[go: up one dir, main page]

AU2021102777A4 - A system for iot based smart entrance and a method there of - Google Patents

A system for iot based smart entrance and a method there of Download PDF

Info

Publication number
AU2021102777A4
AU2021102777A4 AU2021102777A AU2021102777A AU2021102777A4 AU 2021102777 A4 AU2021102777 A4 AU 2021102777A4 AU 2021102777 A AU2021102777 A AU 2021102777A AU 2021102777 A AU2021102777 A AU 2021102777A AU 2021102777 A4 AU2021102777 A4 AU 2021102777A4
Authority
AU
Australia
Prior art keywords
module
person
entrance
recognition
decision
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
AU2021102777A
Inventor
Pranay Anil Raut
Anita Jitendra Chaudhari
Jitendra Chaudhari
Aniket Gopal Dighe
Sumedh Pramod Vartak
Sumit Vilas Joshi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chaudhari Anita Jitendra Mrs
Original Assignee
Chaudhari Anita Jitendra Mrs
Vilas Joshi Sumit Mr
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chaudhari Anita Jitendra Mrs, Vilas Joshi Sumit Mr filed Critical Chaudhari Anita Jitendra Mrs
Priority to AU2021102777A priority Critical patent/AU2021102777A4/en
Application granted granted Critical
Publication of AU2021102777A4 publication Critical patent/AU2021102777A4/en
Ceased legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

A system for unlocking an entrance using IOT, comprises of an image capturing module 100 for capturing an image of a person, a block chain module 102 for recognizing user to unlock the entrance, wherein the block chain module 102 comprises of: a controlling module 104 for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance, a user interface module 106 connected to the controlling module 104 for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in a plurality of secured blocks, and a decision module 108 for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise. 20 100 106 IMAGE CAPTURING MODULE USER INTERFACE 102 MODULE BLOCK CHAIN MODULE 108 104 DECISION MODULE CONTROLLING MODULE FIGURE 1 capturing an image of a person using an image capturing module positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance 202 recognizing user to unlock the entrance using a block chain module connected to the image capturing module, wherein the block chain module comprises of 204 generating command signals upon recognizing the person using a controlling module connected to the image capturing module, wherein the command signal is generated based upon identification of the person to unlock the entrance 204a receiving an information of the person for recognition using a user interface module connected to the controlling module, wherein the information of each person for recognition is stored in a plurality of secured blocks 204b taking decision to allow entry of the person inside the premise using a decision module connected to the user interface module, wherein the decision is taken based on the recognition of the person to unlock the premise 204c FIGURE 2

