Documente Academic
Documente Profesional
Documente Cultură
For example, incase of RF- ID cards, the information may be stored electronically
in a transponder or in a unique RFID "tag" and that information is communicated to a tag
“reader”. Communication between the RFID tag and reader is by the transmission and
reception of electromagnetic (EM) waves, and each must have an antenna to convert
electrical signals to EM waves and vice versa.
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
This technology in the existing security systems has a major disadvantage that it
has lead to cracking of security systems such as hacking the invariable access code from
the user, creating biometric sensors, stealing RF identity cards etc.
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
Additionally, the present invention restricts an unauthorized person to come nearer to the
confidential areas by using a remote sensing device like a high resolution Camera with an
accurate recognition system.
Figure 1 shows a flowchart describing the method of operation of the Intelligent Coat.
Figure 2 is a block diagram representing the model of the Intelligent Coat.
As illustrated in figure 1, the model of Intelligent Coat mainly includes two modules with
different circuits. One module is installed on the Coat and other module will be provided
with the Master Controlling Machine i.e. a PC.
The Coat side module comprises of the Microcontroller AT89S52, being provided the
input from all the devices described below in detail i.e. the Medical injecting kit and
Shocking Unit, RF-ID Card Reader, LCD (liquid crystal display) Device, Body
temperature sensing device, Bluetooth device, Alarm/ Buzzer etc.
Whereas, the PC side module comprises of the Microcontroller being provided input
from the Master Controlling Machine i.e. a PC, from the Alarm, a Keypad and power
supply is provided to the circuit.
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
The basic concept of the present invention is explained below in detail and it includes the
assembling of compact forms of the following components: -
STEPS INVOLVED:
At the first level, while picking the dress, the user should be identified through the
RF (radio frequency) accessing card. An alarm gets activated on picking the dress
forcibly, since a photo sensor gets activated which is hidden inside the dress. And
then the control will be transferred to the step-III directly, resulting access is
denied.
In the second level, (after verification of the 1st RF identity match to pick the
dress) when the user wears the dress, the master controlling machine will check
for proper dress up and keeps on intimating the user through a warning message
on LCD for proper dressing, till the user closes all the buttons properly. After this
the RF identity card is verified once again to obtain the access code to be used in
the third level. The RF reader will check for Identification Number of the user
matching with the sample Number that is already stored in the identification
device for the authorized user and it will send back output simultaneously to the
Master Controlling Machine and to the Medical injecting kit, and to high voltage
shocking device hidden inside the Coat.
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
After 2nd RF identity match, the Body Temperature sensing device will get
activated and check for the authorized person’s body temperature for normal. If
the Master Controlling Machine finds the conditions normal, then it will send the
access code to the displaying unit, else will display ACCESS DENIED.
After satisfying all requirements for accessing the defined restricted area, the ten
digit access code will be provided by master controlling machine i.e. randomly
generated by the master controlling machine.
At third level, the authorized person can enter the code into the ‘Code access
Machine’ controlled by Master controlling Machine and can get access to the
defined protected area intimating, “Access Granted”, message to the user.
Before feeding code in ‘Code access Machine’ , the ‘Code access Machine’ has
to be activated, again by human ID match (for example: fingerprint match ,etc) is
performed, if result of ID match is positive then the process move to V111-step
else only Alarm will start ringing up to intimate manual security, then access will
be denied and user has to go through the whole procedure once again to get new
access code to access in defined restricted area
In case, if authorized person makes the mistake while feeding the code in Code
access Machine then a Code Error warning message will be intimated and the
user will be asked to re-enter the code (only once).
If code is matched, then user will be allowed to access the restricted area as
Access Granted else Access Denied and user has to go through the whole
procedure once again to get new access code to access in defined restricted area.
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
INTELLIGENT COAT:
Vikas Saxena
INTELLIGENT COAT AND ITS METHOD OF OPERATION
INVENTION DUMMY
Vikas Saxena