.
3. Decryption
• D[X, Y] = E[X, Y] / Key[X, Y]
4. Clip pixel values
• Clip pixel values: DI text (Clip) Di (0, 1)
5. Repeat
Repeat step 2 for decryption of each frame.
6. Output
Output the decrypted video data frames and associated key.

[0044] The pixel values are clipped or restricted to specific values (possibly binary) using DI text (Clip) Di (0, 1). This step ensures pixel remains within a valid range after decryption. D[X, Y] likely represents the decrypted value at the pixel location [X, Y]. This is obtained by taking the encrypted value E[X, Y] and applying a decryption process, which involved multiplying with the key Key[X, Y].

[0045] The system also incorporates facial recognition, the imaging unit 101 plays a vital role not only in capturing video footages but also in detecting and identifying the facial features of the individuals within the premises. The imaging unit 101 continuously scans the environment, identifying all visible individuals in its field of view. In this step, the microcontroller utilizes AI models that are pre-trained to detect human faces within the captured video stream.

[0046] The facial recognition unit within the imaging unit 101 uses AI modules, typically powered by convolutional neural networks (CNNs), to detect faces in the captured frames. These AI modules have been trained on vast datasets of human faces, allowing the system to distinguish facial features such as: eyes, nose, mouth, jawline, and face shape. The AI module processes each frame to identify regions of interest (ROI), where faces are located, ensuring that even in busy or crowded environments, the microcontroller pinpoints individuals and extract face data with high accuracy.

[0047] Once a face is detected in a frame, the microcontroller extracts unique facial features. These features are then converted into a facial template or biometric signature: a unique set of data points that represent the distinct characteristics of a person's face. These features include the distance between the eyes, the shape of the cheekbones, the curve of the jawline, and other distinguishing characteristics.

Landmark Detection: The microcontroller first identifies facial landmarks (such as the eyes, nose, and mouth), which are used to normalize the position of the face in the image, making the microcontroller more robust to changes in lighting, angle, or partial occlusion (e.g., if a person is wearing glasses or a hat).
Feature Vector Creation: The extracted landmarks are then used to create a feature vector, a mathematical representation of the person's face. This vector is a compact representation of the person's facial features and is used for comparison against a database of known individuals.

[0048] Each imaging unit 101 is integrated with an ultrasonic sensor, which is responsible for measuring the distance of any object (e.g., users) within the field of view. The ultrasonic sensor works by emitting high-frequency sound waves and measuring the time it takes for the waves to reflect back after hitting an object, allowing the microcontroller to calculate the distance of a person or object in the imaging unit's 101 field of view.

[0049] If a user comes within or moves closer to a pre-defined threshold distance, the microcontroller triggers the authentication process. This is especially useful in controlled or restricted areas where only authorized individuals should be allowed access. The threshold ensures that the microcontroller only engages in authentication when a user is within a reasonable range to be identified by the imaging units 101.

[0050] Once the sensor detects that the user has crossed the threshold distance, the data is sent to the microcontroller, which processes the input from the ultrasonic sensor. The microcontroller then activates the facial recognition process. Using advanced AI modules, the microcontroller extracts the user's facial features from the video frame, creating a unique biometric template. This template is then compared to a database of authorized faces to determine if the person is recognized.

[0051] If the microcontroller successfully matches the facial features to an authorized individual in the database, the user is authenticated. An additional security feature is introduced in the form of a protective mechanism for the imaging units 101. This mechanism involves a pair of sheets 102 that are positioned in front of the imaging unit's lens. The sheets 102 are connected to each other by a spring-loaded roller 103, which plays a crucial role in protecting the lens from potential damage or obstruction, such as when an unauthorized user attempts to spray color or any substance that could impair the imaging unit's functionality.

[0052] The pair of sheets 102 are typically made from a durable, flexible material, chosen for its ability to effectively shield the imaging unit 101 from damage while being easily deployable. The sheets 102 are normally stored in a rolled-up position, unobtrusively hidden when not in use. The spring-loaded roller 103 ensures that the sheets 102 are kept in place but can be quickly deployed when needed.

