Вы находитесь на странице: 1из 12

FORM 1

THE PATENT ACT, 1970


(39 of 1970)
&
The Patents Rules, 2003
APPLICATION FOR THE GRANT OF
PATENT
[See section 7, 54&135 and rule 20(1)]
1. APPLICANTS
Name
Jersha Felix. V

Pradeep. R

Application No:
Filing Date:
Amount of Fee Paid:
CBR No:
SIGNATURE:

Nationality
Indian

Pradeep. R

2.INVENTOR(S)
Name
Jersha Felix. V

(FOR OFFICE USE ONLY)

Indian

Nationality
Indian

Indian

Address
2/909, Gandhinagar extn,
Mookandapalli,
Hosur-635126.
No 48, 2nd main road,
Jawahar nagar,
Chennai-600082.
Address
2/909, Gandhinagar extn,
Mookandapalli,
Hosur-635126.
No 48, 2nd main road,
Jawahar nagar,
Chennai-600082.

3.TITLE OF INVENTION: PLC BASED UNBREACHABLE ELECTRON FLOW LINE LOCKER


SYSTEM
4.ADDRESS FOR CORRESPONDENCE OF
APPLICANT/AUTHORIZED PATENT AGENT IN
INDIA

Telephone No:04344-277550, 044-26703062


Fax No:Mobile No: 9600964724, 9600165195
E-mail: jershafelix@gmail.com,
rjpradeep75@gmail.com.

5.PRIORITY PARTICULARS OF THE APPLICATION (S) FILED IN CONVENTION COUNTRY


Country
Application No.
Filing Date
Name of
Title of Invention
Applicant(s)
India
15-04-2013
Jersha Felix. V
PLC based
unbreachable
Pradeep. R
electron flow line
locker system
6.PARTICULARS FOR FLING PATENT COOPERATION TREATY(PCT) NATIONAL PHASE
APPLICATION
International Application No.

International Filing Date as Allotted by the Receiving Office

7.PARTICULARS FOR FILING DIVISIONAL APPLICATION


Original(First) Application Number

Date Filing Original(First) Application

8.PARTICULARS FOR FILING PATENT OF ADDITION


Main Application/Patent Number

Date of Filing Main Application

9.DECLARATIONS:
(i) Declaration by the Inventor(S)
We, the above named inventors are the true &first inventors for this invention and declare that the
applicants herein are our assignee or legal representative.
a Date
: 15-04-2013
b Signatures :
c Names

JERSHA FELIX. V

PRADEEP. R

(ii) Declaration by the Applicants in the Convention Country


We, the applicants in the convention country declare that the applicants herein are our assignee or
legal representative.
a Date
: 15-04-2013
b Signature(s)

Names of signatory:

JERSHA FELIX. V

PRADEEP. R

(iii) Declaration by the Applicants:


we, the applicants hereby declares that: we are in possession of the above-mentioned invention
The complete specification relating to the invention is filed with this application.
The invention as disclosed in the specification uses the biological material from India and
the necessary permission from the competent authority shall be submitted by the us before
the grant of patent to us.
There is no lawful ground of objection to the grant of patent to us.
We are the assignee or legal representative of true & first inventors.
The application or each of the applications, particulars of which are given in the para-5
was the first application in convention country/countries in respect of our invention.
We claim the priority from the above mentioned applications filed in convention
country/countries and state that no application for protection in respect of the invention
had been made in a convention country before that date by us or by any person from which
we derive the title.
My application in India is based on international application under Patent Cooperation
Treaty (PCT) as mentioned in para-6.
The application is divided out of our applications particulars of which are given in Para-7
and pray that this application may be treated as deemed to have been filed on 25-02-2013
under sec. 16 of the Act.

The said invention is an improvement in or modification of the invention particulars of


which are given in para-8

10.Following are the attachments with the application:


a) complete specification
b) Complete specification (in conformation with the international application)/as amended before the
International Preliminary Examination Authority (IPEA), as applicable (2 copies), No. of pages 6
No. of Claims 9
c) Drawings (in conformation with the international application)/ as amended before the International
Preliminary Examination Authority (IPEA), as applicable (2 copies), No. of sheets 3
d) Priority Documents
e) Translation of Priority Document/Specification/International Search Report.
f) Statement and undertaking on Form 3
g) Power of Authority.
h) Declaration of inventorship on Form 5.
i) Sequence listing in electronic form
j) .
Fee Rsin cash.
We hereby declare that to the best of our knowledge, information and belief the fact and matters stated
herein are correct and We request that a patent may be granted to us for the said invention.
Dated this 15 day of April 2013
Signatures :
Names
.