Description

106 IMAGE CAPTURING MODULE USER INTERFACE 102 MODULE BLOCK CHAIN MODULE 108 104 DECISION MODULE
CONTROLLING MODULE
FIGURE 1
capturing an image of a person using an image capturing module positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance 202 recognizing user to unlock the entrance using a block chain module connected to the image capturing module, wherein the block chain module comprises of 204
generating command signals upon recognizing the person using a controlling module connected to the image capturing module, wherein the command signal is generated based upon identification of the person to unlock the entrance 204a
receiving an information of the person for recognition using a userinterface module connected to the controlling module, wherein the information of each person for recognition is stored in a plurality of secured blocks 204b
taking decision to allow entry of the person inside the premise using a decision module connected to the user interface module, wherein the decision is taken based on the recognition of the person to unlock the premise 204c
FIGURE 2
ASYSTEMFORIOTBASEDSMARTENTRANCEANDAMETHOD THERE OF FIELDOFINVENTION
The present invention generally relates to a field of Internet of Things. More particularly, the present invention relates to a smart entrance that unlocks upon user identification using Internet of things
. BACKGROUND OF THE INVENTION
Door locking system are used for preventing the access of unknown person inside a premise. Various types of door locking systems are available in the market that allow prevention of intruder or unknown person.
Existing door locking system included a key and a lock that allowed the users to open the lock only upon recognizing the user. However, the existing lock and key system is not a safer way as the lock can be easily broken down.
Advancements in the door unlocking mechanism included opening the door using biometric, that allowed identification of a person using the fingerprint. The system checks the fingerprint records previously stored in it and if the matches the current finger placed on the sensor the lock gets opened. Fingers of maximum 5-6 members can be stored in standard fingerprint locks available in market.
During categorization as most secured locks in existing realm, the name of multi-factor locks is said to be safest. Multi-factor authentication locks use two factors or even some uses three factors to authenticate the users. Most commonly used factors in this type are RFid tags, PIN, and OTP are found together in three factor based systems while the two-factor authentication based systems uses fingerprint and PIN/ OTP in combination. Few of the new locks gives the service to save the images of the visitors that can be viewed later and also can be used to decide upon opening a door. This lock comes with led screen installed inside the house and can store images of visitors for some fixed period or fixed count. This door locks can only be operated from inside the home. But the images give a great opportunity for insiders to avoid the unknown outsiders or some sales people visiting the premises.
With the increasing technology, hackers have also improved their techniques to get inside the systems and to talk specifically about fingerprints and biometrics used are nowadays easily infected by Pins, passwords and physical keys or even RFID cards that needs to be handled carefully as, a lost key can give intruder a free and easy access and in case of virtual keys like Pins, passwords are needed to be always remembered while OTPs can't be accessed if a registered device is not with you.
In order to overcome the above-mentioned limitations, there exists a need to develop a system that is highly secure and allows access to the person inside the premises upon being recognized by the user.
The technical advancements disclosed by the present invention overcomes the limitations and disadvantages of existing and convention systems and methods.
SUMMARY OF THE INVENTION
The present invention generally relates to IOT based smart entrance system.
An object of the present invention is to provide a secure access inside a premise.
Another object of the present invention is to provide a system that is able to unlock an entrance remotely.
Another object of the present invention is to provide a system that allows the user to identify the person standing at an entrance.
According to an embodiment of the present invention, the system comprises of an image capturing module, a block chain module, a controlling module, a user interface module, a decision module.
The image capturing module is positioned at an entrance of a premise for capturing an image of a person, wherein the person is present in close proximity to the entrance. The image capturing module is a camera that captures the image of the person at the entrance.
The camera captures the image of the person and processes the image using an image processing module. The image processing module further comprises of:
A pre-processing module for enhancing a plurality of pixels associated with the image of the person by removing the noise from the image.
A feature extraction module is connected to the pre-processing module for extracting a plurality of facial features for recognition of the facial features.
A classification module is connected to the feature extraction module for recognizing the image of the person. The classification module receives the plurality of facial features and compares the features with the feature stored in a database using a matching module. The matching module compares the features of the image with the existing features of the image and determines the identity of the user.
The block chain module is connected to the image capturing module for recognizing user to unlock the entrance. The blockchain is "a distributed database that maintains a continuously growing list of ordered records, called blocks." These blocks "are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data.