[0053] The deployment of these protective sheets 102 is automatically triggered by the microcontroller. If the microcontroller detects a potential threat specifically, if an unauthorized individual is attempting to spray color or another substance in front of the lens, the microcontroller will initiate a response. The detection is based image analysis that identify suspicious activity, such as a person approaching the imaging units 101 with a spray can or other substance that could obstruct the view of imaging units 101.

[0054] Once the microcontroller detects the threat, the microcontroller sends a signal to the spring-loaded roller 103, causing it to rapidly deploy the protective sheets 102 in front of the lens of the imaging units 101. The spring mechanism provides the necessary force to unroll the sheets 102 quickly and efficiently, ensuring that the lens is covered before any spray can reach it. This action occurs almost instantly after the detection of unauthorized activity, minimizing the chance of damage or obstruction to the imaging unit.

[0055] The sheets 102 serve as an immediate shield that blocks any potential spray from hitting the lens. Whether it's paint, ink, or any other liquid substance, the protective sheets 102 prevent it from contacting the lens, ensuring that the imaging unit 101 continues to function without interference. The material of the sheets 102 is designed to be resistant to staining or damage from typical substances, allowing it to maintain its protective function during such incidents.

[0056] Once the threat has passed, the spring-loaded roller 103 mechanism automatically retract the sheets 102, rolling them back up into their initial position. This allows the imaging unit 101 to return to normal operation. The retraction process is typically smooth and controlled, powered by the spring mechanism, ensuring that the lens is once again exposed and ready to capture footage without obstruction.

[0057] Further, a fog detection sensor is integrated with the imaging units 101 for detecting presence of fog in the premises. The fog detection sensor continuously monitors environmental conditions around the imaging unit 101. The fog detection sensor operates by measuring changes in humidity, temperature, or the scattering of light particles in the atmosphere. When the sensor detects the presence of fog or a drastic reduction in visibility (usually due to increased moisture or particles in the air), the microcontroller activates a thermal camera 104 that is coupled with the imaging unit 101.

[0058] Thermal cameras 104, unlike regular visible-light cameras, are designed to detect heat signatures from objects and living beings, which remains detectable even in conditions where visibility is poor due to fog or darkness. The thermal camera 104 operates by capturing the infrared radiation emitted by objects in its vicinity. This allows it to detect temperature differences, which can help in identifying human presence or movement, even if the object is obscured by fog.

[0059] After the thermal camera 104 is activated, the microcontroller processes the thermal data to detect any movement in the environment. The thermal camera 104 uses advanced motion-detection units to distinguish between normal environmental movement (like wind or shifting fog) and potentially suspicious movement, such as a person walking or vehicles moving in a restricted area.

[0060] When suspicious activity is detected, the microcontroller is programmed to generate a wireless notification to an authorized user. This notification is sent via a computing unit (such as a smartphone, tablet, or computer) that is wirelessly linked to the microcontroller. The notification provides details about the suspicious activity, including a timestamp, the location of the detected movement, and potentially even a live feed from the thermal camera 104 for further analysis.

[0061] This allows security personnel or authorized users to respond in real time to potential threats, even when visual surveillance is impaired by environmental factors like fog. Further, the proposed system includes a container 105 that stores the tear gas, an electronically controlled nozzle 106, and is activated by the microcontroller only when an authorized user issues a command. The tear gas is stored in a secure container 105 that is integrated into the imaging unit's 101 housing or positioned nearby to ensure quick deployment.

[0062] The container 105 is designed to store the tear gas in a pressurized or sealed environment, ensuring that it remains stable and safe for deployment when needed. Once the command is received, the microcontroller activates the nozzle 106, and tear gas is released into the vicinity of the imaging unit 101, creating a barrier that temporarily deters the intruder from continuing their activity. The system is designed to be non-lethal, providing a means to restrict access or movement without causing permanent harm.

[0063] The tear gas acts as a deterrent, allowing security personnel to respond appropriately to the threat, while also logging the event for further investigation. An anemometer is integrated into each of the imaging units 101 to monitor the wind velocity within the premises. The role of the anemometer is to detect any changes in wind speed and provide data that is then processed by the microcontroller. Based on the information gathered, the microcontroller triggers a response to protect the imaging unit 101 from potential damage caused by strong winds.

