Sie sind auf Seite 1von 8

INTELLIGENT COAT AND ITS METHOD OF OPERATION

INTELLIGENT COAT AND ITS METHOD OF


OPERATION
This Unique design is under procedure of Indian patent Numbered
“1421/DEL/2007” Dated 03/07/2007

FIELD OF THE INVENTION


The present invention relates to a security system for providing high security in very
confidential areas and a method thereof. Particularly, the present invention relates to a
security system named as Intelligent Coat with the devices assembled and interfaced in a
coat type dress which can be worn only by an authorized person in very confidential
areas such as: Nuclear Labs, Research Centers etc. and its method of operation thereof.

BACKGROUND OF THE INVENTION


Today, in the world of emerging skills contributing to the finest technology of
security system in many forms such as access using RF-ID cards, finger print detection,
face recognition, retina detection, iris recognition, blood etc have become very common
and we can say that it has reached to a saturation state. Biometric input devices are
becoming more widely used in a variety of fields due to an ever increasing desire for
security in today's society. In particular, it is recognized that each individual has certain
characteristic biometric identifiers which are unique to them, and can thereby provide a
substantially accurate and controlled verification of the identity of an individual. The
biometric data such as: fingerprint, face, retina, iris, blood and genetic data refers to a
measurable, physical characteristic or personal behavioral trait used to recognize the
identity, or verify the claimed identity of a human being.

For example, incase of RF- ID cards, the information may be stored electronically
in a transponder or in a unique RFID "tag" and that information is communicated to a tag
“reader”. Communication between the RFID tag and reader is by the transmission and
reception of electromagnetic (EM) waves, and each must have an antenna to convert
electrical signals to EM waves and vice versa.

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

Other most common type of biometric identifiers is a fingerprint identifier,


wherein fingerprint image data is gathered by a biometric input device and compared
with stored fingerprint image data. Though the unique nature of each person's fingerprint
makes such biometric authentication procedures substantially effective to ensure a
person's true identity, there is a drawback that the complex nature of each person's
fingerprint requires the undertaking of very detailed and complex verification procedures.
In particular, although every individual's fingerprint is unique, and stays generally the
same, based in part on the different manners or orientations in which the finger is scanned
and/or small imperfection in the finger, the manner of comparison of a detected
fingerprint with a fingerprint image stored in a data base can be a very complicated
process if true accuracy is to be desired.

This technology in the existing security systems has a major disadvantage that it
has lead to cracking of security systems such as hacking the invariable access code from
the user, creating biometric sensors, stealing RF identity cards etc.

SUMMARY OF THE INVENTION


To overcome the above drawbacks, an ultimate security system named as
INTELLIGENT COAT has been developed. It is a three level security system, which is
designed to provide high security to the confidential data in areas like Nuclear Labs,
Research Centers etc. It is a prototype consisting of Compaq electronic gadgets and
Integrated Circuit chips. Preferably, the present invention is an improvement process
since it uses high-end unique person identification devices like DNA which differs from
person to person. More particularly, the present invention involves randomly generating a
New Code for each access by the Master Controlling Machine so as to avoid any hacking
of the access code by any person.

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

Additionally, the present invention restricts an unauthorized person to come nearer to the
confidential areas by using a remote sensing device like a high resolution Camera with an
accurate recognition system.

BRIEF DESCRIPTION OF DRAWINGS

Figure 1 shows a flowchart describing the method of operation of the Intelligent Coat.
Figure 2 is a block diagram representing the model of the Intelligent Coat.

DETAILED DESCRIPTION OF THE INVENTION


The present invention discloses a security system which is the result of assembling and
interfacing concepts. The system is named as Intelligent Coat and it is able to provide
security to any type of data in very confidential areas. It takes care of the health of the
authorized person while accessing data such as: if the authorized person wearing the
intelligent coat suffers with any disorder, it can be analyzed with the Intelligent Coat. The
system provides checking the body temperature of the authorized person. The body
temperature has to be normal according to the surroundings of the laboratory.