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The code acts as a key for decrypting the information.
The block chain module comprises of:
The controlling module is connected to the image capturing module for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance.
The user interface module is connected to the controlling module for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in the plurality of secured blocks. The information is decrypted upon being received by the user interface module. The user is able to receive the information of the person that is not recognized by the classification module.
The decision module is connected to the user interface module for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise. The user manually recognizes the person and allows entry inside the premise. When the user is not able to manually recognize the person the access inside the premises is denied by the person and the entrance remains locked.
The controller module is connected to a motor for locking and unlocking the entrance. The entrance is unlocked upon recognition of the person. The motor moves in either a clock wise or anti-clockwise direction to lock or unlock the entrance. The lock preferably moves in a clockwise direction to lock the door and moves in an anti-clockwise direction to unlock the door.
The controller is further connected to an alert module for notifying the user when the person tries to enter the premises upon being rejected by the decision module. The alert module comprises of either a display module or a sound module for generating alert signals to notify the user.
According to an embodiment, the method comprises of:
The first step discloses about capturing an image of a person using an image capturing module positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance.
The second Step discloses about recognizing user to unlock the entrance using a block chain module connected to the image capturing module for, wherein the block chain module comprises of:
The step (a) discloses about generating command signals upon recognizing the person using a controlling module connected to the image capturing module, wherein the command signal is generated based upon identification of the person to unlock the entrance.
The step (b) discloses about receiving an information of the person for recognition using a user interface module connected to the controlling module, wherein the information of each person for recognition is stored in a plurality of secured blocks.
The step (c ) discloses about taking a decision to allow entry of the person inside the premise using a decision module connected to the user interface module, wherein the decision is taken based on the recognition of the person to unlock the premise.
According to an embodiment, a door bell present at the entrance to alert a user inside the premises of a person standing at the entrance. The entrance is equipped with an image capturing module or camera for capturing the image of the person. The person is recognized on the basis of the image of the person.
The information of the person is sent to the user interface module for identification of the person. The user is able to recognize the person through the user interface module. The user interface module provides an option for the user to grant an access to the person or deny the access to the person based on recognition of the person by the user.
The user decision module is connected to the user interface module for recognition of the person. The user decides to entry of the user through the decision module. The decision is transmitted to the controlling module for locking and unlocking the entrance. The entrance is unlocked by rotating an electric lock in preferably a clockwise direction.
According to an embodiment, the controlling module used herein is raspberry pi module.
According to an alternate embodiment, other controlling module may be used in the system.
According to an embodiment, the method comprises of sending request to open the entrance of the premises based upon recognition of the person by the user. The request is reviewed to recognize the identity of the person based on the image. The information of each person is stored in the secured blocks.
The request for accessing the information is sent and a voting is done for accessing the grant of the request. The access information and key are shared for viewing the information of the person. The access request gets terminated after releasing the lock or when the request is terminated by the user upon denying the request by the user. The request is denied when the person is not recognized by the user.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF FIGURES
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 illustrates a block diagram of the different modules for IOT based smart entrance system,
Figure 2 illustrates a flow diagram of the process involved in the unlocking an entrance using IOT,
Figure 3 illustrates about a block diagram for working of the system according to Figure 1, and
Figure 4 illustrates a flow diagram of the method in the blockchain module for sending information of the person to unlock the entrance.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
DETAILED DESCRIPTION
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Figure 1 illustrates a block diagram of the different modules for IOT based smart entrance system. The system comprises of an image capturing module 100, a block chain module 102, a controlling module 104, a user interface module 106, a decision module 108.
The image capturing module 100 is positioned at an entrance of a premise for capturing an image of a person, wherein the person is present in close proximity to the entrance. The image capturing module 100 is a camera that captures the image of the person at the entrance.
The camera captures the image of the person and processes the image using an image processing module. The image processing module further comprises of:
A pre-processing module for enhancing a plurality of pixels associated with the image of the person by removing the noise from the image.
