AU2021102777A4 - A system for iot based smart entrance and a method there of - Google Patents
A system for iot based smart entrance and a method there of Download PDFInfo
- Publication number
- AU2021102777A4 AU2021102777A4 AU2021102777A AU2021102777A AU2021102777A4 AU 2021102777 A4 AU2021102777 A4 AU 2021102777A4 AU 2021102777 A AU2021102777 A AU 2021102777A AU 2021102777 A AU2021102777 A AU 2021102777A AU 2021102777 A4 AU2021102777 A4 AU 2021102777A4
- Authority
- AU
- Australia
- Prior art keywords
- module
- person
- entrance
- recognition
- decision
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
A system for unlocking an entrance using IOT, comprises of an image
capturing module 100 for capturing an image of a person, a block
chain module 102 for recognizing user to unlock the entrance, wherein
the block chain module 102 comprises of: a controlling module 104 for
generating command signals upon recognizing the person, wherein the
command signal is generated based upon identification of the person
to unlock the entrance, a user interface module 106 connected to the
controlling module 104 for receiving an information of the person for
recognition, wherein the information of each person for recognition is
stored in a plurality of secured blocks, and a decision module 108 for
taking a decision to allow entry of the person inside the premise,
wherein the decision is taken based on the recognition of the person to
unlock the premise.
20
100
106
IMAGE CAPTURING
MODULE USER INTERFACE
102 MODULE
BLOCK CHAIN
MODULE 108
104 DECISION MODULE
CONTROLLING
MODULE
FIGURE 1
capturing an image of a person using an image capturing module positioned at an entrance of a
premise, wherein the person is present in close proximity to the entrance 202
recognizing user to unlock the entrance using a block chain module connected to the image capturing
module, wherein the block chain module comprises of 204
generating command signals upon recognizing the person using a controlling module connected to
the image capturing module, wherein the command signal is generated based upon identification of
the person to unlock the entrance 204a
receiving an information of the person for recognition using a user interface module connected to
the controlling module, wherein the information of each person for recognition is stored in a
plurality of secured blocks 204b
taking decision to allow entry of the person inside the premise using a decision module connected
to the user interface module, wherein the decision is taken based on the recognition of the person to
unlock the premise 204c
FIGURE 2
Description
106 IMAGE CAPTURING MODULE USER INTERFACE 102 MODULE BLOCK CHAIN MODULE 108 104 DECISION MODULE
FIGURE 1
capturing an image of a person using an image capturing module positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance 202 recognizing user to unlock the entrance using a block chain module connected to the image capturing module, wherein the block chain module comprises of 204
generating command signals upon recognizing the person using a controlling module connected to the image capturing module, wherein the command signal is generated based upon identification of the person to unlock the entrance 204a
receiving an information of the person for recognition using a userinterface module connected to the controlling module, wherein the information of each person for recognition is stored in a plurality of secured blocks 204b
taking decision to allow entry of the person inside the premise using a decision module connected to the user interface module, wherein the decision is taken based on the recognition of the person to unlock the premise 204c
FIGURE 2
The present invention generally relates to a field of Internet of Things. More particularly, the present invention relates to a smart entrance that unlocks upon user identification using Internet of things
Door locking system are used for preventing the access of unknown person inside a premise. Various types of door locking systems are available in the market that allow prevention of intruder or unknown person.
Existing door locking system included a key and a lock that allowed the users to open the lock only upon recognizing the user. However, the existing lock and key system is not a safer way as the lock can be easily broken down.
Advancements in the door unlocking mechanism included opening the door using biometric, that allowed identification of a person using the fingerprint. The system checks the fingerprint records previously stored in it and if the matches the current finger placed on the sensor the lock gets opened. Fingers of maximum 5-6 members can be stored in standard fingerprint locks available in market.