As illustrated in figure 1, the model of Intelligent Coat mainly includes two modules with
different circuits. One module is installed on the Coat and other module will be provided
with the Master Controlling Machine i.e. a PC.
The Coat side module comprises of the Microcontroller AT89S52, being provided the
input from all the devices described below in detail i.e. the Medical injecting kit and
Shocking Unit, RF-ID Card Reader, LCD (liquid crystal display) Device, Body
temperature sensing device, Bluetooth device, Alarm/ Buzzer etc.
Whereas, the PC side module comprises of the Microcontroller being provided input
from the Master Controlling Machine i.e. a PC, from the Alarm, a Keypad and power
supply is provided to the circuit.

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

The basic concept of the present invention is explained below in detail and it includes the
assembling of compact forms of the following components: -

STEPS INVOLVED:

 At the first level, while picking the dress, the user should be identified through the
RF (radio frequency) accessing card. An alarm gets activated on picking the dress
forcibly, since a photo sensor gets activated which is hidden inside the dress. And
then the control will be transferred to the step-III directly, resulting access is
denied.

 In the second level, (after verification of the 1st RF identity match to pick the
dress) when the user wears the dress, the master controlling machine will check
for proper dress up and keeps on intimating the user through a warning message
on LCD for proper dressing, till the user closes all the buttons properly. After this
the RF identity card is verified once again to obtain the access code to be used in
the third level. The RF reader will check for Identification Number of the user
matching with the sample Number that is already stored in the identification
device for the authorized user and it will send back output simultaneously to the
Master Controlling Machine and to the Medical injecting kit, and to high voltage
shocking device hidden inside the Coat.

 Based on the type of information (RF ID matched or Unmatched) reached to the


Master Controlling Machine, If in case an UNAUTHORZED person is dressed
with our Intelligent Coat, then the Master controlling Machine will turn off the
connection to the information transmitting device. At the same instant, an alarm
will be activated and with few seconds of delay, a High voltage-shocking device
will be activated. Later an automatic injecting kit will be activated, that contains a
chemical to make unauthorized person unconscious. This will be an automatic attempt by
our security system to incarcerate the unauthorized person entering in the restricted area.

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

 After 2nd RF identity match, the Body Temperature sensing device will get
activated and check for the authorized person’s body temperature for normal. If
the Master Controlling Machine finds the conditions normal, then it will send the
access code to the displaying unit, else will display ACCESS DENIED.

 After satisfying all requirements for accessing the defined restricted area, the ten
digit access code will be provided by master controlling machine i.e. randomly
generated by the master controlling machine.

 At third level, the authorized person can enter the code into the ‘Code access
Machine’ controlled by Master controlling Machine and can get access to the
defined protected area intimating, “Access Granted”, message to the user.

 Before feeding code in ‘Code access Machine’ , the ‘Code access Machine’ has
to be activated, again by human ID match (for example: fingerprint match ,etc) is
performed, if result of ID match is positive then the process move to V111-step
else only Alarm will start ringing up to intimate manual security, then access will
be denied and user has to go through the whole procedure once again to get new
access code to access in defined restricted area

 In case, if authorized person makes the mistake while feeding the code in Code
access Machine then a Code Error warning message will be intimated and the
user will be asked to re-enter the code (only once).

 If code is matched, then user will be allowed to access the restricted area as
Access Granted else Access Denied and user has to go through the whole
procedure once again to get new access code to access in defined restricted area.

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

Fig-1: FLOW CHART FOR ABOVE MENTIONED STEPS:

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

Fig-2: BLOCK DIAGRAM REPRESENTING THE MODEL OF

INTELLIGENT COAT:

Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION

FUTURE IMPLEMENTATION OF THE INVENTION


 In case of getting stolen or regular attempt of unauthorized use, it must have a self
destructive system.
 The intelligent coat must be environment friendly. For example, it should be
insensitive to temperature changes and radioactive radiations.
 In case of malfunctioning of any device assembled in the coat, it must send the
acknowledgment signal to the master host machine.
 In addition to checking the body temperature, heart beat can also be checked for
normal, in order to achieve a good health care of the authorized person.

INVENTION DUMMY

Vikas Saxena

Das könnte Ihnen auch gefallen