: Jersha Felix. V

.
Pradeep. R

FORM 2
THE PATENTS ACT, 1970

(39 of 1970)

&
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1.TITLE OF THE INVENTION: PLC BASED UNBREACHABLE ELECTRON FLOW LINE
LOCKER SYSTEM
2.APPLICANTS
a) NAME: JERSHA FELIX. V
b) NATIONALITY: Indian
c) ADDRESS: 2/909, Gandhi nagar extn,
Mookandapalli,
Hosur-635126.
a) NAME: PRADEEP. R
b) NATIONALITY: Indian
c) ADDRESS: No 48, 2nd main road,
Jawahar nagar,
Chennai-600082.
3.PREAMBLE TO THE DESCRIPTION
COMPLETE
The following specification particularly describes the invention and the manner in which is to be
performed.

4. DESCRIPTION
Basic concept:
The main innovation in this locker system is the key that is being used here. The entire key is
made out of non-conducting material with the conducting paths inscribed inside it. These lines are
called the electron flow lines. The key is interfaced to PLC and the PLC is interfaced to the electronic
locking system. There is a source of 24V in the key socket and there are many other contact points on
the key socket. Some of them are in normally closed condition, so if somebody inserts a fully
conducting key or a key with a pattern that is not in the predefined set, these normally closed points
open and the alarm is triggered. The alarm is given to the nearby police station, fire station and the
bank manager.
When the correct key is inserted the supply voltage passes from the source point through the
electron flow lines and reaches the preprogrammed contact points in the socket. These are given as
inputs to the PLC. The PLC identifies the locker to be opened, by using the pattern in which it has
received the signal. After receiving the acknowledgement from the banker, the PLC gives its output to
the code lock keypad of the corresponding locker.

+24V

SWITCH

PLC
CODE
LOCK
KEYPAD

GENERAL BLOCK BIAGRAM

Two key protection system:


For bank lockers, where a high level of security is required single key protection system is
not sufficient. So here two keys are used in parallel.
The vital component of this system is the PLC. The PLC used here is a 20output/10input
PLC. The power supply to the PLC is provided by means of a rechargeable battery. Part of the
external power supply is given as input to the PLC. A switch is provided, for the banker to
acknowledge the opening of lockers. Separate security cameras are provided for each locker. The
corresponding security camera is switched ON by the PLC according to the locker number. An alarm
system is connected to the PLC. The alarm is given to the nearby police station, fire station and the
bank manager. Here the working of two bank lockers is shown, but it is possible to connect any
number of lockers to this system. The PLC is provided with a separate locker for its protection.
Feedbacks are taken from each and every locker and are given to the PLC. An Ethernet cable connects
the PLC with the bank managers pc. So all the information regarding time of opening of a locker,
time of closing of the locker and video of the person opening the locker are automatically stored in the
bank managers pc.
In the block diagram actually three key sockets are shown. First one is the banker key
socket, second one is the PLC key socket and the third one is the customer key socket. Here opening
of the PLC locker is similar to the single key protection system. When the PLC key is inserted, after
getting the acknowledgement from the banker the PLC give its output to the code lock keypad of the
PLC locker and the PLC locker security camera. If a wrong key is inserted in to the socket the alarm
is triggered. In all the keys here only nine contact points are shown, but it is possible to have any
number of contact points.
In the banker key socket contact point 1 acts as a source point. But in the case of customer
key socket there are five source points 2, 3, 6, 8 and 9. In this any two will be activated according to
the bankers key. Suppose if banker key 1 is inserted in to the banker key socket, voltage flows from
the point 1 to point 7. This is given as input to the PLC. Now the PLC activates the source points 2
and 6. Now if the customer key 1 is inserted in to the customer key socket, voltage flows from the
point 2 to 1 and from point 6 to 7. These are given as inputs to the PLC. Now after getting the
acknowledgement from the banker, the PLC gives its output to the code lock keypad of the customer
locker 1 and the security camera 1. In this case all the source points except 2 and 6 become normally
closed points. So if a fully conducting key or a wrong key is inserted alarm is triggered. So nobody
can predict the exact position of the source points and the normally closed points.
Now if the banker key 2 is inserted in to the banker key socket, the PLC will activate the points 2 and
8 in the customer key socket and the points 3, 6 and 9 become normally closed. Now if the customer
key 2 is inserted in to the customer key socket 2, after getting the acknowledgement from the banker,
the PLC gives its output to the code lock keypad of the customer locker 2 and the security camera 2.