During categorization as most secured locks in existing realm, the name of multi-factor locks is said to be safest. Multi-factor authentication locks use two factors or even some uses three factors to authenticate the users. Most commonly used factors in this type are RFid tags, PIN, and OTP are found together in three factor based systems while the two-factor authentication based systems uses fingerprint and PIN/ OTP in combination. Few of the new locks gives the service to save the images of the visitors that can be viewed later and also can be used to decide upon opening a door. This lock comes with led screen installed inside the house and can store images of visitors for some fixed period or fixed count. This door locks can only be operated from inside the home. But the images give a great opportunity for insiders to avoid the unknown outsiders or some sales people visiting the premises.
With the increasing technology, hackers have also improved their techniques to get inside the systems and to talk specifically about fingerprints and biometrics used are nowadays easily infected by Pins, passwords and physical keys or even RFID cards that needs to be handled carefully as, a lost key can give intruder a free and easy access and in case of virtual keys like Pins, passwords are needed to be always remembered while OTPs can't be accessed if a registered device is not with you.
In order to overcome the above-mentioned limitations, there exists a need to develop a system that is highly secure and allows access to the person inside the premises upon being recognized by the user.
The technical advancements disclosed by the present invention overcomes the limitations and disadvantages of existing and convention systems and methods.
The present invention generally relates to IOT based smart entrance system.
An object of the present invention is to provide a secure access inside a premise.
Another object of the present invention is to provide a system that is able to unlock an entrance remotely.
Another object of the present invention is to provide a system that allows the user to identify the person standing at an entrance.
According to an embodiment of the present invention, the system comprises of an image capturing module, a block chain module, a controlling module, a user interface module, a decision module.
The image capturing module is positioned at an entrance of a premise for capturing an image of a person, wherein the person is present in close proximity to the entrance. The image capturing module is a camera that captures the image of the person at the entrance.
The camera captures the image of the person and processes the image using an image processing module. The image processing module further comprises of:
A pre-processing module for enhancing a plurality of pixels associated with the image of the person by removing the noise from the image.
A feature extraction module is connected to the pre-processing module for extracting a plurality of facial features for recognition of the facial features.
A classification module is connected to the feature extraction module for recognizing the image of the person. The classification module receives the plurality of facial features and compares the features with the feature stored in a database using a matching module. The matching module compares the features of the image with the existing features of the image and determines the identity of the user.
The block chain module is connected to the image capturing module for recognizing user to unlock the entrance. The blockchain is "a distributed database that maintains a continuously growing list of ordered records, called blocks." These blocks "are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data.
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The code acts as a key for decrypting the information.
The block chain module comprises of:
The controlling module is connected to the image capturing module for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance.
The user interface module is connected to the controlling module for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in the plurality of secured blocks. The information is decrypted upon being received by the user interface module. The user is able to receive the information of the person that is not recognized by the classification module.
The decision module is connected to the user interface module for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise. The user manually recognizes the person and allows entry inside the premise. When the user is not able to manually recognize the person the access inside the premises is denied by the person and the entrance remains locked.
The controller module is connected to a motor for locking and unlocking the entrance. The entrance is unlocked upon recognition of the person. The motor moves in either a clock wise or anti-clockwise direction to lock or unlock the entrance. The lock preferably moves in a clockwise direction to lock the door and moves in an anti-clockwise direction to unlock the door.
The controller is further connected to an alert module for notifying the user when the person tries to enter the premises upon being rejected by the decision module. The alert module comprises of either a display module or a sound module for generating alert signals to notify the user.
According to an embodiment, the method comprises of:
The first step discloses about capturing an image of a person using an image capturing module positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance.
The second Step discloses about recognizing user to unlock the entrance using a block chain module connected to the image capturing module for, wherein the block chain module comprises of:
The step (a) discloses about generating command signals upon recognizing the person using a controlling module connected to the image capturing module, wherein the command signal is generated based upon identification of the person to unlock the entrance.