[0064] The anemometer continuously measures the wind velocity in the vicinity of the imaging unit 101. If the wind speed reaches a threshold that could potentially damage the sensitive imaging components, such as strong gusts or turbulent weather, the microcontroller activates a motorized gripper 107 that is mounted on the imaging units 101. The gripper 107 is designed to deploy a V-shaped flap 108 integrated with the gripper 107 over the imaging unit 101 lens to act as a protective barrier against the wind.

[0065] The V-shaped flap 108 serves as a wind deflector, minimizing the impact of high wind speeds on the imaging unit 101. By redirecting the airflow away from the imaging unit 101, the flap 108 prevents potential damage that could be caused by dust, debris, or the mechanical strain that strong winds might cause on the lenses. The motorized gripper 107 movement is controlled by the microcontroller to deploy and retract the flap 108 as needed, responding dynamically to changes in wind conditions.

[0066] This protection mechanism is especially valuable in outdoor environments where wind speeds can fluctuate significantly. By ensuring that the imaging units 101 remain protected during high winds, the microcontroller maintains the integrity and performance of the imaging units 101, preventing issues such as lens distortion, debris accumulation, or structural damage.

[0067] Additionally, if the microcontroller detects that an imaging unit 101 is being damaged or tampered with, the microcontroller automatically triggers a response to focus the other imaging units 101 towards the particular imaging unit 101 being damaged/ tampered for closer inspection and to gather visual evidence of the tampering or damage.

Response to detected tampering:
Once the microcontroller detects tampering or damage, the microcontroller processes the input from the detection system and directs the imaging unit 101 to focus on the affected imaging unit 101. This process can involve:

Re-orienting the imaging units 101: The microcontroller sends commands to the pan-and-tilt motors of the imaging unit 101 to adjust the imaging unit 101 angle, directing the imaging unit 101 towards the area where tampering is occurring. This helps to capture detailed footage of the tamperer or the source of the damage.

[0068] The present invention works best in the following manner, where the imaging units 101 as disclosed in the invention is installed inside a premise as disclosed in the invention captures and records real time footage of activities taking place at the premise and detects facial features of multiple users present at the premise. The ultrasonic sensor monitors distance of the users from each of the imaging units 101, and in case the monitored distance recedes a threshold distance, the microcontroller processes the detected facial features to authenticate the user. In case the imaging unit 101 detects any unauthorized user attempting to spray color over the imaging unit, the microcontroller actuates the spring loaded roller 103 to deploy the sheets 102 for in front of the imaging units 101 in view of protecting lens of the imaging unit 101.

[0069] In continuation, the fog detection sensor detects fog in the premise, and in case fog is detected, the microcontroller activates the thermal camera 104 coupled with the imaging units 101 for detecting movement of any object and in case the detected movements correspond to suspicious activity, the microcontroller generates wireless notification to the authorized user regarding the suspicious activity via the computing unit. In case the authorized user generates wireless command for restricting the activity, the microcontroller actuates the nozzle 106 to dispense tear gas stored in the container 105, in vicinity of the imaging units 101 in view of restricting the unauthorized user from performing the activity.

[0070] Although the field of the invention has been described herein with limited reference to specific embodiments, this description is not meant to be construed in a limiting sense. Various modifications of the disclosed embodiments, as well as alternate embodiments of the invention, will become apparent to persons skilled in the art upon reference to the description of the invention. , Claims:1) A cryptography-enabled CCTV security system, comprising:

i) plurality of artificial intelligence-based imaging units 101 installed inside a premise for recording real time footage of activities taking place at said premise, wherein said imaging unit 101 also detects facial features of multiple users present at said premise;
ii) an ultrasonic sensor mounted with each of said imaging units 101 for monitoring distance of said users from each of said imaging units 101, wherein in case said monitored distance recedes a threshold distance, an inbuilt microcontroller processes said detected facial features to authenticate said user;
iii) a pair of sheets 102 arranged on each of said imaging units 101 and connected with each other by means of a spring loaded roller 103 that is deployed for establishing said sheets 102 in front of said imaging units 101 in view of protecting lens of said imaging unit 101, in case said imaging unit 101 detects any unauthorized user attempting to spray color over said imaging unit;
iv) a fog detection sensor integrated on said imaging units 101 for detecting presence of fog in said premise, wherein in case presence of fog is detected in said premise, said microcontroller activates a thermal camera 104 coupled with said imaging units 101 for detecting movement of any object in vicinity of said imaging units 101 and in case said detected movements corresponds to suspicious activity, said microcontroller generates a wireless notification to an authorized user regarding said suspicious activity via a computing unit wirelessly linked with said microcontroller;
v) a container 105 arranged with said imaging units 101 and integrated with an electronically controlled nozzle 106 that is actuated by said microcontroller to dispense a tear gas stored in said container 105, in vicinity of said imaging units 101 in view of restricting said unauthorized user from performing said activity, only in case said authorized user generates a wireless command for restricting said activity; and
vi) an anemometer installed on said imaging units 101 for monitoring velocity of wind inside said premise with respect to said imaging units 101, in accordance to which said microcontroller actuates a motorized gripper 107 mounted on each of said imaging units 101 for establishing a V-shaped flap 108 integrated with said gripper 107 over said imaging unit 101 in order to prevent any damage to said imaging units 101 due to said wind velocity.

2) The system as claimed in claim 1, wherein in case any damage or tampering of any of said imaging units 101 are detected, said microcontroller directs said imaging units 101 to focus on a particular imaging unit 101 being damages or tampered.

3) The system as claimed in claim 1, wherein a database is linked with said microcontroller for recording said captured footage which is easily accessible to said authorized user.

4) The system as claimed in claim 1, wherein data captured by said imaging units 101 is processed and stored using blockchain technology for preventing any unauthorized access of said recorded footages.

Documents

NameDate
202411088447-COMPLETE SPECIFICATION [15-11-2024(online)].pdf15/11/2024
202411088447-DECLARATION OF INVENTORSHIP (FORM 5) [15-11-2024(online)].pdf15/11/2024
202411088447-DRAWINGS [15-11-2024(online)].pdf15/11/2024
202411088447-EDUCATIONAL INSTITUTION(S) [15-11-2024(online)].pdf15/11/2024
202411088447-EVIDENCE FOR REGISTRATION UNDER SSI [15-11-2024(online)].pdf15/11/2024
202411088447-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [15-11-2024(online)].pdf15/11/2024
202411088447-FIGURE OF ABSTRACT [15-11-2024(online)].pdf15/11/2024
202411088447-FORM 1 [15-11-2024(online)].pdf15/11/2024
202411088447-FORM 18 [15-11-2024(online)].pdf15/11/2024
202411088447-FORM FOR SMALL ENTITY(FORM-28) [15-11-2024(online)].pdf15/11/2024
202411088447-FORM FOR STARTUP [15-11-2024(online)].pdf15/11/2024
202411088447-FORM-9 [15-11-2024(online)].pdf15/11/2024
202411088447-POWER OF AUTHORITY [15-11-2024(online)].pdf15/11/2024
202411088447-PROOF OF RIGHT [15-11-2024(online)].pdf15/11/2024
202411088447-REQUEST FOR EARLY PUBLICATION(FORM-9) [15-11-2024(online)].pdf15/11/2024
202411088447-REQUEST FOR EXAMINATION (FORM-18) [15-11-2024(online)].pdf15/11/2024

footer-service

By continuing past this page, you agree to our Terms of Service,Cookie PolicyPrivacy Policy  and  Refund Policy  © - Uber9 Business Process Services Private Limited. All rights reserved.

Uber9 Business Process Services Private Limited, CIN - U74900TN2014PTC098414, GSTIN - 33AABCU7650C1ZM, Registered Office Address - F-97, Newry Shreya Apartments Anna Nagar East, Chennai, Tamil Nadu 600102, India.

Please note that we are a facilitating platform enabling access to reliable professionals. We are not a law firm and do not provide legal services ourselves. The information on this website is for the purpose of knowledge only and should not be relied upon as legal advice or opinion.