POSSIBILITIES OF BREAKING IN:


Every system has its own disadvantages. Having said that the following gives a detailed
description about the various possibilities of breaking in to this system and how these possibilities
have been nullified.
Switching OFF the power supply: The first thing a robber can do is simply switch off the power
supply. But in our system the PLC is powered by means of a rechargeable battery and part of the
external power supply is given as the input to the PLC. So in case of power failure the power should
be restored using a generator or any other means before a certain amount of time otherwise the alarm
will be triggered.
Breaking the customer locker: Feedbacks are taken from every locker and given to the PLC. So if
somebody breaks open the customer locker, feedback will be sent to the PLC that the locker is open.
But the PLC will know that it has not given any output for opening of the locker and the alarm will be
triggered.
Breaking the PLC locker: Breaking the PLC locker is similar to breaking the customer locker, so in
this case also the alarm will be triggered.
Giving 24V supply directly to the output of the PLC: 24v can be directly given to the output of the
PLC for opening of the customer locker. But in this system feedback is present, so the PLC will know
that the locker has been opened by some unauthorized means and it will trigger the alarm.
Modifying the PLC program: The PLC is provided with two types of passwords, one password for
viewing the program and other password for editing the program. The bank manager will have the
password for viewing the PLC program only not 2 edit it. The password for editing the PLC program
will be with the higher officials and so the program can be edited only on permission by the higher
authorities.
Cutting the feedback cables: The feedback from the locker to the PLC is in the form of a +24v
supply from the locker. When the locker is closed supply is given continuously to the PLC, when the
locker is opened only this supply is cutoff. So if somebody cuts down the feedback cables, the PLC
will think that the locker is opened without any output from the PLC in an unauthorized manner and
the alarm will be triggered.
Threatening the bank manager: In this system if a robber threatens the banker to open the locker,
then he need not risk his life and switch ON the alarm. The simple thing he should do is to simply
insert a fully conducting key or a wrong key in to the socket, the PLC will automatically trigger the
alarm.
So this locking system will soon replace all the other mechanical and electronic locks in the
near future.

6. CLAIMS
We claim as our invention,
1. An un-breach able lock or locker system, comprising the combination of a PLC or a
microcontroller, a facility for password protection or any other type of personal identification
and an electronic lock having a port to insert an electronic key consisting of contact points.
2. The system of claim 1, wherein:
a. The key socket consist of many contact points, one or more of these contact points are
connected to a power source.
b. The key consist of many contact points, with the key taking power from one or more of
the contact points in the key socket and giving it back to some other contact points in the
key socket.
c. The lock opens depending on the contact points in the key socket to which the power is
being given back by the key, by taking power from the source points in the key socket.
3. The system of claim 1, wherein there are two keys to open a lock or locker. When the first key
(according to claim 2) is inserted, it activates some source points in the second key socket and
when the second key (according to claim 2) is inserted the locker or the lock opens.
4. The system of claim 1, wherein a single key socket (according to claim 2) is provided to
access all the locks or lockers in the case of single key protection system and two key sockets
(according to claim 2) are provided to access all the locks or lockers in the case of double key
protection system.
5. The system of claim 1, wherein the PLC or the microcontroller is also placed in a locker,
which works by the system in claim 2.
6. The system of claim 1, wherein the PLC or the microcontroller recognizes which key is being
inserted in the key socket and powers that particular lockers or locks camera, keypad or any
other type of personal identification or directly opens the lock or locker.
7. The system of claim 1, wherein the locker or the lock includes a battery or a power source
with a door switch or any other ways to give feedback to the PLC or the microcontroller that
it is open or closed.
8. The system of claim 1, wherein all the data about the time of opening of the lockers or the
locks, time of closing of the lockers or the locks, the video of the person opening the locker or
lock are stored in a pc or any other storage methods.
9. A security control system configured to control the locking and unlocking of many doors in a
facility, the wired or wireless security control system comprising a central access control
system having a key socket (according to claim 2) and the PLC or microcontroller. When a
key (according to claim 2) is inserted in to the socket it opens the corresponding door.