The step (b) discloses about receiving an information of the person for recognition using a user interface module connected to the controlling module, wherein the information of each person for recognition is stored in a plurality of secured blocks.
The step (c ) discloses about taking a decision to allow entry of the person inside the premise using a decision module connected to the user interface module, wherein the decision is taken based on the recognition of the person to unlock the premise.
According to an embodiment, a door bell present at the entrance to alert a user inside the premises of a person standing at the entrance. The entrance is equipped with an image capturing module or camera for capturing the image of the person. The person is recognized on the basis of the image of the person.
The information of the person is sent to the user interface module for identification of the person. The user is able to recognize the person through the user interface module. The user interface module provides an option for the user to grant an access to the person or deny the access to the person based on recognition of the person by the user.
The user decision module is connected to the user interface module for recognition of the person. The user decides to entry of the user through the decision module. The decision is transmitted to the controlling module for locking and unlocking the entrance. The entrance is unlocked by rotating an electric lock in preferably a clockwise direction.
According to an embodiment, the controlling module used herein is raspberry pi module.
According to an alternate embodiment, other controlling module may be used in the system.
According to an embodiment, the method comprises of sending request to open the entrance of the premises based upon recognition of the person by the user. The request is reviewed to recognize the identity of the person based on the image. The information of each person is stored in the secured blocks.
The request for accessing the information is sent and a voting is done for accessing the grant of the request. The access information and key are shared for viewing the information of the person. The access request gets terminated after releasing the lock or when the request is terminated by the user upon denying the request by the user. The request is denied when the person is not recognized by the user.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 illustrates a block diagram of the different modules for IOT based smart entrance system,
Figure 2 illustrates a flow diagram of the process involved in the unlocking an entrance using IOT,
Figure 3 illustrates about a block diagram for working of the system according to Figure 1, and
Figure 4 illustrates a flow diagram of the method in the blockchain module for sending information of the person to unlock the entrance.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Figure 1 illustrates a block diagram of the different modules for IOT based smart entrance system. The system comprises of an image capturing module 100, a block chain module 102, a controlling module 104, a user interface module 106, a decision module 108.
The image capturing module 100 is positioned at an entrance of a premise for capturing an image of a person, wherein the person is present in close proximity to the entrance. The image capturing module 100 is a camera that captures the image of the person at the entrance.
The camera captures the image of the person and processes the image using an image processing module. The image processing module further comprises of:
A pre-processing module for enhancing a plurality of pixels associated with the image of the person by removing the noise from the image.
A feature extraction module is connected to the pre-processing module for extracting a plurality of facial features for recognition of the facial features.
A classification module is connected to the feature extraction module for recognizing the image of the person. The classification module receives the plurality of facial features and compares the features with the feature stored in a database using a matching module. The matching module compares the features of the image with the existing features of the image and determines the identity of the user.
The block chain module 102 is connected to the image capturing module 100 for recognizing user to unlock the entrance. The blockchain is "a distributed database that maintains a continuously growing list of ordered records, called blocks." These blocks "are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data.
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The code acts as a key for decrypting the information.
The block chain module 102 comprises of:
The controlling module 104 is connected to the image capturing module 100 for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance.
The user interface module 106 is connected to the controlling module 104 for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in the plurality of secured blocks. The information is decrypted upon being received by the user interface module 106. The user is able to receive the information of the person that is not recognized by the classification module.
The decision module 108 is connected to the user interface module 106 for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise. The user manually recognizes the person and allows entry inside the premise. When the user is not able to manually recognize the person the access inside the premises is denied by the person and the entrance remains locked.
The controller module is connected to a motor for locking and unlocking the entrance. The entrance is unlocked upon recognition of the person. The motor moves in either a clock wise or anti-clockwise direction to lock or unlock the entrance. The lock preferably moves in a clockwise direction to lock the door and moves in an anti-clockwise direction to unlock the door.