A feature extraction module is connected to the pre-processing module for extracting a plurality of facial features for recognition of the facial features.
A classification module is connected to the feature extraction module for recognizing the image of the person. The classification module receives the plurality of facial features and compares the features with the feature stored in a database using a matching module. The matching module compares the features of the image with the existing features of the image and determines the identity of the user.
The block chain module 102 is connected to the image capturing module 100 for recognizing user to unlock the entrance. The blockchain is "a distributed database that maintains a continuously growing list of ordered records, called blocks." These blocks "are linked using cryptography. Each block contains a cryptographic hash of the previous block, a timestamp, and transaction data.
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it. The code acts as a key for decrypting the information.
The block chain module 102 comprises of:
The controlling module 104 is connected to the image capturing module 100 for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance.
The user interface module 106 is connected to the controlling module 104 for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in the plurality of secured blocks. The information is decrypted upon being received by the user interface module 106. The user is able to receive the information of the person that is not recognized by the classification module.
The decision module 108 is connected to the user interface module 106 for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise. The user manually recognizes the person and allows entry inside the premise. When the user is not able to manually recognize the person the access inside the premises is denied by the person and the entrance remains locked.
The controller module is connected to a motor for locking and unlocking the entrance. The entrance is unlocked upon recognition of the person. The motor moves in either a clock wise or anti-clockwise direction to lock or unlock the entrance. The lock preferably moves in a clockwise direction to lock the door and moves in an anti-clockwise direction to unlock the door.
The controller is further connected to an alert module for notifying the user when the person tries to enter the premises upon being rejected by the decision module 108. The alert module comprises of either a display module or a sound module for generating alert signals to notify the user.
Figure 2 illustrates a flow diagram of the process involved in the unlocking an entrance using IOT, the method comprises of:
Step 202 discloses about capturing an image of a person using an image capturing module 100 positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance.
Step 204 discloses about recognizing user to unlock the entrance using a block chain module 102 connected to the image capturing module 100, wherein the block chain module 102 comprises of:
Step 204a discloses about generating command signals upon recognizing the person using a controlling module 104 connected to the image capturing module 100, wherein the command signal is generated based upon identification of the person to unlock the entrance.
Step 204b discloses about receiving an information of the person for recognition using a user interface module 106 connected to the controlling module 104, wherein the information of each person for recognition is stored in a plurality of secured blocks.
Step 204c discloses about taking a decision to allow entry of the person inside the premise using a decision module 108 connected to the user interface module 106, wherein the decision is taken based on the recognition of the person to unlock the premise.
Figure 3 illustrates a block diagram of an architecture of the system according to Figure 1.
The figure illustrates a door bell present at the entrance to alert a user inside the premises of a person standing at the entrance. The entrance is equipped with an image capturing module 100 or camera for capturing the image of the person. The person is recognized on the basis of the image of the person.
The information of the person is sent to the user interface module 106 for identification of the person. The user is able to recognize the person through the user interface module 106. The user interface module 106 provides an option for the user to grant an access to the person or deny the access to the person based on recognition of the person by the user.
The user decision module 108 is connected to the user interface module 106 for recognition of the person. The user decides to entry of the user through the decision module 108. The decision is transmitted to the controlling module 104 for locking and unlocking the entrance. The entrance is unlocked by rotating an electric lock in preferably a clockwise direction.
According to an embodiment, the controlling module 104 used herein is raspberry pi module.
According to an alternate embodiment, other controlling module 104 may be used in the system.
Figure 4 illustrates a flow diagram of the method in the blockchain module for sending information of the person to unlock the entrance.
The method comprises of sending request to open the entrance of the premises based upon recognition of the person by the user. The request is reviewed to recognize the identity of the person based on the image. The information of each person is stored in the secured blocks.
The request for accessing the information is sent and a voting is done for accessing the grant of the request. The access information and key are shared for viewing the information of the person. The access request gets terminated after releasing the lock or when the request is terminated by the user upon denying the request by the user. The request is denied when the person is not recognized by the user.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.