6. DATE AND SIGNATURE


SIGNATURES:

NAMES

Jersha Felix. V

DATE

:15-04-2013

Pradeep. R

7. ABSTRACT OF THE INVENTION


The age we live in, is the electronic age. All the works once done by man are now automated
by using microcontrollers and PLCs (Programmable Logic Control). PLCs are at forefront of
manufacturing automation. Many factories use PLC to cut production cost and or increase quality.
PLC and their unique language, the ladder logic are the workhorses of factory automation. Higher
level languages such as sequential function chart and function blocks ease the programming task for
larger systems, ladder logic remains the dominant language at present. Many simple machines once
used are now being replaced by electronic devices. But even today we use old mechanical lock and
key for bank locker protection system. It uses two key protection systems with unique pattern for each
key. But the major disadvantage with this type of key system is that a fake key can easily be made
from the impression of the original key. This paper presents a novel unfakeable key system. The main
objective is to overcome the disadvantages of the existing locker system. This method aims to exploit
the advantages of PLC. In this system there are no external patterns. The keys for all the lockers will
look alike. By using the electron flow line technology the PLC differentiates one key from another.
This work improves the efficiency of the bank locker system.

F O R M 18
THE PATENTS ACT, 1970
(39 of 1970)

REQUEST/EXPRESS REQUEST FOR


EXAMINATION OF APPLICATION
FOR PATENT

(for office use only)


RQ. No:
Filing date:
Amount of Fee Paid:
CBR No:
Signature:

[See section 11B and rules 20(4)(ii), 24B(1)(i)]


1.APPLICANTS
a) NAME: Jersha Felix. V
b) NATIONALITY: Indian
c) ADDRESS: 2/909, Gandhi nagar extn,
Mookandapalli,
Hosur-635126.
a) NAME: Pradeep. R
b) NATIONALITY: Indian
c) ADDRESS: No 48, 2nd main road,
Jawahar nagar,
Chennai-600082.
2. Statement in case of request for examination made by the applicants
We hereby request that our application for patent Nofiled on
. for the invention PLC BASED UNBREACHABLE ELECTRON FLOW
LINE LOCKER SYSTEM shall be examined under sections 12 and 13 of the Act.
3. Statement in case of request for examination made by any other interested person
We the interested person request for the examination of Nofiled by the applicants
JERSHA FELIX.V & PRADEEP.R titled PLC BASED UNBREACHABLE ELECTRON
FLOW LINE LOCKER SYSTEM under sections 12 and 13 of the Act.
As an evidence of our interest in the application for patent following documents are submitted:

4. ADDRESS FOR SERVICE: 1. 2/909, Gandhi nagar extn,


Mookandapalli,
Hosur-635126.
2. No 48, 2 nd main road,
Jawahar nagar,
Chennai-600082.
Dated this 15 day of April 2013
Signatures:
(Jersha Felix. V)
To
The Controller of Patents,
The Patent Office, at Chennai

(Pradeep. R)

Form 9
The patents act, 1970
(39 of 1970)
&
The patent rules, 2003
Request for publication
[see section 11A (2) ; rule 24A]
1. Name , Address and nationality
of the applicants

we
1. JERSHA FELIX. V
Indian
2/909, Gandhinagar extn,
Mookandapalli,
Hosur-635126.
2. PRADEEP. R
Indian
No 48, 2 nd main road,
Jawahar nagar,
Chennai-600082.

2. To be signed by the applicants or


is authorized registered patent
agent.

hereby request for early publication of our


application for patent no..................
Dated 15-04-2013 under section 11A(2) of the
Act.

Dated this 15 day of April 2013


3. Name of the natural person who
has signed

Signatures:

To
The controller of patents,
The patents office,
At

Вам также может понравиться