The controller is further connected to an alert module for notifying the user when the person tries to enter the premises upon being rejected by the decision module 108. The alert module comprises of either a display module or a sound module for generating alert signals to notify the user.
Figure 2 illustrates a flow diagram of the process involved in the unlocking an entrance using IOT, the method comprises of:
Step 202 discloses about capturing an image of a person using an image capturing module 100 positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance.
Step 204 discloses about recognizing user to unlock the entrance using a block chain module 102 connected to the image capturing module 100, wherein the block chain module 102 comprises of:
Step 204a discloses about generating command signals upon recognizing the person using a controlling module 104 connected to the image capturing module 100, wherein the command signal is generated based upon identification of the person to unlock the entrance.
Step 204b discloses about receiving an information of the person for recognition using a user interface module 106 connected to the controlling module 104, wherein the information of each person for recognition is stored in a plurality of secured blocks.
Step 204c discloses about taking a decision to allow entry of the person inside the premise using a decision module 108 connected to the user interface module 106, wherein the decision is taken based on the recognition of the person to unlock the premise.
Figure 3 illustrates a block diagram of an architecture of the system according to Figure 1.
The figure illustrates a door bell present at the entrance to alert a user inside the premises of a person standing at the entrance. The entrance is equipped with an image capturing module 100 or camera for capturing the image of the person. The person is recognized on the basis of the image of the person.
The information of the person is sent to the user interface module 106 for identification of the person. The user is able to recognize the person through the user interface module 106. The user interface module 106 provides an option for the user to grant an access to the person or deny the access to the person based on recognition of the person by the user.
The user decision module 108 is connected to the user interface module 106 for recognition of the person. The user decides to entry of the user through the decision module 108. The decision is transmitted to the controlling module 104 for locking and unlocking the entrance. The entrance is unlocked by rotating an electric lock in preferably a clockwise direction.
According to an embodiment, the controlling module 104 used herein is raspberry pi module.
According to an alternate embodiment, other controlling module 104 may be used in the system.
Figure 4 illustrates a flow diagram of the method in the blockchain module for sending information of the person to unlock the entrance.
The method comprises of sending request to open the entrance of the premises based upon recognition of the person by the user. The request is reviewed to recognize the identity of the person based on the image. The information of each person is stored in the secured blocks.
The request for accessing the information is sent and a voting is done for accessing the grant of the request. The access information and key are shared for viewing the information of the person. The access request gets terminated after releasing the lock or when the request is terminated by the user upon denying the request by the user. The request is denied when the person is not recognized by the user.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.
Claims (10)
1. A system for unlocking an entrance using IOT, the system comprises of: an image capturing module 100 positioned at an entrance of a premise for capturing an image of a person, wherein the person is present in close proximity to the entrance;
a block chain module 102 connected to the image capturing module 100 for recognizing user to unlock the entrance, wherein the block chain module 102 comprises of:
a controlling module 104 connected to the image capturing module 100 for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance;
a user interface module 106 connected to the controlling module 104 for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in a plurality of secured blocks; and
a decision module 108 connected to the user interface module 106 for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise.
2. The system as claimed in claim 1, wherein a request is sent for allowing access to the person upon recognition, wherein the entrance is unlocked upon granting the recognition of the person from the decision module 108.
3. The system as claimed in claim 1, wherein the entrance is locked upon denying the identity of the person by the decision module 108.
4. The system as claimed in claim 1, wherein a motor is connected to the controlling module 104 to lock or unlock the entrance, wherein the motor either rotates in clockwise or anti-clockwise direction to lock the entrance and rotates in a direction opposite to the direction of locking the entrance to unlock the entrance upon recognition of the user.
5. The system as claimed in claim 1, wherein a door bell is present at the entrance to notify a user inside the premises about the person standing at the entrance.
6. The system as claimed in claim 1, wherein the information of each person is securely stored in the plurality of block and encrypted by a security key, wherein a plurality of security key is allotted for each of the plurality of blocks during encryption.