Claims (10)

WE CLAIM
1. A system for unlocking an entrance using IOT, the system comprises of: an image capturing module 100 positioned at an entrance of a premise for capturing an image of a person, wherein the person is present in close proximity to the entrance;
a block chain module 102 connected to the image capturing module 100 for recognizing user to unlock the entrance, wherein the block chain module 102 comprises of:
a controlling module 104 connected to the image capturing module 100 for generating command signals upon recognizing the person, wherein the command signal is generated based upon identification of the person to unlock the entrance;
a user interface module 106 connected to the controlling module 104 for receiving an information of the person for recognition, wherein the information of each person for recognition is stored in a plurality of secured blocks; and
a decision module 108 connected to the user interface module 106 for taking a decision to allow entry of the person inside the premise, wherein the decision is taken based on the recognition of the person to unlock the premise.
2. The system as claimed in claim 1, wherein a request is sent for allowing access to the person upon recognition, wherein the entrance is unlocked upon granting the recognition of the person from the decision module 108.
3. The system as claimed in claim 1, wherein the entrance is locked upon denying the identity of the person by the decision module 108.
4. The system as claimed in claim 1, wherein a motor is connected to the controlling module 104 to lock or unlock the entrance, wherein the motor either rotates in clockwise or anti-clockwise direction to lock the entrance and rotates in a direction opposite to the direction of locking the entrance to unlock the entrance upon recognition of the user.
5. The system as claimed in claim 1, wherein a door bell is present at the entrance to notify a user inside the premises about the person standing at the entrance.
6. The system as claimed in claim 1, wherein the information of each person is securely stored in the plurality of block and encrypted by a security key, wherein a plurality of security key is allotted for each of the plurality of blocks during encryption.
7. The system as claimed in claim 1, wherein the information of each person stored in each block is decrypted in the user interface module 106 for recognition by using the security key used during encryption of the block.
8. The system as claimed in claim 1, wherein an alert module is present at the entrance for notifying the user when the person tries to enter the premises upon being rejected by the decision module 108.
9. The system as claimed in claim 6, wherein the alert module comprises of either a display module or a sound module for generating alert signals to notify the user.
10. A method for unlocking an entrance using IOT, the method comprises of: capturing an image of a person using an image capturing module 100 positioned at an entrance of a premise, wherein the person is present in close proximity to the entrance;
recognizing user to unlock the entrance using a block chain module connected to the image capturing module 100, wherein the block chain module 102 comprises of:
generating command signals upon recognizing the person using a controlling module 104 connected to the image capturing module 100, wherein the command signal is generated based upon identification of the person to unlock the entrance;
receiving an information of the person for recognition using a user interface module 106 connected to the controlling module 104, wherein the information of each person for recognition is stored in a plurality of secured blocks; and
taking a decision to allow entry of the person inside the premise using a decision module 108 connected to the user interface module
106, wherein the decision is taken based on the recognition of the person to unlock the premise.
FIGURE 2 FIGURE 1
FIGURE 4 FIGURE 3
AU2021102777A 2021-05-23 2021-05-23 A system for iot based smart entrance and a method there of Ceased AU2021102777A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021102777A AU2021102777A4 (en) 2021-05-23 2021-05-23 A system for iot based smart entrance and a method there of

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021102777A AU2021102777A4 (en) 2021-05-23 2021-05-23 A system for iot based smart entrance and a method there of

Publications (1)

Publication Number Publication Date
AU2021102777A4 true AU2021102777A4 (en) 2022-04-07

Family

ID=80932738

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021102777A Ceased AU2021102777A4 (en) 2021-05-23 2021-05-23 A system for iot based smart entrance and a method there of

Country Status (1)

Country Link
AU (1) AU2021102777A4 (en)

Similar Documents

Publication Publication Date Title
US10043053B2 (en) Systems and methods for authenticating a user of a biometric sensor
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US7907753B2 (en) Access control system with symbol recognition
US8952781B2 (en) Method and apparatus for access control using dual biometric authentication
US6219439B1 (en) Biometric authentication system
US20170264608A1 (en) Visual biometric authentication supplemented with a time-based secondary authentication factor
CN101620753B (en) Safety prevention system and method thereof
US20030115474A1 (en) System and method for validating the identity of a camera used in secure access applications employing biometrics
US20060107316A1 (en) Determining whether to grant access to a passcode protected system
EP3622429B1 (en) Methods and devices of enabling authentication of a user of a client device over a secure communication channel based on biometric data
US20060107064A1 (en) API for a system having a passcode authenticator
Shafique et al. Modern authentication techniques in smart phones: Security and usability perspective
Addy et al. Physical access control based on biometrics and GSM
AU2021102777A4 (en) A system for iot based smart entrance and a method there of
Goud et al. Enhanced security for smart door using biometrics and OTP
JP2005036523A (en) Electronic lock control system and method, and portable information terminal and authentication device used for the same
KR20090041619A (en) Access control system
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
JP5031204B2 (en) Entrance / exit management device
JP2008266907A (en) Wireless lock system using biometrics authentication
KR20070042362A (en) Vein recognition door lock authentication device and its operation method
Keote et al. Biometric & GSM based Security System for Bank Lockers
US20010009589A1 (en) Fingerprint recognition system
EP4245013B1 (en) Controlling access based on a machine-learning model
JP2002147080A (en) Biometric information authentication device and biometric information authentication system

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)
MK22 Patent ceased section 143a(d), or expired - non payment of renewal fee or expiry