7. The system as claimed in claim 1, wherein the information of each person stored in each block is decrypted in the user interface module 106 for recognition by using the security key used during encryption of the block.
8. The system as claimed in claim 1, wherein an alert module is present at the entrance for notifying the user when the person tries to enter the premises upon being rejected by the decision module 108.
9. The system as claimed in claim 6, wherein the alert module comprises of either a display module or a sound module for generating alert signals to notify the user.
10. A method for unlocking an entrance using IOT, the method comprises of: capturing an image of a person using an image capturing module 100 positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance;
recognizing user to unlock the entrance using a block chain module connected to the image capturing module 100, wherein the block chain module 102 comprises of:
generating command signals upon recognizing the person using a controlling module 104 connected to the image capturing module 100, wherein the command signal is generated based upon identification of the person to unlock the entrance;
receiving an information of the person for recognition using a user interface module 106 connected to the controlling module 104, wherein the information of each person for recognition is stored in a plurality of secured blocks; and
taking a decision to allow entry of the person inside the premise using a decision module 108 connected to the user interface module
106, wherein the decision is taken based on the recognition of the person to unlock the premise.
FIGURE 2 FIGURE 1
FIGURE 4 FIGURE 3
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021102777A AU2021102777A4 (en) | 2021-05-23 | 2021-05-23 | A system for iot based smart entrance and a method there of |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2021102777A AU2021102777A4 (en) | 2021-05-23 | 2021-05-23 | A system for iot based smart entrance and a method there of |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2021102777A4 true AU2021102777A4 (en) | 2022-04-07 |
Family
ID=80932738
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2021102777A Ceased AU2021102777A4 (en) | 2021-05-23 | 2021-05-23 | A system for iot based smart entrance and a method there of |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU2021102777A4 (en) |
-
2021
- 2021-05-23 AU AU2021102777A patent/AU2021102777A4/en not_active Ceased
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10043053B2 (en) | Systems and methods for authenticating a user of a biometric sensor | |
US10171444B1 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
US7907753B2 (en) | Access control system with symbol recognition | |
US8952781B2 (en) | Method and apparatus for access control using dual biometric authentication | |
US6219439B1 (en) | Biometric authentication system | |
US20170264608A1 (en) | Visual biometric authentication supplemented with a time-based secondary authentication factor | |
CN101620753B (en) | Safety prevention system and method thereof | |
US20030115474A1 (en) | System and method for validating the identity of a camera used in secure access applications employing biometrics | |
US20060107316A1 (en) | Determining whether to grant access to a passcode protected system | |
EP3622429B1 (en) | Methods and devices of enabling authentication of a user of a client device over a secure communication channel based on biometric data | |
US20060107064A1 (en) | API for a system having a passcode authenticator | |
Shafique et al. | Modern authentication techniques in smart phones: Security and usability perspective | |
Addy et al. | Physical access control based on biometrics and GSM | |
AU2021102777A4 (en) | A system for iot based smart entrance and a method there of | |
Goud et al. | Enhanced security for smart door using biometrics and OTP | |
JP2005036523A (en) | Electronic lock control system and method, and portable information terminal and authentication device used for the same | |
KR20090041619A (en) | Access control system | |
US10645070B2 (en) | Securitization of temporal digital communications via authentication and validation for wireless user and access devices | |
JP5031204B2 (en) | Entrance / exit management device | |
JP2008266907A (en) | Wireless lock system using biometrics authentication | |
KR20070042362A (en) | Vein recognition door lock authentication device and its operation method | |
Keote et al. | Biometric & GSM based Security System for Bank Lockers | |
US20010009589A1 (en) | Fingerprint recognition system | |
EP4245013B1 (en) | Controlling access based on a machine-learning model | |
JP2002147080A (en) | Biometric information authentication device and biometric information authentication system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGI | Letters patent sealed or granted (innovation patent) | ||
MK22 | Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry |